Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe

Overview

General Information

Sample name:Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
Analysis ID:1579019
MD5:d8d2276e27894603f13951446da7eae4
SHA1:5f866b5f3d0ea84d31661b350566ce52437e4a8b
SHA256:f19fdc3a63aabdab91c94a0626ee6b28c62b98ffb96a454778cddb64edccf781
Tags:exeuser-lowmal3
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe" MD5: D8D2276E27894603F13951446DA7EAE4)
    • RegSvcs.exe (PID: 7004 cmdline: "C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "serverche399@gpsamsterdamqroup.com", "Password": "     j4YX(KT7UCZ1      ", "Server": "fiber13.dnsiaas.com", "To": "almightstephen@gmail.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf1a7:$a1: get_encryptedPassword
        • 0xf4cf:$a2: get_encryptedUsername
        • 0xef42:$a3: get_timePasswordChanged
        • 0xf063:$a4: get_passwordField
        • 0xf1bd:$a5: set_encryptedPassword
        • 0x10b19:$a7: get_logins
        • 0x107ca:$a8: GetOutlookPasswords
        • 0x105bc:$a9: StartKeylogger
        • 0x10a69:$a10: KeyLoggerEventArgs
        • 0x10619:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x141ab:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x136a9:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x139b7:$a4: \Orbitum\User Data\Default\Login Data
        • 0x147af:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0xd3a7:$a1: get_encryptedPassword
              • 0xd6cf:$a2: get_encryptedUsername
              • 0xd142:$a3: get_timePasswordChanged
              • 0xd263:$a4: get_passwordField
              • 0xd3bd:$a5: set_encryptedPassword
              • 0xed19:$a7: get_logins
              • 0xe9ca:$a8: GetOutlookPasswords
              • 0xe7bc:$a9: StartKeylogger
              • 0xec69:$a10: KeyLoggerEventArgs
              • 0xe819:$a11: KeyLoggerEventArgsEventHandler
              0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x123ab:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x118a9:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x11bb7:$a4: \Orbitum\User Data\Default\Login Data
              • 0x129af:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 10 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T17:42:54.594089+010028032742Potentially Bad Traffic192.168.2.949707158.101.44.24280TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "serverche399@gpsamsterdamqroup.com", "Password": " j4YX(KT7UCZ1 ", "Server": "fiber13.dnsiaas.com", "To": "almightstephen@gmail.com", "Port": 587}
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeReversingLabs: Detection: 52%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.9:49708 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1436885119.0000000003540000.00000004.00001000.00020000.00000000.sdmp, Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1438092303.0000000003A70000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1436885119.0000000003540000.00000004.00001000.00020000.00000000.sdmp, Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1438092303.0000000003A70000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0058DBBE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0055C2A2 FindFirstFileExW,0_2_0055C2A2
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005968EE FindFirstFileW,FindClose,0_2_005968EE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0059698F
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0058D076
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0058D3A9
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00599642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00599642
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0059979D
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00599B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00599B2B
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00595C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00595C97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00ED5761h2_2_00ED54B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00ED6000h2_2_00ED5BE6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00ED6000h2_2_00ED5F2E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA1935h2_2_04FA15F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAF480h2_2_04FAF1D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAE778h2_2_04FAE4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA0741h2_2_04FA0498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FABF28h2_2_04FABC80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA3EF8h2_2_04FA3C50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FADEC8h2_2_04FADC20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAD088h2_2_04FACDE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAF028h2_2_04FAED80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA0FF1h2_2_04FA0D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAC7D8h2_2_04FAC530
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAA970h2_2_04FAA6C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAD93Ah2_2_04FAD690
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAF8D8h2_2_04FAF630
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAA0C0h2_2_04FA9E18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA3AA0h2_2_04FA37F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAB220h2_2_04FAAF78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA31F0h2_2_04FA2F48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA0B99h2_2_04FA08F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAC380h2_2_04FAC0D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA4350h2_2_04FA40A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAE320h2_2_04FAE078
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA02E9h2_2_04FA0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FABAD0h2_2_04FAB828
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA1449h2_2_04FA11A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FACC30h2_2_04FAC988
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAEBD0h2_2_04FAE928
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA2D98h2_2_04FA2AF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAFD30h2_2_04FAFA88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAA518h2_2_04FAA270
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAD4E0h2_2_04FAD238
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAB678h2_2_04FAB3D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FA3648h2_2_04FA33A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04FAADC8h2_2_04FAAB20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05580740h2_2_05580498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 055802E8h2_2_05580040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esp, ebp2_2_05584D40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esp, ebp2_2_05584DEC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_05580B20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 055817FDh2_2_05581620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05582187h2_2_05581620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_05581163
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_05581343
              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
              Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49707 -> 158.101.44.242:80
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.9:49708 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0059CE44
              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A2E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000002.00000002.2664847187.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
              Source: RegSvcs.exe, 00000002.00000002.2664847187.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/d
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0059EAFF
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0059ED6A
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0059EAFF
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0058AA57
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005B9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_005B9576

              System Summary

              barindex
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ac2260ce-c
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a7fee4ae-6
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6869c954-b
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_66cc13af-4
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0058D5EB
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00581201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00581201
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0058E8F6
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0052BF400_2_0052BF40
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005920460_2_00592046
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005280600_2_00528060
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005882980_2_00588298
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0055E4FF0_2_0055E4FF
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0055676B0_2_0055676B
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005B48730_2_005B4873
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0052CAF00_2_0052CAF0
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0054CAA00_2_0054CAA0
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0053CC390_2_0053CC39
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00556DD90_2_00556DD9
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0053B1190_2_0053B119
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005291C00_2_005291C0
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005413940_2_00541394
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005417060_2_00541706
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0054781B0_2_0054781B
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0053997D0_2_0053997D
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005279200_2_00527920
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005419B00_2_005419B0
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00547A4A0_2_00547A4A
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00541C770_2_00541C77
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00547CA70_2_00547CA7
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005ABE440_2_005ABE44
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00559EEE0_2_00559EEE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00541F320_2_00541F32
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_013E75900_2_013E7590
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ED80B02_2_00ED80B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00EDC3B02_2_00EDC3B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ED54B02_2_00ED54B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00EDCCF82_2_00EDCCF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ED2DD12_2_00ED2DD1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ED80A02_2_00ED80A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ED54A22_2_00ED54A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00EDCCF62_2_00EDCCF6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00EDBC282_2_00EDBC28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA1C582_2_04FA1C58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA15F82_2_04FA15F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA45002_2_04FA4500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA77802_2_04FA7780
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAF1D82_2_04FAF1D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA6A202_2_04FA6A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAE4D02_2_04FAE4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAE4CE2_2_04FAE4CE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA04982_2_04FA0498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA048B2_2_04FA048B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FABC802_2_04FABC80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FABC7C2_2_04FABC7C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA3C502_2_04FA3C50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA3C4E2_2_04FA3C4E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FADC202_2_04FADC20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FADC112_2_04FADC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA15F62_2_04FA15F6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FACDE02_2_04FACDE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FACDD02_2_04FACDD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAED802_2_04FAED80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAED7C2_2_04FAED7C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA0D482_2_04FA0D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA0D3A2_2_04FA0D3A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAC5302_2_04FAC530
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAC5202_2_04FAC520
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAA6C82_2_04FAA6C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAA6C42_2_04FAA6C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAD6902_2_04FAD690
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAD6812_2_04FAD681
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAF6302_2_04FAF630
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAF6202_2_04FAF620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA9E182_2_04FA9E18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA9E162_2_04FA9E16
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA37F82_2_04FA37F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA37F62_2_04FA37F6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAAF782_2_04FAAF78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAAF742_2_04FAAF74
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA2F482_2_04FA2F48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA2F462_2_04FA2F46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA08F02_2_04FA08F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA08E02_2_04FA08E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAC0D82_2_04FAC0D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAC0D62_2_04FAC0D6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA40A82_2_04FA40A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA40A62_2_04FA40A6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAE0782_2_04FAE078
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAE0762_2_04FAE076
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA00402_2_04FA0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA00362_2_04FA0036
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAB8282_2_04FAB828
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAB8182_2_04FAB818
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAF1D62_2_04FAF1D6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA11A02_2_04FA11A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAC9882_2_04FAC988
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA118F2_2_04FA118F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAC97A2_2_04FAC97A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAE9282_2_04FAE928
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAE9262_2_04FAE926
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA2AF02_2_04FA2AF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA2AEE2_2_04FA2AEE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAFA882_2_04FAFA88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAFA862_2_04FAFA86
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAA2702_2_04FAA270
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAA26C2_2_04FAA26C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAD2382_2_04FAD238
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAD2342_2_04FAD234
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAB3D02_2_04FAB3D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAB3C12_2_04FAB3C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA33A02_2_04FA33A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FA339E2_2_04FA339E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAAB202_2_04FAAB20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FAAB1E2_2_04FAAB1E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055804982_2_05580498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0558048E2_2_0558048E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055826982_2_05582698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055826872_2_05582687
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055800402_2_05580040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0558003E2_2_0558003E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05582CD02_2_05582CD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05582CE02_2_05582CE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05580B202_2_05580B20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05584A662_2_05584A66
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055816102_2_05581610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055816202_2_05581620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055833302_2_05583330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055833202_2_05583320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05583FC82_2_05583FC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05583FC62_2_05583FC6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0558397A2_2_0558397A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_055839802_2_05583980
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: String function: 00529CB3 appears 31 times
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: String function: 00540A30 appears 46 times
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: String function: 00544963 appears 31 times
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: String function: 0053F9F2 appears 40 times
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1440031557.0000000003B9D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1438896173.0000000003663000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005937B5 GetLastError,FormatMessageW,0_2_005937B5
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005810BF AdjustTokenPrivileges,CloseHandle,0_2_005810BF
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005816C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005816C3
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005951CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_005951CD
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005AA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_005AA67C
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0059648E
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005242A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005242A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeFile created: C:\Users\user\AppData\Local\Temp\autBD6C.tmpJump to behavior
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.2664847187.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665453688.00000000039ED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002AB3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002AE2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002AD6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeReversingLabs: Detection: 52%
              Source: unknownProcess created: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe "C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe"
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe"
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic file information: File size 1051136 > 1048576
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1436885119.0000000003540000.00000004.00001000.00020000.00000000.sdmp, Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1438092303.0000000003A70000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1436885119.0000000003540000.00000004.00001000.00020000.00000000.sdmp, Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000003.1438092303.0000000003A70000.00000004.00001000.00020000.00000000.sdmp
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005242DE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00540A76 push ecx; ret 0_2_00540A89
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0053F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0053F98E
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005B1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_005B1C41
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97801
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeAPI/Special instruction interceptor: Address: 13E71B4
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeAPI coverage: 4.2 %
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0058DBBE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0055C2A2 FindFirstFileExW,0_2_0055C2A2
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005968EE FindFirstFileW,FindClose,0_2_005968EE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0059698F
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0058D076
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0058D3A9
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00599642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00599642
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0059979D
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00599B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00599B2B
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00595C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00595C97
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005242DE
              Source: RegSvcs.exe, 00000002.00000002.2664279598.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00EDC3B0 LdrInitializeThunk,LdrInitializeThunk,2_2_00EDC3B0
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0059EAA2 BlockInput,0_2_0059EAA2
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00552622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00552622
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005242DE
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00544CE8 mov eax, dword ptr fs:[00000030h]0_2_00544CE8
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_013E7420 mov eax, dword ptr fs:[00000030h]0_2_013E7420
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_013E7480 mov eax, dword ptr fs:[00000030h]0_2_013E7480
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_013E5E00 mov eax, dword ptr fs:[00000030h]0_2_013E5E00
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00580B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00580B62
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00552622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00552622
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0054083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0054083F
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005409D5 SetUnhandledExceptionFilter,0_2_005409D5
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00540C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00540C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
              Source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 845008Jump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00581201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00581201
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00562BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00562BA5
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0058B226 SendInput,keybd_event,0_2_0058B226
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005A22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_005A22DA
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00580B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00580B62
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00581663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00581663
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00540698 cpuid 0_2_00540698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_00598195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00598195
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0057D27A GetUserNameW,0_2_0057D27A
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_0055B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0055B952
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005242DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: WIN_81
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: WIN_XP
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: WIN_XPe
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: WIN_VISTA
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: WIN_7
              Source: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2664847187.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe.f90000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe PID: 6256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7004, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005A1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_005A1204
              Source: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeCode function: 0_2_005A1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_005A1806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              11
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              121
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS127
              System Information Discovery
              Distributed Component Object Model121
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets221
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe53%ReversingLabsWin32.Trojan.AutoitInject
              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.67.152
              truefalse
                high
                checkip.dyndns.com
                158.101.44.242
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/dRegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comdRegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qStatement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://reallyfreegeoip.orgdRegSvcs.exe, 00000002.00000002.2664847187.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2664847187.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.orgdRegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2664847187.0000000002A2E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.org/dRegSvcs.exe, 00000002.00000002.2664847187.0000000002A40000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2664847187.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegram.org/bot-/sendDocument?chat_id=Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe, 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.21.67.152
                                                reallyfreegeoip.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                158.101.44.242
                                                checkip.dyndns.comUnited States
                                                31898ORACLE-BMC-31898USfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1579019
                                                Start date and time:2024-12-20 17:41:48 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 6m 12s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:7
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 99%
                                                • Number of executed functions: 49
                                                • Number of non-executed functions: 300
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                • Excluded IPs from analysis (whitelisted): 4.245.163.56
                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • VT rate limit hit for: Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                No simulations
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                104.21.67.152Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                              87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    158.101.44.242Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • checkip.dyndns.org/
                                                                    Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • checkip.dyndns.org/
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    checkip.dyndns.comInvoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 158.101.44.242
                                                                    YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 193.122.6.168
                                                                    PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 132.226.247.73
                                                                    PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 193.122.6.168
                                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 158.101.44.242
                                                                    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 193.122.130.0
                                                                    _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                    • 132.226.8.169
                                                                    reallyfreegeoip.orgInvoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 172.67.177.134
                                                                    PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 104.21.67.152
                                                                    PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 172.67.177.134
                                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 172.67.177.134
                                                                    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    CLOUDFLARENETUSFortexternal.exeGet hashmaliciousUnknownBrowse
                                                                    • 172.67.75.163
                                                                    Loader.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.90.135
                                                                    Sentinelled.vbsGet hashmaliciousUnknownBrowse
                                                                    • 104.21.86.72
                                                                    nshkarm.elfGet hashmaliciousMiraiBrowse
                                                                    • 104.25.87.101
                                                                    hBBxlxfQ3F.exeGet hashmaliciousLummaC, StealcBrowse
                                                                    • 172.67.197.170
                                                                    gf3yK6i4OX.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.21.99
                                                                    0WO49yZcDA.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.21.99
                                                                    uDTW3VjJJT.exeGet hashmaliciousLummaC, StealcBrowse
                                                                    • 104.21.21.99
                                                                    u1z7S3hr06.exeGet hashmaliciousLummaC, StealcBrowse
                                                                    • 104.21.21.99
                                                                    zhQFKte2vX.exeGet hashmaliciousLummaCBrowse
                                                                    • 172.67.197.170
                                                                    ORACLE-BMC-31898USnshkarm.elfGet hashmaliciousMiraiBrowse
                                                                    • 140.238.15.102
                                                                    nshsh4.elfGet hashmaliciousMiraiBrowse
                                                                    • 140.238.98.44
                                                                    Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 158.101.44.242
                                                                    YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 193.122.6.168
                                                                    la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                                                    • 168.138.95.8
                                                                    PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 193.122.6.168
                                                                    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    • 144.25.16.134
                                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 158.101.44.242
                                                                    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    • 150.136.65.7
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    54328bd36c14bd82ddaa0c04b25ed9adBrowser.Daemon.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.67.152
                                                                    Browser.Daemon.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.67.152
                                                                    Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.67.152
                                                                    PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 104.21.67.152
                                                                    PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 104.21.67.152
                                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 104.21.67.152
                                                                    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    No context
                                                                    Process:C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):66022
                                                                    Entropy (8bit):7.921493265848032
                                                                    Encrypted:false
                                                                    SSDEEP:1536:M8cbciq7FNE/rR9dO+k53Cz0ifNYOnru+lYFERnGpx:MbbZq7FNyrRI3mpYOnC+aWRGpx
                                                                    MD5:494B7D26C285C94C331A9CE01378C694
                                                                    SHA1:E5CD85CC0A4AFB8C6FE264D5A02F21E4AFB95603
                                                                    SHA-256:3616DAB8EF2836FBE7E211DE03F7BC21B873BC5B69A42CAA54865575D6790362
                                                                    SHA-512:F47ADABAB2C003F1A80F2606E4336F48B34FA315CBDD3797114FE203EA91A736103C151B47A07E55FB526FDD1DDD46F5CA3839744FB253100A5543B3746EEEBD
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:EA06..n..C.5Y..aU..i....oW..j....q0....JUZoW.....#..@.J..I..f....c..[#..../'..T..R1S.Wdrz%.iR..g......F...-~]3..T{..&c..*56.Q.......Z...L.Ag5Z..aU..;..Ug7P.#.2..!Ui... ..g3.....&u..ft...Qi.].Vs(.Ud`.M.oW..].@....9..">..+!2.....I.d......c..{.......:.E...@.....,.3...q2.D.@..v.;.J@.L. .D...P."YW.w.!..TZ3%.HgU...h.".&4........&~.=6.{....=y......&.z.6#.."0.Y.8...M....bsU.....IV...oj.....G.j...S..@..4.3 .dT.D....P.Bt..G@..p..6.3*`....T......Br..H...8.!-..%.....a... A...... .'^.M..d......).X.^.G......gM.l).i.Nih..k....ag.L):..F.M.U.....g].R....Z...Z..=..cW....q9...6+4.. Yb...0....'T....Y..oUY..5w.......e..g5Y.Na.....UJ9W...r...7U....p.2.G...sy.+.Y..iu.]ZoQ...&H...q.B.R..^.I......3w.F#@.E.....g..g3..*.....U..bR.u.gM.s.....}...#..0....U...=.?9..'........o.mV.U.......V....Z..9.X..:]"1..3.s..G.0..i.....7.....%.s8._..U....[. .d~u......"k..Sj.;.^.E.D9....3M.......1.Mn@.%V.0....-.Vc...@....a...'T.0.!M..*.Z...BF.r.7...b\.....#...9....[.Sj....M.....V.......0.
                                                                    Process:C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):93696
                                                                    Entropy (8bit):6.767799571941429
                                                                    Encrypted:false
                                                                    SSDEEP:1536:vJtXbN2nYcVh12hGAvTeXhog08dtJNNHE2ZWNqtawtTDSzTnZ5ITJn10rlpAfDf/:xtXbNIYcVb2TTeX108dFNHE2ZWYtnZDH
                                                                    MD5:15819AFF6E513A892B869AB55F6FA792
                                                                    SHA1:FB995F52DE05191707C759AA114FF79239D345DE
                                                                    SHA-256:AD5FC9B49AF397A824D93F1CE1854959AA633202851901A3694427B57DCF2B85
                                                                    SHA-512:7DA6DAEF84DD09DB86EAB855CC40A9B2DF75EFF45C142042FF24F79A6CA026A5B61C650EA89AF5E5597F501910AEE90D17F16610A635A9317CAFA996423545A9
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:...U:80U7MH0..7W.MU9U980.3MH0JV7WGMU9U980U3MH0JV7WGMU9U980U3.H0JX(.IM.0...1..l.X#%.'5"2K4T.S4]#'Dj4Rw58;.<W.t.`m%_.3.ZJGq9U980U3..0J.6TG....980U3MH0.V5VLL.9U]90U;MH0JV7..LU9u980.2MH0.V7wGMU;U9<0U3MH0JP7WGMU9U9.1U3OH0JV7WEM5.U9(0U#MH0JF7WWMU9U98 U3MH0JV7WGM..T9o0U3M.1J.2WGMU9U980U3MH0JV7WG.T9Y980U3MH0JV7WGMU9U980U3MH0JV7WGMU9U980U3MH0JV7WGMU9U9.0U;MH0JV7WGMU9].80.3MH0JV7WGMU.!\@DU3M.RKV7wGMU]T982U3MH0JV7WGMU9U.805.?;B)V7W.HU9U.90U5MH0,W7WGMU9U980U3M.0J..%"!:ZU940U3M.1JV5WGM98U980U3MH0JV7W.MU{U980U3MH0JV7WGMU..880U3M.0JV5WBM..U98.U3NH0J.7WA..9U.80U3MH0JV7WGMU9U980U3MH0JV7WGMU9U980U3MH0JV.*.B..PK..3MH0JV6UDIS1]980U3MH04V7W.MU9.980b3MH.JV7:GMU.U98NU3M60JVSWGM'9U9Y0U3.H0J97WG#U9UG80U-O`/JV=}aMW.u98:U..;.JV=.FMU=&.80_.OH0N%.WGG.:U9<Cq3MB.NV7S4hU9_.=0U7g.0I.!QGMNVm98:U0.]6JV,}aMW.l98:U.kH3.C1WGV..U;.9U3Ibf9K7WAe.9U3L9U3O.:JV3}YO}zU92.wM^H0N}7}e3A9U=.0..3]0JR.Wmo+/U9<.U.o6'JV3|GgS.79J.Y3=K_+V7Qo.U9_.x0U5Mb.J(9WGIWV.98:s.wH..V7QGe.9U?8..33{0JR.P9~U9Q..Nd3ML.L.7WA>.9U3..f3ML..V7]Gg.9}`80S3e.0JP
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Entropy (8bit):6.86135973048881
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                                    File size:1'051'136 bytes
                                                                    MD5:d8d2276e27894603f13951446da7eae4
                                                                    SHA1:5f866b5f3d0ea84d31661b350566ce52437e4a8b
                                                                    SHA256:f19fdc3a63aabdab91c94a0626ee6b28c62b98ffb96a454778cddb64edccf781
                                                                    SHA512:6bdc731c4542b08ae6369214955f94d302e3e51226aca0b77a84241ea88468e59bc2ea2434fb32c274b4f396c80aab5d859bd410b9a46257b67a10c323c711ec
                                                                    SSDEEP:24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8aPpeO+oAQK:+TvC/MTQYxsWR7aP8poAQ
                                                                    TLSH:2025AE0273D1C062FF9B92334B5AF6515BBC69260123E61F13A81DB9BE701B1563E7A3
                                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                    Icon Hash:aaf3e3e3938382a0
                                                                    Entrypoint:0x420577
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x6764BA44 [Fri Dec 20 00:28:52 2024 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:5
                                                                    OS Version Minor:1
                                                                    File Version Major:5
                                                                    File Version Minor:1
                                                                    Subsystem Version Major:5
                                                                    Subsystem Version Minor:1
                                                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                                                    Instruction
                                                                    call 00007FC318C78E33h
                                                                    jmp 00007FC318C7873Fh
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    push dword ptr [ebp+08h]
                                                                    mov esi, ecx
                                                                    call 00007FC318C7891Dh
                                                                    mov dword ptr [esi], 0049FDF0h
                                                                    mov eax, esi
                                                                    pop esi
                                                                    pop ebp
                                                                    retn 0004h
                                                                    and dword ptr [ecx+04h], 00000000h
                                                                    mov eax, ecx
                                                                    and dword ptr [ecx+08h], 00000000h
                                                                    mov dword ptr [ecx+04h], 0049FDF8h
                                                                    mov dword ptr [ecx], 0049FDF0h
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    push dword ptr [ebp+08h]
                                                                    mov esi, ecx
                                                                    call 00007FC318C788EAh
                                                                    mov dword ptr [esi], 0049FE0Ch
                                                                    mov eax, esi
                                                                    pop esi
                                                                    pop ebp
                                                                    retn 0004h
                                                                    and dword ptr [ecx+04h], 00000000h
                                                                    mov eax, ecx
                                                                    and dword ptr [ecx+08h], 00000000h
                                                                    mov dword ptr [ecx+04h], 0049FE14h
                                                                    mov dword ptr [ecx], 0049FE0Ch
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    mov esi, ecx
                                                                    lea eax, dword ptr [esi+04h]
                                                                    mov dword ptr [esi], 0049FDD0h
                                                                    and dword ptr [eax], 00000000h
                                                                    and dword ptr [eax+04h], 00000000h
                                                                    push eax
                                                                    mov eax, dword ptr [ebp+08h]
                                                                    add eax, 04h
                                                                    push eax
                                                                    call 00007FC318C7B4DDh
                                                                    pop ecx
                                                                    pop ecx
                                                                    mov eax, esi
                                                                    pop esi
                                                                    pop ebp
                                                                    retn 0004h
                                                                    lea eax, dword ptr [ecx+04h]
                                                                    mov dword ptr [ecx], 0049FDD0h
                                                                    push eax
                                                                    call 00007FC318C7B528h
                                                                    pop ecx
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    mov esi, ecx
                                                                    lea eax, dword ptr [esi+04h]
                                                                    mov dword ptr [esi], 0049FDD0h
                                                                    push eax
                                                                    call 00007FC318C7B511h
                                                                    test byte ptr [ebp+08h], 00000001h
                                                                    pop ecx
                                                                    Programming Language:
                                                                    • [ C ] VS2008 SP1 build 30729
                                                                    • [IMP] VS2008 SP1 build 30729
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x29f10.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000x7594.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0xd40000x29f100x2a000b9a4027085b331521c0945cbb370dcdfFalse0.8432268415178571data7.670620575162068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0xfe0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                    RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                    RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                    RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                    RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                    RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                    RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                    RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                    RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                    RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                    RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                    RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                    RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                    RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                    RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                    RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                    RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                    RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                    RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                    RT_RCDATA0xdc7b80x211d7data1.000375998053657
                                                                    RT_GROUP_ICON0xfd9900x76dataEnglishGreat Britain0.6610169491525424
                                                                    RT_GROUP_ICON0xfda080x14dataEnglishGreat Britain1.25
                                                                    RT_GROUP_ICON0xfda1c0x14dataEnglishGreat Britain1.15
                                                                    RT_GROUP_ICON0xfda300x14dataEnglishGreat Britain1.25
                                                                    RT_VERSION0xfda440xdcdataEnglishGreat Britain0.6181818181818182
                                                                    RT_MANIFEST0xfdb200x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                    DLLImport
                                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                    PSAPI.DLLGetProcessMemoryInfo
                                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                    UxTheme.dllIsThemeActive
                                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishGreat Britain
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-12-20T17:42:54.594089+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949707158.101.44.24280TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 20, 2024 17:42:50.463130951 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:42:50.582715988 CET8049707158.101.44.242192.168.2.9
                                                                    Dec 20, 2024 17:42:50.582844019 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:42:50.583164930 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:42:50.702797890 CET8049707158.101.44.242192.168.2.9
                                                                    Dec 20, 2024 17:42:53.168706894 CET8049707158.101.44.242192.168.2.9
                                                                    Dec 20, 2024 17:42:53.177539110 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:42:53.297223091 CET8049707158.101.44.242192.168.2.9
                                                                    Dec 20, 2024 17:42:54.550465107 CET8049707158.101.44.242192.168.2.9
                                                                    Dec 20, 2024 17:42:54.594089031 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:42:54.703197956 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:54.703284979 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:54.703403950 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:54.717925072 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:54.717978001 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:55.938755035 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:55.938858032 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:55.944004059 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:55.944063902 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:55.944382906 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:56.000282049 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:56.135845900 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:56.179337978 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:56.571372986 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:56.571443081 CET44349708104.21.67.152192.168.2.9
                                                                    Dec 20, 2024 17:42:56.571551085 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:42:56.583287001 CET49708443192.168.2.9104.21.67.152
                                                                    Dec 20, 2024 17:43:59.550231934 CET8049707158.101.44.242192.168.2.9
                                                                    Dec 20, 2024 17:43:59.550318003 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:44:34.562983990 CET4970780192.168.2.9158.101.44.242
                                                                    Dec 20, 2024 17:44:34.682773113 CET8049707158.101.44.242192.168.2.9
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 20, 2024 17:42:50.320444107 CET6265153192.168.2.91.1.1.1
                                                                    Dec 20, 2024 17:42:50.457704067 CET53626511.1.1.1192.168.2.9
                                                                    Dec 20, 2024 17:42:54.560971975 CET6359853192.168.2.91.1.1.1
                                                                    Dec 20, 2024 17:42:54.702476978 CET53635981.1.1.1192.168.2.9
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 20, 2024 17:42:50.320444107 CET192.168.2.91.1.1.10x2a68Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:54.560971975 CET192.168.2.91.1.1.10xced9Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 20, 2024 17:42:50.457704067 CET1.1.1.1192.168.2.90x2a68No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:50.457704067 CET1.1.1.1192.168.2.90x2a68No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:50.457704067 CET1.1.1.1192.168.2.90x2a68No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:50.457704067 CET1.1.1.1192.168.2.90x2a68No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:50.457704067 CET1.1.1.1192.168.2.90x2a68No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:50.457704067 CET1.1.1.1192.168.2.90x2a68No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:54.702476978 CET1.1.1.1192.168.2.90xced9No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                    Dec 20, 2024 17:42:54.702476978 CET1.1.1.1192.168.2.90xced9No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                    • reallyfreegeoip.org
                                                                    • checkip.dyndns.org
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.949707158.101.44.242807004C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Dec 20, 2024 17:42:50.583164930 CET151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Dec 20, 2024 17:42:53.168706894 CET321INHTTP/1.1 200 OK
                                                                    Date: Fri, 20 Dec 2024 16:42:52 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 104
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: bfb6bdb7f44145335f4c747b79b23612
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                    Dec 20, 2024 17:42:53.177539110 CET127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Dec 20, 2024 17:42:54.550465107 CET730INHTTP/1.1 502 Bad Gateway
                                                                    Date: Fri, 20 Dec 2024 16:42:54 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 547
                                                                    Connection: keep-alive
                                                                    X-Request-ID: 3af241d7b008ba36a5223486e45fab4a
                                                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                                    Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.949708104.21.67.1524437004C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-20 16:42:56 UTC73OUTGET /xml/ HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2024-12-20 16:42:56 UTC768INHTTP/1.1 200 OK
                                                                    Date: Fri, 20 Dec 2024 16:42:56 GMT
                                                                    Content-Type: text/xml
                                                                    Content-Length: 362
                                                                    Connection: close
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1z6X06j4%2BM8leONsmUluUv8jSs1EjMvAR9RiNM7n7b3L8yaGGlShstfbhHhp2MYX3I%2BV6Oa6y3VZfYGWJiT0x1xAK1nloJE5BtEL8IZBVFVFXHsUtlGTXqs%2Fj4v13OzgwRL5cgD%2F"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8f5116a5dbc4189d-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1494&min_rtt=1493&rtt_var=563&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=687&delivery_rate=1940199&cwnd=190&unsent_bytes=0&cid=ef9828da6fc7d37b&ts=646&x=0"
                                                                    2024-12-20 16:42:56 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:11:42:45
                                                                    Start date:20/12/2024
                                                                    Path:C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe"
                                                                    Imagebase:0x520000
                                                                    File size:1'051'136 bytes
                                                                    MD5 hash:D8D2276E27894603F13951446DA7EAE4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1441048725.0000000000F90000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:11:42:49
                                                                    Start date:20/12/2024
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe"
                                                                    Imagebase:0x660000
                                                                    File size:45'984 bytes
                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2664071949.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2664847187.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:3.2%
                                                                      Dynamic/Decrypted Code Coverage:0.4%
                                                                      Signature Coverage:4.8%
                                                                      Total number of Nodes:2000
                                                                      Total number of Limit Nodes:55
                                                                      execution_graph 95370 521033 95375 524c91 95370->95375 95374 521042 95384 52a961 95375->95384 95379 563cb6 95381 524d9c 95381->95379 95382 521038 95381->95382 95392 5251f7 22 API calls __fread_nolock 95381->95392 95383 5400a3 29 API calls __onexit 95382->95383 95383->95374 95393 53fe0b 95384->95393 95386 52a976 95403 53fddb 95386->95403 95388 524cff 95389 523af0 95388->95389 95428 523b1c 95389->95428 95392->95381 95395 53fddb 95393->95395 95396 53fdfa 95395->95396 95399 53fdfc 95395->95399 95413 54ea0c 95395->95413 95420 544ead 7 API calls 2 library calls 95395->95420 95396->95386 95398 54066d 95422 5432a4 RaiseException 95398->95422 95399->95398 95421 5432a4 RaiseException 95399->95421 95401 54068a 95401->95386 95405 53fde0 95403->95405 95404 54ea0c ___std_exception_copy 21 API calls 95404->95405 95405->95404 95406 53fdfa 95405->95406 95409 53fdfc 95405->95409 95425 544ead 7 API calls 2 library calls 95405->95425 95406->95388 95408 54066d 95427 5432a4 RaiseException 95408->95427 95409->95408 95426 5432a4 RaiseException 95409->95426 95411 54068a 95411->95388 95418 553820 _abort 95413->95418 95414 55385e 95424 54f2d9 20 API calls _abort 95414->95424 95416 553849 RtlAllocateHeap 95417 55385c 95416->95417 95416->95418 95417->95395 95418->95414 95418->95416 95423 544ead 7 API calls 2 library calls 95418->95423 95420->95395 95421->95398 95422->95401 95423->95418 95424->95417 95425->95405 95426->95408 95427->95411 95429 523b0f 95428->95429 95430 523b29 95428->95430 95429->95381 95430->95429 95431 523b30 RegOpenKeyExW 95430->95431 95431->95429 95432 523b4a RegQueryValueExW 95431->95432 95433 523b80 RegCloseKey 95432->95433 95434 523b6b 95432->95434 95433->95429 95434->95433 95435 573f75 95446 53ceb1 95435->95446 95437 573f8b 95445 574006 95437->95445 95513 53e300 23 API calls 95437->95513 95440 574052 95442 574a88 95440->95442 95515 59359c 82 API calls __wsopen_s 95440->95515 95443 573fe6 95443->95440 95514 591abf 22 API calls 95443->95514 95455 52bf40 95445->95455 95447 53ced2 95446->95447 95448 53cebf 95446->95448 95450 53ced7 95447->95450 95451 53cf05 95447->95451 95516 52aceb 23 API calls ISource 95448->95516 95452 53fddb 22 API calls 95450->95452 95517 52aceb 23 API calls ISource 95451->95517 95454 53cec9 95452->95454 95454->95437 95518 52adf0 95455->95518 95457 52bf9d 95458 5704b6 95457->95458 95459 52bfa9 95457->95459 95537 59359c 82 API calls __wsopen_s 95458->95537 95460 5704c6 95459->95460 95461 52c01e 95459->95461 95538 59359c 82 API calls __wsopen_s 95460->95538 95523 52ac91 95461->95523 95465 5704f5 95467 57055a 95465->95467 95539 53d217 235 API calls 95465->95539 95466 587120 22 API calls 95510 52c039 ISource __fread_nolock 95466->95510 95500 52c603 95467->95500 95540 59359c 82 API calls __wsopen_s 95467->95540 95469 52c7da 95472 53fe0b 22 API calls 95469->95472 95476 52c808 __fread_nolock 95472->95476 95479 53fe0b 22 API calls 95476->95479 95477 52af8a 22 API calls 95477->95510 95478 57091a 95574 593209 23 API calls 95478->95574 95511 52c350 ISource __fread_nolock 95479->95511 95480 53fddb 22 API calls 95480->95510 95483 52ec40 235 API calls 95483->95510 95484 5708a5 95548 52ec40 95484->95548 95487 5708cf 95487->95500 95572 52a81b 41 API calls 95487->95572 95488 570591 95541 59359c 82 API calls __wsopen_s 95488->95541 95489 5708f6 95573 59359c 82 API calls __wsopen_s 95489->95573 95494 52bbe0 40 API calls 95494->95510 95496 52c237 95497 52c253 95496->95497 95575 52a8c7 95496->95575 95501 570976 95497->95501 95504 52c297 ISource 95497->95504 95498 53fe0b 22 API calls 95498->95510 95500->95440 95579 52aceb 23 API calls ISource 95501->95579 95506 5709bf 95504->95506 95534 52aceb 23 API calls ISource 95504->95534 95506->95500 95580 59359c 82 API calls __wsopen_s 95506->95580 95507 52c335 95507->95506 95508 52c342 95507->95508 95535 52a704 22 API calls ISource 95508->95535 95510->95465 95510->95466 95510->95467 95510->95469 95510->95476 95510->95477 95510->95478 95510->95480 95510->95483 95510->95484 95510->95488 95510->95489 95510->95494 95510->95496 95510->95498 95510->95500 95510->95506 95527 52ad81 95510->95527 95542 587099 22 API calls __fread_nolock 95510->95542 95543 5a5745 54 API calls _wcslen 95510->95543 95544 53aa42 22 API calls ISource 95510->95544 95545 58f05c 40 API calls 95510->95545 95546 52a993 41 API calls 95510->95546 95547 52aceb 23 API calls ISource 95510->95547 95512 52c3ac 95511->95512 95536 53ce17 22 API calls ISource 95511->95536 95512->95440 95513->95443 95514->95445 95515->95442 95516->95454 95517->95454 95519 52ae01 95518->95519 95522 52ae1c ISource 95518->95522 95581 52aec9 95519->95581 95521 52ae09 CharUpperBuffW 95521->95522 95522->95457 95525 52acae 95523->95525 95524 52acd1 95524->95510 95525->95524 95587 59359c 82 API calls __wsopen_s 95525->95587 95528 52ad92 95527->95528 95529 56fadb 95527->95529 95530 53fddb 22 API calls 95528->95530 95531 52ad99 95530->95531 95588 52adcd 95531->95588 95534->95507 95535->95511 95536->95511 95537->95460 95538->95500 95539->95467 95540->95500 95541->95500 95542->95510 95543->95510 95544->95510 95545->95510 95546->95510 95547->95510 95569 52ec76 ISource 95548->95569 95549 53fddb 22 API calls 95549->95569 95550 52fef7 95558 52a8c7 22 API calls 95550->95558 95564 52ed9d ISource 95550->95564 95553 574b0b 95598 59359c 82 API calls __wsopen_s 95553->95598 95554 52a8c7 22 API calls 95554->95569 95555 574600 95559 52a8c7 22 API calls 95555->95559 95555->95564 95558->95564 95559->95564 95561 540242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95561->95569 95562 52fbe3 95562->95564 95566 574bdc 95562->95566 95571 52f3ae ISource 95562->95571 95563 52a961 22 API calls 95563->95569 95564->95487 95565 5400a3 29 API calls pre_c_initialization 95565->95569 95599 59359c 82 API calls __wsopen_s 95566->95599 95568 574beb 95600 59359c 82 API calls __wsopen_s 95568->95600 95569->95549 95569->95550 95569->95553 95569->95554 95569->95555 95569->95561 95569->95562 95569->95563 95569->95564 95569->95565 95569->95568 95570 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95569->95570 95569->95571 95595 5301e0 235 API calls 2 library calls 95569->95595 95596 5306a0 41 API calls ISource 95569->95596 95570->95569 95571->95564 95597 59359c 82 API calls __wsopen_s 95571->95597 95572->95489 95573->95500 95574->95496 95576 52a8db 95575->95576 95578 52a8ea __fread_nolock 95575->95578 95577 53fe0b 22 API calls 95576->95577 95576->95578 95577->95578 95578->95497 95579->95506 95580->95500 95582 52aedc 95581->95582 95586 52aed9 __fread_nolock 95581->95586 95583 53fddb 22 API calls 95582->95583 95584 52aee7 95583->95584 95585 53fe0b 22 API calls 95584->95585 95585->95586 95586->95521 95587->95524 95592 52addd 95588->95592 95589 52adb6 95589->95510 95590 53fddb 22 API calls 95590->95592 95591 52a961 22 API calls 95591->95592 95592->95589 95592->95590 95592->95591 95593 52a8c7 22 API calls 95592->95593 95594 52adcd 22 API calls 95592->95594 95593->95592 95594->95592 95595->95569 95596->95569 95597->95564 95598->95564 95599->95568 95600->95564 95601 523156 95604 523170 95601->95604 95605 523187 95604->95605 95606 5231eb 95605->95606 95607 52318c 95605->95607 95645 5231e9 95605->95645 95609 5231f1 95606->95609 95610 562dfb 95606->95610 95611 523265 PostQuitMessage 95607->95611 95612 523199 95607->95612 95608 5231d0 DefWindowProcW 95638 52316a 95608->95638 95613 5231f8 95609->95613 95614 52321d SetTimer RegisterWindowMessageW 95609->95614 95660 5218e2 10 API calls 95610->95660 95611->95638 95616 5231a4 95612->95616 95617 562e7c 95612->95617 95619 523201 KillTimer 95613->95619 95620 562d9c 95613->95620 95622 523246 CreatePopupMenu 95614->95622 95614->95638 95623 5231ae 95616->95623 95624 562e68 95616->95624 95674 58bf30 34 API calls ___scrt_fastfail 95617->95674 95656 5230f2 Shell_NotifyIconW ___scrt_fastfail 95619->95656 95628 562dd7 MoveWindow 95620->95628 95629 562da1 95620->95629 95621 562e1c 95661 53e499 42 API calls 95621->95661 95622->95638 95625 562e4d 95623->95625 95626 5231b9 95623->95626 95649 58c161 95624->95649 95625->95608 95673 580ad7 22 API calls 95625->95673 95633 5231c4 95626->95633 95634 523253 95626->95634 95627 562e8e 95627->95608 95627->95638 95628->95638 95635 562dc6 SetFocus 95629->95635 95636 562da7 95629->95636 95633->95608 95662 5230f2 Shell_NotifyIconW ___scrt_fastfail 95633->95662 95658 52326f 44 API calls ___scrt_fastfail 95634->95658 95635->95638 95636->95633 95640 562db0 95636->95640 95637 523214 95657 523c50 DeleteObject DestroyWindow 95637->95657 95659 5218e2 10 API calls 95640->95659 95643 523263 95643->95638 95645->95608 95647 562e41 95663 523837 95647->95663 95650 58c179 ___scrt_fastfail 95649->95650 95651 58c276 95649->95651 95675 523923 95650->95675 95651->95638 95653 58c25f KillTimer SetTimer 95653->95651 95654 58c1a0 95654->95653 95655 58c251 Shell_NotifyIconW 95654->95655 95655->95653 95656->95637 95657->95638 95658->95643 95659->95638 95660->95621 95661->95633 95662->95647 95664 523862 ___scrt_fastfail 95663->95664 95763 524212 95664->95763 95666 5238e8 95669 563386 Shell_NotifyIconW 95666->95669 95670 523906 Shell_NotifyIconW 95666->95670 95671 523923 24 API calls 95670->95671 95672 52391c 95671->95672 95672->95645 95673->95645 95674->95627 95676 52393f 95675->95676 95695 523a13 95675->95695 95697 526270 95676->95697 95679 563393 LoadStringW 95682 5633ad 95679->95682 95680 52395a 95702 526b57 95680->95702 95686 52a8c7 22 API calls 95682->95686 95690 523994 ___scrt_fastfail 95682->95690 95683 52396f 95684 52397c 95683->95684 95685 5633c9 95683->95685 95684->95682 95687 523986 95684->95687 95688 526350 22 API calls 95685->95688 95686->95690 95714 526350 95687->95714 95691 5633d7 95688->95691 95693 5239f9 Shell_NotifyIconW 95690->95693 95691->95690 95723 5233c6 95691->95723 95693->95695 95694 5633f9 95696 5233c6 22 API calls 95694->95696 95695->95654 95696->95690 95698 53fe0b 22 API calls 95697->95698 95699 526295 95698->95699 95700 53fddb 22 API calls 95699->95700 95701 52394d 95700->95701 95701->95679 95701->95680 95703 526b67 _wcslen 95702->95703 95704 564ba1 95702->95704 95707 526ba2 95703->95707 95708 526b7d 95703->95708 95733 5293b2 95704->95733 95706 564baa 95706->95706 95710 53fddb 22 API calls 95707->95710 95732 526f34 22 API calls 95708->95732 95712 526bae 95710->95712 95711 526b85 __fread_nolock 95711->95683 95713 53fe0b 22 API calls 95712->95713 95713->95711 95715 526362 95714->95715 95716 564a51 95714->95716 95737 526373 95715->95737 95747 524a88 22 API calls __fread_nolock 95716->95747 95719 564a5b 95721 564a67 95719->95721 95722 52a8c7 22 API calls 95719->95722 95720 52636e 95720->95690 95722->95721 95724 5630bb 95723->95724 95725 5233dd 95723->95725 95727 53fddb 22 API calls 95724->95727 95753 5233ee 95725->95753 95729 5630c5 _wcslen 95727->95729 95728 5233e8 95728->95694 95730 53fe0b 22 API calls 95729->95730 95731 5630fe __fread_nolock 95730->95731 95732->95711 95734 5293c0 95733->95734 95736 5293c9 __fread_nolock 95733->95736 95735 52aec9 22 API calls 95734->95735 95734->95736 95735->95736 95736->95706 95739 526382 95737->95739 95743 5263b6 __fread_nolock 95737->95743 95738 564a82 95742 53fddb 22 API calls 95738->95742 95739->95738 95740 5263a9 95739->95740 95739->95743 95748 52a587 95740->95748 95744 564a91 95742->95744 95743->95720 95745 53fe0b 22 API calls 95744->95745 95746 564ac5 __fread_nolock 95745->95746 95747->95719 95749 52a59d 95748->95749 95752 52a598 __fread_nolock 95748->95752 95750 53fe0b 22 API calls 95749->95750 95751 56f80f 95749->95751 95750->95752 95752->95743 95754 5233fe _wcslen 95753->95754 95755 523411 95754->95755 95756 56311d 95754->95756 95758 52a587 22 API calls 95755->95758 95757 53fddb 22 API calls 95756->95757 95760 563127 95757->95760 95759 52341e __fread_nolock 95758->95759 95759->95728 95761 53fe0b 22 API calls 95760->95761 95762 563157 __fread_nolock 95761->95762 95764 5635a4 95763->95764 95765 5238b7 95763->95765 95764->95765 95766 5635ad DestroyIcon 95764->95766 95765->95666 95767 58c874 42 API calls _strftime 95765->95767 95766->95765 95767->95666 95768 522e37 95769 52a961 22 API calls 95768->95769 95770 522e4d 95769->95770 95847 524ae3 95770->95847 95772 522e6b 95861 523a5a 95772->95861 95774 522e7f 95868 529cb3 95774->95868 95779 562cb0 95912 592cf9 95779->95912 95781 522ead 95783 52a8c7 22 API calls 95781->95783 95782 562cc3 95784 562ccf 95782->95784 95938 524f39 95782->95938 95785 522ec3 95783->95785 95789 524f39 68 API calls 95784->95789 95896 526f88 22 API calls 95785->95896 95788 522ecf 95791 529cb3 22 API calls 95788->95791 95790 562ce5 95789->95790 95944 523084 22 API calls 95790->95944 95792 522edc 95791->95792 95897 52a81b 41 API calls 95792->95897 95795 522eec 95797 529cb3 22 API calls 95795->95797 95796 562d02 95945 523084 22 API calls 95796->95945 95799 522f12 95797->95799 95898 52a81b 41 API calls 95799->95898 95800 562d1e 95802 523a5a 24 API calls 95800->95802 95804 562d44 95802->95804 95803 522f21 95806 52a961 22 API calls 95803->95806 95946 523084 22 API calls 95804->95946 95808 522f3f 95806->95808 95807 562d50 95809 52a8c7 22 API calls 95807->95809 95899 523084 22 API calls 95808->95899 95810 562d5e 95809->95810 95947 523084 22 API calls 95810->95947 95813 522f4b 95900 544a28 40 API calls 3 library calls 95813->95900 95814 562d6d 95818 52a8c7 22 API calls 95814->95818 95816 522f59 95816->95790 95817 522f63 95816->95817 95901 544a28 40 API calls 3 library calls 95817->95901 95820 562d83 95818->95820 95948 523084 22 API calls 95820->95948 95821 522f6e 95821->95796 95823 522f78 95821->95823 95902 544a28 40 API calls 3 library calls 95823->95902 95824 562d90 95826 522f83 95826->95800 95827 522f8d 95826->95827 95903 544a28 40 API calls 3 library calls 95827->95903 95829 522f98 95830 522fdc 95829->95830 95904 523084 22 API calls 95829->95904 95830->95814 95831 522fe8 95830->95831 95831->95824 95906 5263eb 22 API calls 95831->95906 95833 522fbf 95835 52a8c7 22 API calls 95833->95835 95837 522fcd 95835->95837 95836 522ff8 95907 526a50 22 API calls 95836->95907 95905 523084 22 API calls 95837->95905 95839 523006 95908 5270b0 23 API calls 95839->95908 95844 523021 95845 523065 95844->95845 95909 526f88 22 API calls 95844->95909 95910 5270b0 23 API calls 95844->95910 95911 523084 22 API calls 95844->95911 95848 524af0 __wsopen_s 95847->95848 95849 526b57 22 API calls 95848->95849 95850 524b22 95848->95850 95849->95850 95860 524b58 95850->95860 95949 524c6d 95850->95949 95852 529cb3 22 API calls 95854 524c52 95852->95854 95853 529cb3 22 API calls 95853->95860 95856 52515f 22 API calls 95854->95856 95855 524c6d 22 API calls 95855->95860 95858 524c5e 95856->95858 95858->95772 95859 524c29 95859->95852 95859->95858 95860->95853 95860->95855 95860->95859 95952 52515f 95860->95952 95958 561f50 95861->95958 95864 529cb3 22 API calls 95865 523a8d 95864->95865 95960 523aa2 95865->95960 95867 523a97 95867->95774 95869 529cc2 _wcslen 95868->95869 95870 53fe0b 22 API calls 95869->95870 95871 529cea __fread_nolock 95870->95871 95872 53fddb 22 API calls 95871->95872 95873 522e8c 95872->95873 95874 524ecb 95873->95874 95980 524e90 LoadLibraryA 95874->95980 95879 524ef6 LoadLibraryExW 95988 524e59 LoadLibraryA 95879->95988 95880 563ccf 95881 524f39 68 API calls 95880->95881 95883 563cd6 95881->95883 95886 524e59 3 API calls 95883->95886 95888 563cde 95886->95888 95887 524f20 95887->95888 95889 524f2c 95887->95889 96010 5250f5 95888->96010 95890 524f39 68 API calls 95889->95890 95892 522ea5 95890->95892 95892->95779 95892->95781 95895 563d05 95896->95788 95897->95795 95898->95803 95899->95813 95900->95816 95901->95821 95902->95826 95903->95829 95904->95833 95905->95830 95906->95836 95907->95839 95908->95844 95909->95844 95910->95844 95911->95844 95913 592d15 95912->95913 95914 52511f 64 API calls 95913->95914 95915 592d29 95914->95915 96274 592e66 95915->96274 95918 5250f5 40 API calls 95919 592d56 95918->95919 95920 5250f5 40 API calls 95919->95920 95921 592d66 95920->95921 95922 5250f5 40 API calls 95921->95922 95923 592d81 95922->95923 95924 5250f5 40 API calls 95923->95924 95925 592d9c 95924->95925 95926 52511f 64 API calls 95925->95926 95927 592db3 95926->95927 95928 54ea0c ___std_exception_copy 21 API calls 95927->95928 95929 592dba 95928->95929 95930 54ea0c ___std_exception_copy 21 API calls 95929->95930 95931 592dc4 95930->95931 95932 5250f5 40 API calls 95931->95932 95933 592dd8 95932->95933 95934 5928fe 27 API calls 95933->95934 95936 592dee 95934->95936 95935 592d3f 95935->95782 95936->95935 96280 5922ce 95936->96280 95939 524f43 95938->95939 95940 524f4a 95938->95940 95941 54e678 67 API calls 95939->95941 95942 524f6a FreeLibrary 95940->95942 95943 524f59 95940->95943 95941->95940 95942->95943 95943->95784 95944->95796 95945->95800 95946->95807 95947->95814 95948->95824 95950 52aec9 22 API calls 95949->95950 95951 524c78 95950->95951 95951->95850 95953 52518f __fread_nolock 95952->95953 95954 52516e 95952->95954 95955 53fddb 22 API calls 95953->95955 95957 53fe0b 22 API calls 95954->95957 95956 5251a2 95955->95956 95956->95860 95957->95953 95959 523a67 GetModuleFileNameW 95958->95959 95959->95864 95961 561f50 __wsopen_s 95960->95961 95962 523aaf GetFullPathNameW 95961->95962 95963 523ae9 95962->95963 95964 523ace 95962->95964 95974 52a6c3 95963->95974 95965 526b57 22 API calls 95964->95965 95967 523ada 95965->95967 95970 5237a0 95967->95970 95971 5237ae 95970->95971 95972 5293b2 22 API calls 95971->95972 95973 5237c2 95972->95973 95973->95867 95975 52a6d0 95974->95975 95976 52a6dd 95974->95976 95975->95967 95977 53fddb 22 API calls 95976->95977 95978 52a6e7 95977->95978 95979 53fe0b 22 API calls 95978->95979 95979->95975 95981 524ec6 95980->95981 95982 524ea8 GetProcAddress 95980->95982 95985 54e5eb 95981->95985 95983 524eb8 95982->95983 95983->95981 95984 524ebf FreeLibrary 95983->95984 95984->95981 96018 54e52a 95985->96018 95987 524eea 95987->95879 95987->95880 95989 524e6e GetProcAddress 95988->95989 95990 524e8d 95988->95990 95991 524e7e 95989->95991 95993 524f80 95990->95993 95991->95990 95992 524e86 FreeLibrary 95991->95992 95992->95990 95994 53fe0b 22 API calls 95993->95994 95995 524f95 95994->95995 96079 525722 95995->96079 95997 524fa1 __fread_nolock 95998 524fdc 95997->95998 95999 5250a5 95997->95999 96000 563d1d 95997->96000 96003 563d22 95998->96003 96004 5250f5 40 API calls 95998->96004 96008 52506e ISource 95998->96008 96088 52511f 95998->96088 96082 5242a2 CreateStreamOnHGlobal 95999->96082 96093 59304d 74 API calls 96000->96093 96005 52511f 64 API calls 96003->96005 96004->95998 96006 563d45 96005->96006 96007 5250f5 40 API calls 96006->96007 96007->96008 96008->95887 96011 525107 96010->96011 96012 563d70 96010->96012 96115 54e8c4 96011->96115 96015 5928fe 96257 59274e 96015->96257 96017 592919 96017->95895 96021 54e536 ___BuildCatchObject 96018->96021 96019 54e544 96043 54f2d9 20 API calls _abort 96019->96043 96021->96019 96023 54e574 96021->96023 96022 54e549 96044 5527ec 26 API calls ___std_exception_copy 96022->96044 96025 54e586 96023->96025 96026 54e579 96023->96026 96035 558061 96025->96035 96045 54f2d9 20 API calls _abort 96026->96045 96029 54e554 __fread_nolock 96029->95987 96030 54e58f 96031 54e595 96030->96031 96032 54e5a2 96030->96032 96046 54f2d9 20 API calls _abort 96031->96046 96047 54e5d4 LeaveCriticalSection __fread_nolock 96032->96047 96036 55806d ___BuildCatchObject 96035->96036 96048 552f5e EnterCriticalSection 96036->96048 96038 55807b 96049 5580fb 96038->96049 96042 5580ac __fread_nolock 96042->96030 96043->96022 96044->96029 96045->96029 96046->96029 96047->96029 96048->96038 96052 55811e 96049->96052 96050 558177 96068 554c7d 20 API calls 2 library calls 96050->96068 96052->96050 96058 558088 96052->96058 96066 54918d EnterCriticalSection 96052->96066 96067 5491a1 LeaveCriticalSection 96052->96067 96053 558180 96069 5529c8 96053->96069 96056 558189 96056->96058 96075 553405 11 API calls 2 library calls 96056->96075 96063 5580b7 96058->96063 96059 5581a8 96076 54918d EnterCriticalSection 96059->96076 96062 5581bb 96062->96058 96078 552fa6 LeaveCriticalSection 96063->96078 96065 5580be 96065->96042 96066->96052 96067->96052 96068->96053 96070 5529d3 RtlFreeHeap 96069->96070 96074 5529fc __dosmaperr 96069->96074 96071 5529e8 96070->96071 96070->96074 96077 54f2d9 20 API calls _abort 96071->96077 96073 5529ee GetLastError 96073->96074 96074->96056 96075->96059 96076->96062 96077->96073 96078->96065 96080 53fddb 22 API calls 96079->96080 96081 525734 96080->96081 96081->95997 96083 5242bc FindResourceExW 96082->96083 96087 5242d9 96082->96087 96084 5635ba LoadResource 96083->96084 96083->96087 96085 5635cf SizeofResource 96084->96085 96084->96087 96086 5635e3 LockResource 96085->96086 96085->96087 96086->96087 96087->95998 96089 563d90 96088->96089 96090 52512e 96088->96090 96094 54ece3 96090->96094 96093->96003 96097 54eaaa 96094->96097 96096 52513c 96096->95998 96100 54eab6 ___BuildCatchObject 96097->96100 96098 54eac2 96110 54f2d9 20 API calls _abort 96098->96110 96100->96098 96101 54eae8 96100->96101 96112 54918d EnterCriticalSection 96101->96112 96102 54eac7 96111 5527ec 26 API calls ___std_exception_copy 96102->96111 96105 54eaf4 96113 54ec0a 62 API calls 2 library calls 96105->96113 96107 54eb08 96114 54eb27 LeaveCriticalSection __fread_nolock 96107->96114 96109 54ead2 __fread_nolock 96109->96096 96110->96102 96111->96109 96112->96105 96113->96107 96114->96109 96118 54e8e1 96115->96118 96117 525118 96117->96015 96119 54e8ed ___BuildCatchObject 96118->96119 96120 54e92d 96119->96120 96121 54e925 __fread_nolock 96119->96121 96123 54e900 ___scrt_fastfail 96119->96123 96131 54918d EnterCriticalSection 96120->96131 96121->96117 96145 54f2d9 20 API calls _abort 96123->96145 96125 54e937 96132 54e6f8 96125->96132 96126 54e91a 96146 5527ec 26 API calls ___std_exception_copy 96126->96146 96131->96125 96135 54e70a ___scrt_fastfail 96132->96135 96138 54e727 96132->96138 96133 54e717 96220 54f2d9 20 API calls _abort 96133->96220 96135->96133 96135->96138 96140 54e76a __fread_nolock 96135->96140 96136 54e71c 96221 5527ec 26 API calls ___std_exception_copy 96136->96221 96147 54e96c LeaveCriticalSection __fread_nolock 96138->96147 96139 54e886 ___scrt_fastfail 96223 54f2d9 20 API calls _abort 96139->96223 96140->96138 96140->96139 96148 54d955 96140->96148 96155 558d45 96140->96155 96222 54cf78 26 API calls 4 library calls 96140->96222 96145->96126 96146->96121 96147->96121 96149 54d976 96148->96149 96150 54d961 96148->96150 96149->96140 96224 54f2d9 20 API calls _abort 96150->96224 96152 54d966 96225 5527ec 26 API calls ___std_exception_copy 96152->96225 96154 54d971 96154->96140 96156 558d57 96155->96156 96157 558d6f 96155->96157 96235 54f2c6 20 API calls _abort 96156->96235 96159 5590d9 96157->96159 96164 558db4 96157->96164 96251 54f2c6 20 API calls _abort 96159->96251 96160 558d5c 96236 54f2d9 20 API calls _abort 96160->96236 96163 5590de 96252 54f2d9 20 API calls _abort 96163->96252 96165 558d64 96164->96165 96167 558dbf 96164->96167 96171 558def 96164->96171 96165->96140 96237 54f2c6 20 API calls _abort 96167->96237 96168 558dcc 96253 5527ec 26 API calls ___std_exception_copy 96168->96253 96170 558dc4 96238 54f2d9 20 API calls _abort 96170->96238 96174 558e08 96171->96174 96175 558e2e 96171->96175 96176 558e4a 96171->96176 96174->96175 96207 558e15 96174->96207 96239 54f2c6 20 API calls _abort 96175->96239 96242 553820 21 API calls 2 library calls 96176->96242 96179 558e33 96240 54f2d9 20 API calls _abort 96179->96240 96180 558e61 96183 5529c8 _free 20 API calls 96180->96183 96186 558e6a 96183->96186 96184 558fb3 96187 559029 96184->96187 96191 558fcc GetConsoleMode 96184->96191 96185 558e3a 96241 5527ec 26 API calls ___std_exception_copy 96185->96241 96189 5529c8 _free 20 API calls 96186->96189 96190 55902d ReadFile 96187->96190 96193 558e71 96189->96193 96194 559047 96190->96194 96195 5590a1 GetLastError 96190->96195 96191->96187 96192 558fdd 96191->96192 96192->96190 96196 558fe3 ReadConsoleW 96192->96196 96197 558e96 96193->96197 96198 558e7b 96193->96198 96194->96195 96201 55901e 96194->96201 96199 559005 96195->96199 96200 5590ae 96195->96200 96196->96201 96202 558fff GetLastError 96196->96202 96245 559424 28 API calls __fread_nolock 96197->96245 96243 54f2d9 20 API calls _abort 96198->96243 96216 558e45 __fread_nolock 96199->96216 96246 54f2a3 20 API calls __dosmaperr 96199->96246 96249 54f2d9 20 API calls _abort 96200->96249 96212 559083 96201->96212 96213 55906c 96201->96213 96201->96216 96202->96199 96203 5529c8 _free 20 API calls 96203->96165 96226 55f89b 96207->96226 96209 558e80 96244 54f2c6 20 API calls _abort 96209->96244 96210 5590b3 96250 54f2c6 20 API calls _abort 96210->96250 96212->96216 96217 55909a 96212->96217 96247 558a61 31 API calls 2 library calls 96213->96247 96216->96203 96248 5588a1 29 API calls __fread_nolock 96217->96248 96219 55909f 96219->96216 96220->96136 96221->96138 96222->96140 96223->96136 96224->96152 96225->96154 96227 55f8b5 96226->96227 96228 55f8a8 96226->96228 96230 55f8c1 96227->96230 96255 54f2d9 20 API calls _abort 96227->96255 96254 54f2d9 20 API calls _abort 96228->96254 96230->96184 96232 55f8ad 96232->96184 96233 55f8e2 96256 5527ec 26 API calls ___std_exception_copy 96233->96256 96235->96160 96236->96165 96237->96170 96238->96168 96239->96179 96240->96185 96241->96216 96242->96180 96243->96209 96244->96216 96245->96207 96246->96216 96247->96216 96248->96219 96249->96210 96250->96216 96251->96163 96252->96168 96253->96165 96254->96232 96255->96233 96256->96232 96260 54e4e8 96257->96260 96259 59275d 96259->96017 96263 54e469 96260->96263 96262 54e505 96262->96259 96264 54e48c 96263->96264 96265 54e478 96263->96265 96270 54e488 __alldvrm 96264->96270 96273 55333f 11 API calls 2 library calls 96264->96273 96271 54f2d9 20 API calls _abort 96265->96271 96267 54e47d 96272 5527ec 26 API calls ___std_exception_copy 96267->96272 96270->96262 96271->96267 96272->96270 96273->96270 96279 592e7a 96274->96279 96275 592d3b 96275->95918 96275->95935 96276 5250f5 40 API calls 96276->96279 96277 5928fe 27 API calls 96277->96279 96278 52511f 64 API calls 96278->96279 96279->96275 96279->96276 96279->96277 96279->96278 96281 5922d9 96280->96281 96283 5922e7 96280->96283 96282 54e5eb 29 API calls 96281->96282 96282->96283 96284 59232c 96283->96284 96285 54e5eb 29 API calls 96283->96285 96304 5922f0 96283->96304 96309 592557 96284->96309 96286 592311 96285->96286 96286->96284 96288 59231a 96286->96288 96292 54e678 67 API calls 96288->96292 96288->96304 96289 592370 96290 592395 96289->96290 96291 592374 96289->96291 96313 592171 96290->96313 96294 592381 96291->96294 96296 54e678 67 API calls 96291->96296 96292->96304 96297 54e678 67 API calls 96294->96297 96294->96304 96295 59239d 96298 5923c3 96295->96298 96299 5923a3 96295->96299 96296->96294 96297->96304 96320 5923f3 96298->96320 96301 5923b0 96299->96301 96302 54e678 67 API calls 96299->96302 96303 54e678 67 API calls 96301->96303 96301->96304 96302->96301 96303->96304 96304->95935 96305 5923de 96305->96304 96308 54e678 67 API calls 96305->96308 96306 5923ca 96306->96305 96328 54e678 96306->96328 96308->96304 96310 59257c 96309->96310 96311 592565 __fread_nolock 96309->96311 96312 54e8c4 __fread_nolock 40 API calls 96310->96312 96311->96289 96312->96311 96314 54ea0c ___std_exception_copy 21 API calls 96313->96314 96315 59217f 96314->96315 96316 54ea0c ___std_exception_copy 21 API calls 96315->96316 96317 592190 96316->96317 96318 54ea0c ___std_exception_copy 21 API calls 96317->96318 96319 59219c 96318->96319 96319->96295 96324 592408 96320->96324 96321 5924c0 96345 592724 96321->96345 96322 5921cc 40 API calls 96322->96324 96324->96321 96324->96322 96327 5924c7 96324->96327 96341 592606 96324->96341 96349 592269 40 API calls 96324->96349 96327->96306 96329 54e684 ___BuildCatchObject 96328->96329 96330 54e695 96329->96330 96331 54e6aa 96329->96331 96423 54f2d9 20 API calls _abort 96330->96423 96340 54e6a5 __fread_nolock 96331->96340 96406 54918d EnterCriticalSection 96331->96406 96334 54e69a 96424 5527ec 26 API calls ___std_exception_copy 96334->96424 96335 54e6c6 96407 54e602 96335->96407 96338 54e6d1 96425 54e6ee LeaveCriticalSection __fread_nolock 96338->96425 96340->96305 96342 592617 96341->96342 96343 59261d 96341->96343 96342->96343 96350 5926d7 96342->96350 96343->96324 96346 592742 96345->96346 96347 592731 96345->96347 96346->96327 96348 54dbb3 65 API calls 96347->96348 96348->96346 96349->96324 96351 592714 96350->96351 96352 592703 96350->96352 96351->96342 96354 54dbb3 96352->96354 96355 54dbc1 96354->96355 96360 54dbdd 96354->96360 96356 54dbe3 96355->96356 96357 54dbcd 96355->96357 96355->96360 96363 54d9cc 96356->96363 96366 54f2d9 20 API calls _abort 96357->96366 96360->96351 96361 54dbd2 96367 5527ec 26 API calls ___std_exception_copy 96361->96367 96368 54d97b 96363->96368 96365 54d9f0 96365->96360 96366->96361 96367->96360 96369 54d987 ___BuildCatchObject 96368->96369 96376 54918d EnterCriticalSection 96369->96376 96371 54d995 96377 54d9f4 96371->96377 96375 54d9b3 __fread_nolock 96375->96365 96376->96371 96385 5549a1 96377->96385 96383 54d9a2 96384 54d9c0 LeaveCriticalSection __fread_nolock 96383->96384 96384->96375 96386 54d955 __fread_nolock 26 API calls 96385->96386 96387 5549b0 96386->96387 96388 55f89b __fread_nolock 26 API calls 96387->96388 96389 5549b6 96388->96389 96390 553820 __fread_nolock 21 API calls 96389->96390 96393 54da09 96389->96393 96391 554a15 96390->96391 96392 5529c8 _free 20 API calls 96391->96392 96392->96393 96394 54da3a 96393->96394 96397 54da4c 96394->96397 96400 54da24 96394->96400 96395 54da5a 96396 54f2d9 __dosmaperr 20 API calls 96395->96396 96398 54da5f 96396->96398 96397->96395 96397->96400 96403 54da85 __fread_nolock 96397->96403 96399 5527ec ___std_exception_copy 26 API calls 96398->96399 96399->96400 96405 554a56 62 API calls 96400->96405 96401 54dc0b 62 API calls 96401->96403 96402 54d955 __fread_nolock 26 API calls 96402->96403 96403->96400 96403->96401 96403->96402 96404 5559be __wsopen_s 62 API calls 96403->96404 96404->96403 96405->96383 96406->96335 96408 54e624 96407->96408 96409 54e60f 96407->96409 96415 54e61f 96408->96415 96426 54dc0b 96408->96426 96451 54f2d9 20 API calls _abort 96409->96451 96411 54e614 96452 5527ec 26 API calls ___std_exception_copy 96411->96452 96415->96338 96418 54d955 __fread_nolock 26 API calls 96419 54e646 96418->96419 96436 55862f 96419->96436 96422 5529c8 _free 20 API calls 96422->96415 96423->96334 96424->96340 96425->96340 96427 54dc23 96426->96427 96431 54dc1f 96426->96431 96428 54d955 __fread_nolock 26 API calls 96427->96428 96427->96431 96429 54dc43 96428->96429 96453 5559be 96429->96453 96432 554d7a 96431->96432 96433 54e640 96432->96433 96434 554d90 96432->96434 96433->96418 96434->96433 96435 5529c8 _free 20 API calls 96434->96435 96435->96433 96437 558653 96436->96437 96438 55863e 96436->96438 96440 55868e 96437->96440 96444 55867a 96437->96444 96576 54f2c6 20 API calls _abort 96438->96576 96578 54f2c6 20 API calls _abort 96440->96578 96441 558643 96577 54f2d9 20 API calls _abort 96441->96577 96573 558607 96444->96573 96445 558693 96579 54f2d9 20 API calls _abort 96445->96579 96448 55869b 96580 5527ec 26 API calls ___std_exception_copy 96448->96580 96449 54e64c 96449->96415 96449->96422 96451->96411 96452->96415 96454 5559ca ___BuildCatchObject 96453->96454 96455 5559d2 96454->96455 96456 5559ea 96454->96456 96532 54f2c6 20 API calls _abort 96455->96532 96458 555a88 96456->96458 96462 555a1f 96456->96462 96537 54f2c6 20 API calls _abort 96458->96537 96459 5559d7 96533 54f2d9 20 API calls _abort 96459->96533 96478 555147 EnterCriticalSection 96462->96478 96463 555a8d 96538 54f2d9 20 API calls _abort 96463->96538 96466 555a25 96468 555a56 96466->96468 96469 555a41 96466->96469 96467 555a95 96539 5527ec 26 API calls ___std_exception_copy 96467->96539 96479 555aa9 96468->96479 96534 54f2d9 20 API calls _abort 96469->96534 96471 5559df __fread_nolock 96471->96431 96474 555a46 96535 54f2c6 20 API calls _abort 96474->96535 96475 555a51 96536 555a80 LeaveCriticalSection __wsopen_s 96475->96536 96478->96466 96480 555ad7 96479->96480 96507 555ad0 96479->96507 96481 555adb 96480->96481 96482 555afa 96480->96482 96547 54f2c6 20 API calls _abort 96481->96547 96486 555b4b 96482->96486 96487 555b2e 96482->96487 96485 555ae0 96548 54f2d9 20 API calls _abort 96485->96548 96490 555b61 96486->96490 96553 559424 28 API calls __fread_nolock 96486->96553 96550 54f2c6 20 API calls _abort 96487->96550 96488 555cb1 96488->96475 96540 55564e 96490->96540 96492 555ae7 96549 5527ec 26 API calls ___std_exception_copy 96492->96549 96495 555b33 96551 54f2d9 20 API calls _abort 96495->96551 96499 555b3b 96552 5527ec 26 API calls ___std_exception_copy 96499->96552 96500 555b6f 96505 555b95 96500->96505 96506 555b73 96500->96506 96501 555ba8 96503 555c02 WriteFile 96501->96503 96504 555bbc 96501->96504 96508 555c25 GetLastError 96503->96508 96514 555b8b 96503->96514 96510 555bc4 96504->96510 96511 555bf2 96504->96511 96555 55542e 45 API calls 3 library calls 96505->96555 96512 555c69 96506->96512 96554 5555e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 96506->96554 96564 540a8c 96507->96564 96508->96514 96515 555be2 96510->96515 96516 555bc9 96510->96516 96558 5556c4 7 API calls 2 library calls 96511->96558 96512->96507 96562 54f2d9 20 API calls _abort 96512->96562 96514->96507 96514->96512 96523 555c45 96514->96523 96557 555891 8 API calls 2 library calls 96515->96557 96516->96512 96520 555bd2 96516->96520 96522 555c8e 96526 555c60 96523->96526 96527 555c4c 96523->96527 96532->96459 96533->96471 96534->96474 96535->96475 96536->96471 96537->96463 96538->96467 96539->96471 96541 55f89b __fread_nolock 26 API calls 96540->96541 96542 55565e 96541->96542 96543 555663 96542->96543 96571 552d74 38 API calls 2 library calls 96542->96571 96543->96500 96543->96501 96545 555686 96545->96543 96546 5556a4 GetConsoleMode 96545->96546 96546->96543 96547->96485 96548->96492 96549->96507 96550->96495 96551->96499 96552->96507 96553->96490 96554->96514 96555->96514 96562->96522 96565 540a95 96564->96565 96566 540a97 IsProcessorFeaturePresent 96564->96566 96565->96488 96568 540c5d 96566->96568 96572 540c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96568->96572 96570 540d40 96570->96488 96571->96545 96572->96570 96581 558585 96573->96581 96575 55862b 96575->96449 96576->96441 96577->96449 96578->96445 96579->96448 96580->96449 96582 558591 ___BuildCatchObject 96581->96582 96592 555147 EnterCriticalSection 96582->96592 96584 55859f 96585 5585c6 96584->96585 96586 5585d1 96584->96586 96593 5586ae 96585->96593 96608 54f2d9 20 API calls _abort 96586->96608 96589 5585cc 96609 5585fb LeaveCriticalSection __wsopen_s 96589->96609 96591 5585ee __fread_nolock 96591->96575 96592->96584 96610 5553c4 96593->96610 96595 5586c4 96623 555333 21 API calls 2 library calls 96595->96623 96597 5586be 96597->96595 96598 5586f6 96597->96598 96601 5553c4 __wsopen_s 26 API calls 96597->96601 96598->96595 96599 5553c4 __wsopen_s 26 API calls 96598->96599 96602 558702 CloseHandle 96599->96602 96600 55871c 96603 55873e 96600->96603 96624 54f2a3 20 API calls __dosmaperr 96600->96624 96604 5586ed 96601->96604 96602->96595 96605 55870e GetLastError 96602->96605 96603->96589 96607 5553c4 __wsopen_s 26 API calls 96604->96607 96605->96595 96607->96598 96608->96589 96609->96591 96611 5553e6 96610->96611 96612 5553d1 96610->96612 96616 55540b 96611->96616 96627 54f2c6 20 API calls _abort 96611->96627 96625 54f2c6 20 API calls _abort 96612->96625 96615 5553d6 96626 54f2d9 20 API calls _abort 96615->96626 96616->96597 96617 555416 96628 54f2d9 20 API calls _abort 96617->96628 96619 5553de 96619->96597 96621 55541e 96629 5527ec 26 API calls ___std_exception_copy 96621->96629 96623->96600 96624->96603 96625->96615 96626->96619 96627->96617 96628->96621 96629->96619 96630 52105b 96635 52344d 96630->96635 96632 52106a 96666 5400a3 29 API calls __onexit 96632->96666 96634 521074 96636 52345d __wsopen_s 96635->96636 96637 52a961 22 API calls 96636->96637 96638 523513 96637->96638 96639 523a5a 24 API calls 96638->96639 96640 52351c 96639->96640 96667 523357 96640->96667 96643 5233c6 22 API calls 96644 523535 96643->96644 96645 52515f 22 API calls 96644->96645 96646 523544 96645->96646 96647 52a961 22 API calls 96646->96647 96648 52354d 96647->96648 96649 52a6c3 22 API calls 96648->96649 96650 523556 RegOpenKeyExW 96649->96650 96651 563176 RegQueryValueExW 96650->96651 96655 523578 96650->96655 96652 563193 96651->96652 96653 56320c RegCloseKey 96651->96653 96654 53fe0b 22 API calls 96652->96654 96653->96655 96662 56321e _wcslen 96653->96662 96656 5631ac 96654->96656 96655->96632 96657 525722 22 API calls 96656->96657 96658 5631b7 RegQueryValueExW 96657->96658 96659 5631d4 96658->96659 96661 5631ee ISource 96658->96661 96660 526b57 22 API calls 96659->96660 96660->96661 96661->96653 96662->96655 96663 529cb3 22 API calls 96662->96663 96664 52515f 22 API calls 96662->96664 96665 524c6d 22 API calls 96662->96665 96663->96662 96664->96662 96665->96662 96666->96634 96668 561f50 __wsopen_s 96667->96668 96669 523364 GetFullPathNameW 96668->96669 96670 523386 96669->96670 96671 526b57 22 API calls 96670->96671 96672 5233a4 96671->96672 96672->96643 96673 521098 96678 5242de 96673->96678 96677 5210a7 96679 52a961 22 API calls 96678->96679 96680 5242f5 GetVersionExW 96679->96680 96681 526b57 22 API calls 96680->96681 96682 524342 96681->96682 96683 5293b2 22 API calls 96682->96683 96692 524378 96682->96692 96684 52436c 96683->96684 96686 5237a0 22 API calls 96684->96686 96685 52441b GetCurrentProcess IsWow64Process 96687 524437 96685->96687 96686->96692 96688 563824 GetSystemInfo 96687->96688 96689 52444f LoadLibraryA 96687->96689 96690 524460 GetProcAddress 96689->96690 96691 52449c GetSystemInfo 96689->96691 96690->96691 96694 524470 GetNativeSystemInfo 96690->96694 96695 524476 96691->96695 96692->96685 96693 5637df 96692->96693 96694->96695 96696 52109d 96695->96696 96697 52447a FreeLibrary 96695->96697 96698 5400a3 29 API calls __onexit 96696->96698 96697->96696 96698->96677 96699 52f7bf 96700 52f7d3 96699->96700 96701 52fcb6 96699->96701 96703 52fcc2 96700->96703 96704 53fddb 22 API calls 96700->96704 96794 52aceb 23 API calls ISource 96701->96794 96795 52aceb 23 API calls ISource 96703->96795 96706 52f7e5 96704->96706 96706->96703 96707 52f83e 96706->96707 96708 52fd3d 96706->96708 96723 52ed9d ISource 96707->96723 96734 531310 96707->96734 96796 591155 22 API calls 96708->96796 96711 52fef7 96718 52a8c7 22 API calls 96711->96718 96711->96723 96714 574b0b 96798 59359c 82 API calls __wsopen_s 96714->96798 96715 574600 96719 52a8c7 22 API calls 96715->96719 96715->96723 96718->96723 96719->96723 96721 52a8c7 22 API calls 96731 52ec76 ISource 96721->96731 96722 540242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96722->96731 96724 52fbe3 96724->96723 96727 574bdc 96724->96727 96733 52f3ae ISource 96724->96733 96725 52a961 22 API calls 96725->96731 96726 5400a3 29 API calls pre_c_initialization 96726->96731 96799 59359c 82 API calls __wsopen_s 96727->96799 96729 574beb 96800 59359c 82 API calls __wsopen_s 96729->96800 96730 53fddb 22 API calls 96730->96731 96731->96711 96731->96714 96731->96715 96731->96721 96731->96722 96731->96723 96731->96724 96731->96725 96731->96726 96731->96729 96731->96730 96732 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96731->96732 96731->96733 96792 5301e0 235 API calls 2 library calls 96731->96792 96793 5306a0 41 API calls ISource 96731->96793 96732->96731 96733->96723 96797 59359c 82 API calls __wsopen_s 96733->96797 96735 5317b0 96734->96735 96736 531376 96734->96736 96914 540242 5 API calls __Init_thread_wait 96735->96914 96737 531390 96736->96737 96738 576331 96736->96738 96801 531940 96737->96801 96919 5a709c 235 API calls 96738->96919 96742 5317ba 96745 5317fb 96742->96745 96746 529cb3 22 API calls 96742->96746 96744 57633d 96744->96731 96749 576346 96745->96749 96751 53182c 96745->96751 96754 5317d4 96746->96754 96747 531940 9 API calls 96748 5313b6 96747->96748 96748->96745 96750 5313ec 96748->96750 96920 59359c 82 API calls __wsopen_s 96749->96920 96750->96749 96774 531408 __fread_nolock 96750->96774 96916 52aceb 23 API calls ISource 96751->96916 96915 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96754->96915 96755 531839 96917 53d217 235 API calls 96755->96917 96758 57636e 96921 59359c 82 API calls __wsopen_s 96758->96921 96759 53152f 96761 5763d1 96759->96761 96762 53153c 96759->96762 96923 5a5745 54 API calls _wcslen 96761->96923 96764 531940 9 API calls 96762->96764 96765 531549 96764->96765 96769 5764fa 96765->96769 96771 531940 9 API calls 96765->96771 96766 53fddb 22 API calls 96766->96774 96767 531872 96918 53faeb 23 API calls 96767->96918 96768 53fe0b 22 API calls 96768->96774 96778 576369 96769->96778 96924 59359c 82 API calls __wsopen_s 96769->96924 96776 531563 96771->96776 96773 52ec40 235 API calls 96773->96774 96774->96755 96774->96758 96774->96759 96774->96766 96774->96768 96774->96773 96775 5763b2 96774->96775 96774->96778 96922 59359c 82 API calls __wsopen_s 96775->96922 96776->96769 96779 52a8c7 22 API calls 96776->96779 96781 5315c7 ISource 96776->96781 96778->96731 96779->96781 96780 531940 9 API calls 96780->96781 96781->96767 96781->96769 96781->96778 96781->96780 96784 53167b ISource 96781->96784 96790 524f39 68 API calls 96781->96790 96811 5a958b 96781->96811 96814 5a959f 96781->96814 96817 596ef1 96781->96817 96897 59f0ec 96781->96897 96906 58d4ce 96781->96906 96909 591e96 96781->96909 96782 53171d 96782->96731 96784->96782 96913 53ce17 22 API calls ISource 96784->96913 96790->96781 96792->96731 96793->96731 96794->96703 96795->96708 96796->96723 96797->96723 96798->96723 96799->96729 96800->96723 96802 531981 96801->96802 96810 53195d 96801->96810 96925 540242 5 API calls __Init_thread_wait 96802->96925 96803 5313a0 96803->96747 96806 53198b 96806->96810 96926 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96806->96926 96807 538727 96807->96803 96928 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96807->96928 96810->96803 96927 540242 5 API calls __Init_thread_wait 96810->96927 96929 5a7f59 96811->96929 96813 5a959b 96813->96781 96815 5a7f59 120 API calls 96814->96815 96816 5a95af 96815->96816 96816->96781 96818 52a961 22 API calls 96817->96818 96819 596f1d 96818->96819 96820 52a961 22 API calls 96819->96820 96821 596f26 96820->96821 96822 596f3a 96821->96822 97213 52b567 39 API calls 96821->97213 96824 527510 53 API calls 96822->96824 96831 596f57 _wcslen 96824->96831 96825 596fbc 96827 527510 53 API calls 96825->96827 96826 5970bf 96828 524ecb 94 API calls 96826->96828 96829 596fc8 96827->96829 96830 5970d0 96828->96830 96834 52a8c7 22 API calls 96829->96834 96838 596fdb 96829->96838 96832 5970e5 96830->96832 96835 524ecb 94 API calls 96830->96835 96831->96825 96831->96826 96896 5970e9 96831->96896 96833 52a961 22 API calls 96832->96833 96832->96896 96836 59711a 96833->96836 96834->96838 96835->96832 96837 52a961 22 API calls 96836->96837 96841 597126 96837->96841 96839 597027 96838->96839 96842 597005 96838->96842 96845 52a8c7 22 API calls 96838->96845 96840 527510 53 API calls 96839->96840 96843 597034 96840->96843 96844 52a961 22 API calls 96841->96844 96846 5233c6 22 API calls 96842->96846 96847 59703d 96843->96847 96848 597047 96843->96848 96849 59712f 96844->96849 96845->96842 96850 59700f 96846->96850 96851 52a8c7 22 API calls 96847->96851 97214 58e199 GetFileAttributesW 96848->97214 96853 52a961 22 API calls 96849->96853 96854 527510 53 API calls 96850->96854 96851->96848 96856 597138 96853->96856 96857 59701b 96854->96857 96855 597050 96859 597063 96855->96859 96862 524c6d 22 API calls 96855->96862 96860 527510 53 API calls 96856->96860 96858 526350 22 API calls 96857->96858 96858->96839 96861 527510 53 API calls 96859->96861 96868 597069 96859->96868 96863 597145 96860->96863 96864 5970a0 96861->96864 96862->96859 97062 52525f 96863->97062 97215 58d076 57 API calls 96864->97215 96867 597166 96869 524c6d 22 API calls 96867->96869 96868->96896 96870 597175 96869->96870 96871 5971a9 96870->96871 96872 524c6d 22 API calls 96870->96872 96873 52a8c7 22 API calls 96871->96873 96874 597186 96872->96874 96875 5971ba 96873->96875 96874->96871 96877 526b57 22 API calls 96874->96877 96876 526350 22 API calls 96875->96876 96878 5971c8 96876->96878 96879 59719b 96877->96879 96880 526350 22 API calls 96878->96880 96881 526b57 22 API calls 96879->96881 96882 5971d6 96880->96882 96881->96871 96883 526350 22 API calls 96882->96883 96884 5971e4 96883->96884 96885 527510 53 API calls 96884->96885 96886 5971f0 96885->96886 97104 58d7bc 96886->97104 96888 597201 96889 58d4ce 4 API calls 96888->96889 96890 59720b 96889->96890 96891 527510 53 API calls 96890->96891 96895 597239 96890->96895 96892 597229 96891->96892 97158 592947 96892->97158 96894 524f39 68 API calls 96894->96896 96895->96894 96896->96781 96898 527510 53 API calls 96897->96898 96899 59f126 96898->96899 97225 529e90 96899->97225 96901 59f136 96902 59f15b 96901->96902 96903 52ec40 235 API calls 96901->96903 96905 59f15f 96902->96905 97253 529c6e 22 API calls 96902->97253 96903->96902 96905->96781 97269 58dbbe lstrlenW 96906->97269 96910 591e9f 96909->96910 96911 591ea4 96909->96911 97274 590f67 96910->97274 96911->96781 96913->96784 96914->96742 96915->96745 96916->96755 96917->96767 96918->96767 96919->96744 96920->96778 96921->96778 96922->96778 96923->96776 96924->96778 96925->96806 96926->96810 96927->96807 96928->96803 96967 527510 96929->96967 96933 5a844f 97031 5a8ee4 60 API calls 96933->97031 96936 5a7fd5 ISource 96936->96813 96937 5a845e 96939 5a846a 96937->96939 96940 5a828f 96937->96940 96938 5a8049 96938->96936 96941 527510 53 API calls 96938->96941 96953 5a8281 96938->96953 97022 58417d 22 API calls __fread_nolock 96938->97022 97023 5a851d 42 API calls _strftime 96938->97023 96939->96936 97003 5a7e86 96940->97003 96941->96938 96946 5a82c8 97018 53fc70 96946->97018 96949 5a82e8 97024 59359c 82 API calls __wsopen_s 96949->97024 96950 5a8302 97025 5263eb 22 API calls 96950->97025 96953->96933 96953->96940 96954 5a8311 97026 526a50 22 API calls 96954->97026 96955 5a82f3 GetCurrentProcess TerminateProcess 96955->96950 96957 5a832a 96966 5a8352 96957->96966 97027 5304f0 22 API calls 96957->97027 96959 5a84c5 96959->96936 96961 5a84d9 FreeLibrary 96959->96961 96960 5a8341 97028 5a8b7b 75 API calls 96960->97028 96961->96936 96966->96959 97029 5304f0 22 API calls 96966->97029 97030 52aceb 23 API calls ISource 96966->97030 97032 5a8b7b 75 API calls 96966->97032 96968 527525 96967->96968 96984 527522 96967->96984 96969 52755b 96968->96969 96970 52752d 96968->96970 96973 52756d 96969->96973 96979 5650f6 96969->96979 96982 56500f 96969->96982 97033 5451c6 26 API calls 96970->97033 97034 53fb21 51 API calls 96973->97034 96974 56510e 96974->96974 96976 53fddb 22 API calls 96980 527547 96976->96980 96977 52753d 96977->96976 97036 545183 26 API calls 96979->97036 96981 529cb3 22 API calls 96980->96981 96981->96984 96983 53fe0b 22 API calls 96982->96983 96989 565088 96982->96989 96985 565058 96983->96985 96984->96936 96990 5a8cd3 96984->96990 96986 53fddb 22 API calls 96985->96986 96987 56507f 96986->96987 96988 529cb3 22 API calls 96987->96988 96988->96989 97035 53fb21 51 API calls 96989->97035 96991 52aec9 22 API calls 96990->96991 96992 5a8cee CharLowerBuffW 96991->96992 97037 588e54 96992->97037 96996 52a961 22 API calls 96997 5a8d2a 96996->96997 97044 526d25 96997->97044 96999 5a8d3e 97000 5293b2 22 API calls 96999->97000 97002 5a8d48 _wcslen 97000->97002 97001 5a8e5e _wcslen 97001->96938 97002->97001 97057 5a851d 42 API calls _strftime 97002->97057 97004 5a7ea1 97003->97004 97008 5a7eec 97003->97008 97005 53fe0b 22 API calls 97004->97005 97006 5a7ec3 97005->97006 97007 53fddb 22 API calls 97006->97007 97006->97008 97007->97006 97009 5a9096 97008->97009 97010 5a92ab ISource 97009->97010 97017 5a90ba _strcat _wcslen 97009->97017 97010->96946 97011 52b567 39 API calls 97011->97017 97012 52b38f 39 API calls 97012->97017 97013 52b6b5 39 API calls 97013->97017 97014 54ea0c 21 API calls ___std_exception_copy 97014->97017 97015 527510 53 API calls 97015->97017 97017->97010 97017->97011 97017->97012 97017->97013 97017->97014 97017->97015 97061 58efae 24 API calls _wcslen 97017->97061 97020 53fc85 97018->97020 97019 53fd1d VirtualProtect 97021 53fceb 97019->97021 97020->97019 97020->97021 97021->96949 97021->96950 97022->96938 97023->96938 97024->96955 97025->96954 97026->96957 97027->96960 97028->96966 97029->96966 97030->96966 97031->96937 97032->96966 97033->96977 97034->96977 97035->96979 97036->96974 97038 588e74 _wcslen 97037->97038 97039 588f63 97038->97039 97042 588ea9 97038->97042 97043 588f68 97038->97043 97039->96996 97039->97002 97042->97039 97058 53ce60 41 API calls 97042->97058 97043->97039 97059 53ce60 41 API calls 97043->97059 97045 526d91 97044->97045 97046 526d34 97044->97046 97047 5293b2 22 API calls 97045->97047 97046->97045 97048 526d3f 97046->97048 97053 526d62 __fread_nolock 97047->97053 97049 526d5a 97048->97049 97050 564c9d 97048->97050 97060 526f34 22 API calls 97049->97060 97052 53fddb 22 API calls 97050->97052 97054 564ca7 97052->97054 97053->96999 97055 53fe0b 22 API calls 97054->97055 97056 564cda 97055->97056 97057->97001 97058->97042 97059->97043 97060->97053 97061->97017 97063 52a961 22 API calls 97062->97063 97064 525275 97063->97064 97065 52a961 22 API calls 97064->97065 97066 52527d 97065->97066 97067 52a961 22 API calls 97066->97067 97068 525285 97067->97068 97069 52a961 22 API calls 97068->97069 97070 52528d 97069->97070 97071 563df5 97070->97071 97072 5252c1 97070->97072 97073 52a8c7 22 API calls 97071->97073 97074 526d25 22 API calls 97072->97074 97075 563dfe 97073->97075 97076 5252cf 97074->97076 97077 52a6c3 22 API calls 97075->97077 97078 5293b2 22 API calls 97076->97078 97081 525304 97077->97081 97079 5252d9 97078->97079 97079->97081 97082 526d25 22 API calls 97079->97082 97080 525349 97084 526d25 22 API calls 97080->97084 97081->97080 97083 525325 97081->97083 97099 563e20 97081->97099 97085 5252fa 97082->97085 97083->97080 97088 524c6d 22 API calls 97083->97088 97086 52535a 97084->97086 97087 5293b2 22 API calls 97085->97087 97089 525370 97086->97089 97093 52a8c7 22 API calls 97086->97093 97087->97081 97091 525332 97088->97091 97090 525384 97089->97090 97095 52a8c7 22 API calls 97089->97095 97094 52538f 97090->97094 97097 52a8c7 22 API calls 97090->97097 97091->97080 97096 526d25 22 API calls 97091->97096 97092 526b57 22 API calls 97101 563ee0 97092->97101 97093->97089 97098 52a8c7 22 API calls 97094->97098 97102 52539a 97094->97102 97095->97090 97096->97080 97097->97094 97098->97102 97099->97092 97100 524c6d 22 API calls 97100->97101 97101->97080 97101->97100 97216 5249bd 22 API calls __fread_nolock 97101->97216 97102->96867 97105 58d7d8 97104->97105 97106 58d7dd 97105->97106 97107 58d7f3 97105->97107 97109 58d7ee 97106->97109 97111 52a8c7 22 API calls 97106->97111 97108 52a961 22 API calls 97107->97108 97110 58d7fb 97108->97110 97109->96888 97112 52a961 22 API calls 97110->97112 97111->97109 97113 58d803 97112->97113 97114 52a961 22 API calls 97113->97114 97115 58d80e 97114->97115 97116 52a961 22 API calls 97115->97116 97117 58d816 97116->97117 97118 52a961 22 API calls 97117->97118 97119 58d81e 97118->97119 97120 52a961 22 API calls 97119->97120 97121 58d826 97120->97121 97122 52a961 22 API calls 97121->97122 97123 58d82e 97122->97123 97124 52a961 22 API calls 97123->97124 97125 58d836 97124->97125 97126 52525f 22 API calls 97125->97126 97127 58d84d 97126->97127 97128 52525f 22 API calls 97127->97128 97129 58d866 97128->97129 97130 524c6d 22 API calls 97129->97130 97131 58d872 97130->97131 97132 58d885 97131->97132 97133 5293b2 22 API calls 97131->97133 97134 524c6d 22 API calls 97132->97134 97133->97132 97135 58d88e 97134->97135 97136 58d89e 97135->97136 97137 5293b2 22 API calls 97135->97137 97138 58d8b0 97136->97138 97139 52a8c7 22 API calls 97136->97139 97137->97136 97140 526350 22 API calls 97138->97140 97139->97138 97141 58d8bb 97140->97141 97217 58d978 22 API calls 97141->97217 97143 58d8ca 97218 58d978 22 API calls 97143->97218 97145 58d8dd 97146 524c6d 22 API calls 97145->97146 97147 58d8e7 97146->97147 97148 58d8ec 97147->97148 97149 58d8fe 97147->97149 97150 5233c6 22 API calls 97148->97150 97151 524c6d 22 API calls 97149->97151 97152 58d8f9 97150->97152 97153 58d907 97151->97153 97156 526350 22 API calls 97152->97156 97154 58d925 97153->97154 97155 5233c6 22 API calls 97153->97155 97157 526350 22 API calls 97154->97157 97155->97152 97156->97154 97157->97109 97159 592954 __wsopen_s 97158->97159 97160 53fe0b 22 API calls 97159->97160 97161 592971 97160->97161 97162 525722 22 API calls 97161->97162 97163 59297b 97162->97163 97164 59274e 27 API calls 97163->97164 97165 592986 97164->97165 97166 52511f 64 API calls 97165->97166 97167 59299b 97166->97167 97168 592a6c 97167->97168 97169 5929bf 97167->97169 97170 592e66 75 API calls 97168->97170 97171 592e66 75 API calls 97169->97171 97186 592a38 97170->97186 97172 5929c4 97171->97172 97179 592a75 ISource 97172->97179 97223 54d583 26 API calls 97172->97223 97174 5250f5 40 API calls 97175 592a91 97174->97175 97176 5250f5 40 API calls 97175->97176 97178 592aa1 97176->97178 97177 5929ed 97224 54d583 26 API calls 97177->97224 97180 5250f5 40 API calls 97178->97180 97179->96895 97182 592abc 97180->97182 97183 5250f5 40 API calls 97182->97183 97184 592acc 97183->97184 97185 5250f5 40 API calls 97184->97185 97187 592ae7 97185->97187 97186->97174 97186->97179 97188 5250f5 40 API calls 97187->97188 97189 592af7 97188->97189 97190 5250f5 40 API calls 97189->97190 97191 592b07 97190->97191 97192 5250f5 40 API calls 97191->97192 97193 592b17 97192->97193 97219 593017 GetTempPathW GetTempFileNameW 97193->97219 97195 592b22 97196 54e5eb 29 API calls 97195->97196 97207 592b33 97196->97207 97197 592bed 97198 54e678 67 API calls 97197->97198 97199 592bf8 97198->97199 97201 592bfe DeleteFileW 97199->97201 97202 592c12 97199->97202 97200 5250f5 40 API calls 97200->97207 97201->97179 97203 592c91 CopyFileW 97202->97203 97209 592c18 97202->97209 97204 592cb9 DeleteFileW 97203->97204 97205 592ca7 DeleteFileW 97203->97205 97220 592fd8 CreateFileW 97204->97220 97205->97179 97207->97179 97207->97197 97207->97200 97208 54dbb3 65 API calls 97207->97208 97208->97207 97210 5922ce 79 API calls 97209->97210 97211 592c7c 97210->97211 97211->97204 97212 592c80 DeleteFileW 97211->97212 97212->97179 97213->96822 97214->96855 97215->96868 97216->97101 97217->97143 97218->97145 97219->97195 97221 592fff SetFileTime CloseHandle 97220->97221 97222 593013 97220->97222 97221->97222 97222->97179 97223->97177 97224->97186 97226 526270 22 API calls 97225->97226 97252 529eb5 97226->97252 97227 529fd2 97255 52a4a1 97227->97255 97229 529fec 97229->96901 97232 56f699 97239 53fddb 22 API calls 97232->97239 97233 56f7c4 97267 5896e2 84 API calls __wsopen_s 97233->97267 97235 52a405 97235->97229 97268 5896e2 84 API calls __wsopen_s 97235->97268 97237 52a6c3 22 API calls 97237->97252 97242 56f754 97239->97242 97240 56f7d2 97241 52a4a1 22 API calls 97240->97241 97243 56f7e8 97241->97243 97244 53fe0b 22 API calls 97242->97244 97243->97229 97246 52a12c __fread_nolock 97244->97246 97246->97233 97246->97235 97247 52a587 22 API calls 97247->97252 97248 52aec9 22 API calls 97250 52a0db CharUpperBuffW 97248->97250 97249 52a4a1 22 API calls 97249->97252 97263 52a673 22 API calls 97250->97263 97252->97227 97252->97232 97252->97233 97252->97235 97252->97237 97252->97246 97252->97247 97252->97248 97252->97249 97254 524573 41 API calls _wcslen 97252->97254 97264 5248c8 23 API calls 97252->97264 97265 5249bd 22 API calls __fread_nolock 97252->97265 97266 52a673 22 API calls 97252->97266 97253->96905 97254->97252 97256 52a52b 97255->97256 97261 52a4b1 __fread_nolock 97255->97261 97258 53fe0b 22 API calls 97256->97258 97257 53fddb 22 API calls 97259 52a4b8 97257->97259 97258->97261 97260 53fddb 22 API calls 97259->97260 97262 52a4d6 97259->97262 97260->97262 97261->97257 97262->97229 97263->97252 97264->97252 97265->97252 97266->97252 97267->97240 97268->97229 97270 58dbdc GetFileAttributesW 97269->97270 97271 58d4d5 97269->97271 97270->97271 97272 58dbe8 FindFirstFileW 97270->97272 97271->96781 97272->97271 97273 58dbf9 FindClose 97272->97273 97273->97271 97275 590f7e 97274->97275 97291 591097 97274->97291 97276 590f9e 97275->97276 97277 590fcb 97275->97277 97280 590fe2 97275->97280 97276->97277 97282 590fb2 97276->97282 97278 53fe0b 22 API calls 97277->97278 97287 590fc0 __fread_nolock 97278->97287 97279 590fff 97279->97282 97283 591026 97279->97283 97279->97287 97280->97279 97281 53fe0b 22 API calls 97280->97281 97281->97279 97284 53fe0b 22 API calls 97282->97284 97285 53fe0b 22 API calls 97283->97285 97284->97287 97288 59102c 97285->97288 97286 53fddb 22 API calls 97286->97291 97287->97286 97293 53f1d8 22 API calls 97288->97293 97290 591038 97294 53f6c9 24 API calls 97290->97294 97291->96911 97293->97290 97294->97287 97295 5590fa 97296 559107 97295->97296 97301 55911f 97295->97301 97345 54f2d9 20 API calls _abort 97296->97345 97298 55910c 97346 5527ec 26 API calls ___std_exception_copy 97298->97346 97300 559117 97301->97300 97302 55917a 97301->97302 97347 55fdc4 21 API calls 2 library calls 97301->97347 97304 54d955 __fread_nolock 26 API calls 97302->97304 97305 559192 97304->97305 97315 558c32 97305->97315 97307 559199 97307->97300 97308 54d955 __fread_nolock 26 API calls 97307->97308 97309 5591c5 97308->97309 97309->97300 97310 54d955 __fread_nolock 26 API calls 97309->97310 97311 5591d3 97310->97311 97311->97300 97312 54d955 __fread_nolock 26 API calls 97311->97312 97313 5591e3 97312->97313 97314 54d955 __fread_nolock 26 API calls 97313->97314 97314->97300 97316 558c3e ___BuildCatchObject 97315->97316 97317 558c46 97316->97317 97318 558c5e 97316->97318 97349 54f2c6 20 API calls _abort 97317->97349 97319 558d24 97318->97319 97323 558c97 97318->97323 97356 54f2c6 20 API calls _abort 97319->97356 97322 558c4b 97350 54f2d9 20 API calls _abort 97322->97350 97326 558ca6 97323->97326 97327 558cbb 97323->97327 97324 558d29 97357 54f2d9 20 API calls _abort 97324->97357 97351 54f2c6 20 API calls _abort 97326->97351 97348 555147 EnterCriticalSection 97327->97348 97331 558cb3 97358 5527ec 26 API calls ___std_exception_copy 97331->97358 97332 558cab 97352 54f2d9 20 API calls _abort 97332->97352 97333 558cc1 97335 558cf2 97333->97335 97336 558cdd 97333->97336 97339 558d45 __fread_nolock 38 API calls 97335->97339 97353 54f2d9 20 API calls _abort 97336->97353 97338 558c53 __fread_nolock 97338->97307 97341 558ced 97339->97341 97355 558d1c LeaveCriticalSection __wsopen_s 97341->97355 97342 558ce2 97354 54f2c6 20 API calls _abort 97342->97354 97345->97298 97346->97300 97347->97302 97348->97333 97349->97322 97350->97338 97351->97332 97352->97331 97353->97342 97354->97341 97355->97338 97356->97324 97357->97331 97358->97338 97359 5403fb 97360 540407 ___BuildCatchObject 97359->97360 97388 53feb1 97360->97388 97362 54040e 97363 540561 97362->97363 97366 540438 97362->97366 97415 54083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97363->97415 97365 540568 97416 544e52 28 API calls _abort 97365->97416 97376 540477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97366->97376 97399 55247d 97366->97399 97368 54056e 97417 544e04 28 API calls _abort 97368->97417 97372 540576 97373 540457 97375 5404d8 97407 540959 97375->97407 97376->97375 97411 544e1a 38 API calls 3 library calls 97376->97411 97379 5404de 97380 5404f3 97379->97380 97412 540992 GetModuleHandleW 97380->97412 97382 5404fa 97382->97365 97383 5404fe 97382->97383 97384 540507 97383->97384 97413 544df5 28 API calls _abort 97383->97413 97414 540040 13 API calls 2 library calls 97384->97414 97387 54050f 97387->97373 97389 53feba 97388->97389 97418 540698 IsProcessorFeaturePresent 97389->97418 97391 53fec6 97419 542c94 10 API calls 3 library calls 97391->97419 97393 53fecb 97394 53fecf 97393->97394 97420 552317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97393->97420 97394->97362 97396 53fed8 97397 53fee6 97396->97397 97421 542cbd 8 API calls 3 library calls 97396->97421 97397->97362 97401 552494 97399->97401 97400 540a8c _ValidateLocalCookies 5 API calls 97402 540451 97400->97402 97401->97400 97402->97373 97403 552421 97402->97403 97405 552450 97403->97405 97404 540a8c _ValidateLocalCookies 5 API calls 97406 552479 97404->97406 97405->97404 97406->97376 97422 542340 97407->97422 97410 54097f 97410->97379 97411->97375 97412->97382 97413->97384 97414->97387 97415->97365 97416->97368 97417->97372 97418->97391 97419->97393 97420->97396 97421->97394 97423 54096c GetStartupInfoW 97422->97423 97423->97410 97424 522de3 97425 522df0 __wsopen_s 97424->97425 97426 522e09 97425->97426 97427 562c2b ___scrt_fastfail 97425->97427 97428 523aa2 23 API calls 97426->97428 97429 562c47 GetOpenFileNameW 97427->97429 97430 522e12 97428->97430 97432 562c96 97429->97432 97440 522da5 97430->97440 97434 526b57 22 API calls 97432->97434 97436 562cab 97434->97436 97436->97436 97437 522e27 97458 5244a8 97437->97458 97441 561f50 __wsopen_s 97440->97441 97442 522db2 GetLongPathNameW 97441->97442 97443 526b57 22 API calls 97442->97443 97444 522dda 97443->97444 97445 523598 97444->97445 97446 52a961 22 API calls 97445->97446 97447 5235aa 97446->97447 97448 523aa2 23 API calls 97447->97448 97449 5235b5 97448->97449 97450 5235c0 97449->97450 97454 5632eb 97449->97454 97451 52515f 22 API calls 97450->97451 97453 5235cc 97451->97453 97488 5235f3 97453->97488 97456 56330d 97454->97456 97494 53ce60 41 API calls 97454->97494 97457 5235df 97457->97437 97459 524ecb 94 API calls 97458->97459 97460 5244cd 97459->97460 97461 563833 97460->97461 97462 524ecb 94 API calls 97460->97462 97463 592cf9 80 API calls 97461->97463 97464 5244e1 97462->97464 97465 563848 97463->97465 97464->97461 97466 5244e9 97464->97466 97467 56384c 97465->97467 97468 563869 97465->97468 97470 563854 97466->97470 97471 5244f5 97466->97471 97472 524f39 68 API calls 97467->97472 97469 53fe0b 22 API calls 97468->97469 97480 5638ae 97469->97480 97502 58da5a 82 API calls 97470->97502 97501 52940c 136 API calls 2 library calls 97471->97501 97472->97470 97475 522e31 97476 563862 97476->97468 97477 563a5f 97483 563a67 97477->97483 97478 524f39 68 API calls 97478->97483 97479 52a4a1 22 API calls 97479->97480 97480->97477 97480->97479 97480->97483 97485 529cb3 22 API calls 97480->97485 97495 523ff7 97480->97495 97503 58967e 22 API calls __fread_nolock 97480->97503 97504 5895ad 42 API calls _wcslen 97480->97504 97505 590b5a 22 API calls 97480->97505 97483->97478 97506 58989b 82 API calls __wsopen_s 97483->97506 97485->97480 97489 523605 97488->97489 97493 523624 __fread_nolock 97488->97493 97491 53fe0b 22 API calls 97489->97491 97490 53fddb 22 API calls 97492 52363b 97490->97492 97491->97493 97492->97457 97493->97490 97494->97454 97496 52400a 97495->97496 97498 5240ae 97495->97498 97497 53fe0b 22 API calls 97496->97497 97500 52403c 97496->97500 97497->97500 97498->97480 97499 53fddb 22 API calls 97499->97500 97500->97498 97500->97499 97501->97475 97502->97476 97503->97480 97504->97480 97505->97480 97506->97483 97507 562ba5 97508 522b25 97507->97508 97509 562baf 97507->97509 97535 522b83 7 API calls 97508->97535 97510 523a5a 24 API calls 97509->97510 97512 562bb8 97510->97512 97515 529cb3 22 API calls 97512->97515 97517 562bc6 97515->97517 97516 522b2f 97520 523837 49 API calls 97516->97520 97522 522b44 97516->97522 97518 562bf5 97517->97518 97519 562bce 97517->97519 97523 5233c6 22 API calls 97518->97523 97521 5233c6 22 API calls 97519->97521 97520->97522 97524 562bd9 97521->97524 97527 522b5f 97522->97527 97539 5230f2 Shell_NotifyIconW ___scrt_fastfail 97522->97539 97525 562bf1 GetForegroundWindow ShellExecuteW 97523->97525 97526 526350 22 API calls 97524->97526 97531 562c26 97525->97531 97529 562be7 97526->97529 97533 522b66 SetCurrentDirectoryW 97527->97533 97532 5233c6 22 API calls 97529->97532 97531->97527 97532->97525 97534 522b7a 97533->97534 97540 522cd4 7 API calls 97535->97540 97537 522b2a 97538 522c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97537->97538 97538->97516 97539->97527 97540->97537 97541 573a41 97545 5910c0 97541->97545 97543 573a4c 97544 5910c0 53 API calls 97543->97544 97544->97543 97546 5910fa 97545->97546 97550 5910cd 97545->97550 97546->97543 97547 5910fc 97557 53fa11 53 API calls 97547->97557 97548 591101 97551 527510 53 API calls 97548->97551 97550->97546 97550->97547 97550->97548 97554 5910f4 97550->97554 97552 591108 97551->97552 97553 526350 22 API calls 97552->97553 97553->97546 97556 52b270 39 API calls 97554->97556 97556->97546 97557->97548 97558 521044 97563 5210f3 97558->97563 97560 52104a 97599 5400a3 29 API calls __onexit 97560->97599 97562 521054 97600 521398 97563->97600 97567 52116a 97568 52a961 22 API calls 97567->97568 97569 521174 97568->97569 97570 52a961 22 API calls 97569->97570 97571 52117e 97570->97571 97572 52a961 22 API calls 97571->97572 97573 521188 97572->97573 97574 52a961 22 API calls 97573->97574 97575 5211c6 97574->97575 97576 52a961 22 API calls 97575->97576 97577 521292 97576->97577 97610 52171c 97577->97610 97581 5212c4 97582 52a961 22 API calls 97581->97582 97583 5212ce 97582->97583 97584 531940 9 API calls 97583->97584 97585 5212f9 97584->97585 97631 521aab 97585->97631 97587 521315 97588 521325 GetStdHandle 97587->97588 97589 562485 97588->97589 97590 52137a 97588->97590 97589->97590 97591 56248e 97589->97591 97593 521387 OleInitialize 97590->97593 97592 53fddb 22 API calls 97591->97592 97594 562495 97592->97594 97593->97560 97638 59011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97594->97638 97596 56249e 97639 590944 CreateThread 97596->97639 97598 5624aa CloseHandle 97598->97590 97599->97562 97640 5213f1 97600->97640 97603 5213f1 22 API calls 97604 5213d0 97603->97604 97605 52a961 22 API calls 97604->97605 97606 5213dc 97605->97606 97607 526b57 22 API calls 97606->97607 97608 521129 97607->97608 97609 521bc3 6 API calls 97608->97609 97609->97567 97611 52a961 22 API calls 97610->97611 97612 52172c 97611->97612 97613 52a961 22 API calls 97612->97613 97614 521734 97613->97614 97615 52a961 22 API calls 97614->97615 97616 52174f 97615->97616 97617 53fddb 22 API calls 97616->97617 97618 52129c 97617->97618 97619 521b4a 97618->97619 97620 521b58 97619->97620 97621 52a961 22 API calls 97620->97621 97622 521b63 97621->97622 97623 52a961 22 API calls 97622->97623 97624 521b6e 97623->97624 97625 52a961 22 API calls 97624->97625 97626 521b79 97625->97626 97627 52a961 22 API calls 97626->97627 97628 521b84 97627->97628 97629 53fddb 22 API calls 97628->97629 97630 521b96 RegisterWindowMessageW 97629->97630 97630->97581 97632 521abb 97631->97632 97633 56272d 97631->97633 97634 53fddb 22 API calls 97632->97634 97647 593209 23 API calls 97633->97647 97637 521ac3 97634->97637 97636 562738 97637->97587 97638->97596 97639->97598 97648 59092a 28 API calls 97639->97648 97641 52a961 22 API calls 97640->97641 97642 5213fc 97641->97642 97643 52a961 22 API calls 97642->97643 97644 521404 97643->97644 97645 52a961 22 API calls 97644->97645 97646 5213c6 97645->97646 97646->97603 97647->97636 97649 558402 97650 558418 97649->97650 97651 55842a 97650->97651 97653 560984 97650->97653 97656 560081 97653->97656 97655 56099f 97655->97651 97659 56008d ___BuildCatchObject 97656->97659 97657 56009b 97714 54f2d9 20 API calls _abort 97657->97714 97659->97657 97661 5600d4 97659->97661 97660 5600a0 97715 5527ec 26 API calls ___std_exception_copy 97660->97715 97667 56065b 97661->97667 97664 5600aa __fread_nolock 97664->97655 97717 56042f 97667->97717 97670 5606a6 97735 555221 97670->97735 97671 56068d 97749 54f2c6 20 API calls _abort 97671->97749 97674 5606ab 97675 5606b4 97674->97675 97676 5606cb 97674->97676 97751 54f2c6 20 API calls _abort 97675->97751 97748 56039a CreateFileW 97676->97748 97680 5606b9 97752 54f2d9 20 API calls _abort 97680->97752 97681 560704 97683 560781 GetFileType 97681->97683 97685 560756 GetLastError 97681->97685 97753 56039a CreateFileW 97681->97753 97684 56078c GetLastError 97683->97684 97688 5607d3 97683->97688 97755 54f2a3 20 API calls __dosmaperr 97684->97755 97754 54f2a3 20 API calls __dosmaperr 97685->97754 97757 55516a 21 API calls 2 library calls 97688->97757 97690 560692 97750 54f2d9 20 API calls _abort 97690->97750 97691 56079a CloseHandle 97691->97690 97694 5607c3 97691->97694 97692 560749 97692->97683 97692->97685 97756 54f2d9 20 API calls _abort 97694->97756 97695 5607f4 97697 560840 97695->97697 97758 5605ab 72 API calls 3 library calls 97695->97758 97702 56086d 97697->97702 97759 56014d 72 API calls 4 library calls 97697->97759 97698 5607c8 97698->97690 97701 560866 97701->97702 97703 56087e 97701->97703 97704 5586ae __wsopen_s 29 API calls 97702->97704 97705 5600f8 97703->97705 97706 5608fc CloseHandle 97703->97706 97704->97705 97716 560121 LeaveCriticalSection __wsopen_s 97705->97716 97760 56039a CreateFileW 97706->97760 97708 560927 97709 56095d 97708->97709 97710 560931 GetLastError 97708->97710 97709->97705 97761 54f2a3 20 API calls __dosmaperr 97710->97761 97712 56093d 97762 555333 21 API calls 2 library calls 97712->97762 97714->97660 97715->97664 97716->97664 97718 560450 97717->97718 97723 56046a 97717->97723 97718->97723 97770 54f2d9 20 API calls _abort 97718->97770 97721 56045f 97771 5527ec 26 API calls ___std_exception_copy 97721->97771 97763 5603bf 97723->97763 97724 5604d1 97733 560524 97724->97733 97774 54d70d 26 API calls 2 library calls 97724->97774 97725 5604a2 97725->97724 97772 54f2d9 20 API calls _abort 97725->97772 97728 56051f 97730 56059e 97728->97730 97728->97733 97729 5604c6 97773 5527ec 26 API calls ___std_exception_copy 97729->97773 97775 5527fc 11 API calls _abort 97730->97775 97733->97670 97733->97671 97734 5605aa 97736 55522d ___BuildCatchObject 97735->97736 97778 552f5e EnterCriticalSection 97736->97778 97738 55527b 97779 55532a 97738->97779 97739 555234 97739->97738 97740 555259 97739->97740 97745 5552c7 EnterCriticalSection 97739->97745 97782 555000 21 API calls 3 library calls 97740->97782 97743 5552a4 __fread_nolock 97743->97674 97744 55525e 97744->97738 97783 555147 EnterCriticalSection 97744->97783 97745->97738 97746 5552d4 LeaveCriticalSection 97745->97746 97746->97739 97748->97681 97749->97690 97750->97705 97751->97680 97752->97690 97753->97692 97754->97690 97755->97691 97756->97698 97757->97695 97758->97697 97759->97701 97760->97708 97761->97712 97762->97709 97765 5603d7 97763->97765 97764 5603f2 97764->97725 97765->97764 97776 54f2d9 20 API calls _abort 97765->97776 97767 560416 97777 5527ec 26 API calls ___std_exception_copy 97767->97777 97769 560421 97769->97725 97770->97721 97771->97723 97772->97729 97773->97724 97774->97728 97775->97734 97776->97767 97777->97769 97778->97739 97784 552fa6 LeaveCriticalSection 97779->97784 97781 555331 97781->97743 97782->97744 97783->97738 97784->97781 97785 572a00 97800 52d7b0 ISource 97785->97800 97786 52db11 PeekMessageW 97786->97800 97787 52d807 GetInputState 97787->97786 97787->97800 97789 571cbe TranslateAcceleratorW 97789->97800 97790 52da04 timeGetTime 97790->97800 97791 52db73 TranslateMessage DispatchMessageW 97792 52db8f PeekMessageW 97791->97792 97792->97800 97793 52dbaf Sleep 97815 52dbc0 97793->97815 97794 572b74 Sleep 97794->97815 97795 53e551 timeGetTime 97795->97815 97796 571dda timeGetTime 97852 53e300 23 API calls 97796->97852 97799 572c0b GetExitCodeProcess 97803 572c37 CloseHandle 97799->97803 97804 572c21 WaitForSingleObject 97799->97804 97800->97786 97800->97787 97800->97789 97800->97790 97800->97791 97800->97792 97800->97793 97800->97794 97800->97796 97806 52d9d5 97800->97806 97812 52ec40 235 API calls 97800->97812 97813 531310 235 API calls 97800->97813 97814 52bf40 235 API calls 97800->97814 97817 52dd50 97800->97817 97824 52dfd0 97800->97824 97847 53edf6 97800->97847 97853 593a2a 23 API calls 97800->97853 97854 59359c 82 API calls __wsopen_s 97800->97854 97801 5b29bf GetForegroundWindow 97801->97815 97803->97815 97804->97800 97804->97803 97805 572a31 97805->97806 97807 572ca9 Sleep 97807->97800 97812->97800 97813->97800 97814->97800 97815->97795 97815->97799 97815->97800 97815->97801 97815->97805 97815->97806 97815->97807 97855 5a5658 23 API calls 97815->97855 97856 58e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97815->97856 97857 58d4dc 47 API calls 97815->97857 97818 52dd6f 97817->97818 97820 52dd83 97817->97820 97858 52d260 235 API calls 2 library calls 97818->97858 97859 59359c 82 API calls __wsopen_s 97820->97859 97821 52dd7a 97821->97800 97823 572f75 97823->97823 97826 52e010 97824->97826 97825 52ec40 235 API calls 97836 52e0dc ISource 97825->97836 97826->97836 97862 540242 5 API calls __Init_thread_wait 97826->97862 97829 572fca 97831 52a961 22 API calls 97829->97831 97829->97836 97830 52a961 22 API calls 97830->97836 97834 572fe4 97831->97834 97863 5400a3 29 API calls __onexit 97834->97863 97836->97825 97836->97830 97841 52a8c7 22 API calls 97836->97841 97842 59359c 82 API calls 97836->97842 97843 5304f0 22 API calls 97836->97843 97844 52e3e1 97836->97844 97860 52a81b 41 API calls 97836->97860 97861 53a308 235 API calls 97836->97861 97865 540242 5 API calls __Init_thread_wait 97836->97865 97866 5400a3 29 API calls __onexit 97836->97866 97867 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97836->97867 97868 5a47d4 235 API calls 97836->97868 97869 5a68c1 235 API calls 97836->97869 97837 572fee 97864 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97837->97864 97841->97836 97842->97836 97843->97836 97844->97800 97848 53ee09 97847->97848 97849 53ee12 97847->97849 97848->97800 97849->97848 97850 53ee36 IsDialogMessageW 97849->97850 97851 57efaf GetClassLongW 97849->97851 97850->97848 97850->97849 97851->97849 97851->97850 97852->97800 97853->97800 97854->97800 97855->97815 97856->97815 97857->97815 97858->97821 97859->97823 97860->97836 97861->97836 97862->97829 97863->97837 97864->97836 97865->97836 97866->97836 97867->97836 97868->97836 97869->97836 97870 52dee5 97873 52b710 97870->97873 97874 52b72b 97873->97874 97875 570146 97874->97875 97876 5700f8 97874->97876 97898 52b750 97874->97898 97915 5a58a2 235 API calls 2 library calls 97875->97915 97879 570102 97876->97879 97882 57010f 97876->97882 97876->97898 97913 5a5d33 235 API calls 97879->97913 97894 52ba20 97882->97894 97914 5a61d0 235 API calls 2 library calls 97882->97914 97885 5703d9 97885->97885 97889 52ba4e 97890 570322 97918 5a5c0c 82 API calls 97890->97918 97894->97889 97919 59359c 82 API calls __wsopen_s 97894->97919 97898->97889 97898->97890 97898->97894 97899 52bbe0 40 API calls 97898->97899 97900 53d336 40 API calls 97898->97900 97901 52ec40 235 API calls 97898->97901 97902 52a8c7 22 API calls 97898->97902 97904 52a81b 41 API calls 97898->97904 97905 53d2f0 40 API calls 97898->97905 97906 53a01b 235 API calls 97898->97906 97907 540242 5 API calls __Init_thread_wait 97898->97907 97908 53edcd 22 API calls 97898->97908 97909 5400a3 29 API calls __onexit 97898->97909 97910 5401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97898->97910 97911 53ee53 82 API calls 97898->97911 97912 53e5ca 235 API calls 97898->97912 97916 52aceb 23 API calls ISource 97898->97916 97917 57f6bf 23 API calls 97898->97917 97899->97898 97900->97898 97901->97898 97902->97898 97904->97898 97905->97898 97906->97898 97907->97898 97908->97898 97909->97898 97910->97898 97911->97898 97912->97898 97913->97882 97914->97894 97915->97898 97916->97898 97917->97898 97918->97894 97919->97885 97920 13e6340 97934 13e3f90 97920->97934 97922 13e63f0 97937 13e6230 97922->97937 97940 13e7420 GetPEB 97934->97940 97936 13e461b 97936->97922 97938 13e6239 Sleep 97937->97938 97939 13e6247 97938->97939 97941 13e744a 97940->97941 97941->97936 97942 521cad SystemParametersInfoW

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 234 5242de-52434d call 52a961 GetVersionExW call 526b57 239 563617-56362a 234->239 240 524353 234->240 242 56362b-56362f 239->242 241 524355-524357 240->241 245 563656 241->245 246 52435d-5243bc call 5293b2 call 5237a0 241->246 243 563632-56363e 242->243 244 563631 242->244 243->242 247 563640-563642 243->247 244->243 250 56365d-563660 245->250 263 5243c2-5243c4 246->263 264 5637df-5637e6 246->264 247->241 249 563648-56364f 247->249 249->239 252 563651 249->252 253 563666-5636a8 250->253 254 52441b-524435 GetCurrentProcess IsWow64Process 250->254 252->245 253->254 258 5636ae-5636b1 253->258 256 524437 254->256 257 524494-52449a 254->257 260 52443d-524449 256->260 257->260 261 5636b3-5636bd 258->261 262 5636db-5636e5 258->262 265 563824-563828 GetSystemInfo 260->265 266 52444f-52445e LoadLibraryA 260->266 267 5636bf-5636c5 261->267 268 5636ca-5636d6 261->268 270 5636e7-5636f3 262->270 271 5636f8-563702 262->271 263->250 269 5243ca-5243dd 263->269 272 563806-563809 264->272 273 5637e8 264->273 279 524460-52446e GetProcAddress 266->279 280 52449c-5244a6 GetSystemInfo 266->280 267->254 268->254 281 563726-56372f 269->281 282 5243e3-5243e5 269->282 270->254 275 563704-563710 271->275 276 563715-563721 271->276 277 5637f4-5637fc 272->277 278 56380b-56381a 272->278 274 5637ee 273->274 274->277 275->254 276->254 277->272 278->274 287 56381c-563822 278->287 279->280 288 524470-524474 GetNativeSystemInfo 279->288 289 524476-524478 280->289 285 563731-563737 281->285 286 56373c-563748 281->286 283 5243eb-5243ee 282->283 284 56374d-563762 282->284 290 5243f4-52440f 283->290 291 563791-563794 283->291 292 563764-56376a 284->292 293 56376f-56377b 284->293 285->254 286->254 287->277 288->289 294 524481-524493 289->294 295 52447a-52447b FreeLibrary 289->295 296 563780-56378c 290->296 297 524415 290->297 291->254 298 56379a-5637c1 291->298 292->254 293->254 295->294 296->254 297->254 299 5637c3-5637c9 298->299 300 5637ce-5637da 298->300 299->254 300->254
                                                                      APIs
                                                                      • GetVersionExW.KERNEL32(?), ref: 0052430D
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • GetCurrentProcess.KERNEL32(?,005BCB64,00000000,?,?), ref: 00524422
                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00524429
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00524454
                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00524466
                                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00524474
                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0052447B
                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 005244A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                      • API String ID: 3290436268-3101561225
                                                                      • Opcode ID: 8e154fcb1ff7ee2c0bcb183b8ee54448b5862f56fb0a3eb2ce12d5340cc3991e
                                                                      • Instruction ID: 634ed63fd6c5471e90315c75f9be1f648740376b7fbd3a86bef8235f9387a102
                                                                      • Opcode Fuzzy Hash: 8e154fcb1ff7ee2c0bcb183b8ee54448b5862f56fb0a3eb2ce12d5340cc3991e
                                                                      • Instruction Fuzzy Hash: E3A1A26690AAD4DFCB11E76DBC411B97FE4BB36340B184C99D081D3AE6D228460CEF6D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1378 5242a2-5242ba CreateStreamOnHGlobal 1379 5242da-5242dd 1378->1379 1380 5242bc-5242d3 FindResourceExW 1378->1380 1381 5242d9 1380->1381 1382 5635ba-5635c9 LoadResource 1380->1382 1381->1379 1382->1381 1383 5635cf-5635dd SizeofResource 1382->1383 1383->1381 1384 5635e3-5635ee LockResource 1383->1384 1384->1381 1385 5635f4-563612 1384->1385 1385->1381
                                                                      APIs
                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005250AA,?,?,00000000,00000000), ref: 005242B2
                                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005250AA,?,?,00000000,00000000), ref: 005242C9
                                                                      • LoadResource.KERNEL32(?,00000000,?,?,005250AA,?,?,00000000,00000000,?,?,?,?,?,?,00524F20), ref: 005635BE
                                                                      • SizeofResource.KERNEL32(?,00000000,?,?,005250AA,?,?,00000000,00000000,?,?,?,?,?,?,00524F20), ref: 005635D3
                                                                      • LockResource.KERNEL32(005250AA,?,?,005250AA,?,?,00000000,00000000,?,?,?,?,?,?,00524F20,?), ref: 005635E6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                      • String ID: SCRIPT
                                                                      • API String ID: 3051347437-3967369404
                                                                      • Opcode ID: 984a5ec4e9443c2e1392755e9bd256fd9dfbeb6647bef2bb558f0b30612d8bf4
                                                                      • Instruction ID: cf57b36ddd241ce4f313d1e890833911f8b5d62459f0f1f7c47683d91796638f
                                                                      • Opcode Fuzzy Hash: 984a5ec4e9443c2e1392755e9bd256fd9dfbeb6647bef2bb558f0b30612d8bf4
                                                                      • Instruction Fuzzy Hash: 16115A78200600EFDB218B66EC48F67BFB9FFD6B51F108269B44296290DB71E8049A20

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00522B6B
                                                                        • Part of subcall function 00523A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005F1418,?,00522E7F,?,?,?,00000000), ref: 00523A78
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,005E2224), ref: 00562C10
                                                                      • ShellExecuteW.SHELL32(00000000,?,?,005E2224), ref: 00562C17
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                      • String ID: runas
                                                                      • API String ID: 448630720-4000483414
                                                                      • Opcode ID: 1658e17fdb0c1fd9ea81179d858c689a48e1aa2a6da4618c0fc5a1056159a5ee
                                                                      • Instruction ID: 50afc52c83a98d087688158ab3ad58d41bab04da321c367117db7baa0e6d619e
                                                                      • Opcode Fuzzy Hash: 1658e17fdb0c1fd9ea81179d858c689a48e1aa2a6da4618c0fc5a1056159a5ee
                                                                      • Instruction Fuzzy Hash: 0D11A231108256AACB04FF60F8599BE7FA4BFE6340F44182DF182571E2DF298A09D752
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,00565222), ref: 0058DBCE
                                                                      • GetFileAttributesW.KERNELBASE(?), ref: 0058DBDD
                                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 0058DBEE
                                                                      • FindClose.KERNEL32(00000000), ref: 0058DBFA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                      • String ID:
                                                                      • API String ID: 2695905019-0
                                                                      • Opcode ID: 1542d740702297aa0fd6ed599dac4f2788d7d0ff33f7a2a7183d08b05ed658fc
                                                                      • Instruction ID: 0d100c176026180ae9169d207f860f692a4ec0a39326730937d9c59cf095ce66
                                                                      • Opcode Fuzzy Hash: 1542d740702297aa0fd6ed599dac4f2788d7d0ff33f7a2a7183d08b05ed658fc
                                                                      • Instruction Fuzzy Hash: BDF0A030810910578220BB7CAC0D8AA7FBCAF41334B104702F876E20E0EBB06D58DAA9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: BuffCharUpper
                                                                      • String ID: p#_
                                                                      • API String ID: 3964851224-4006447686
                                                                      • Opcode ID: 1c07cd664d5928c827518e3fc79faf1561e77cea0d4023e55a38ffa7843db885
                                                                      • Instruction ID: 706464093d12163307a1e896a542573f299b05a194d66d98bf5eb139727bc6c1
                                                                      • Opcode Fuzzy Hash: 1c07cd664d5928c827518e3fc79faf1561e77cea0d4023e55a38ffa7843db885
                                                                      • Instruction Fuzzy Hash: F6A24771608311CFD724CF18D484B2ABFE1BF8A304F14896DE99A9B392D771E845DB92
                                                                      APIs
                                                                      • GetInputState.USER32 ref: 0052D807
                                                                      • timeGetTime.WINMM ref: 0052DA07
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0052DB28
                                                                      • TranslateMessage.USER32(?), ref: 0052DB7B
                                                                      • DispatchMessageW.USER32(?), ref: 0052DB89
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0052DB9F
                                                                      • Sleep.KERNEL32(0000000A), ref: 0052DBB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                      • String ID:
                                                                      • API String ID: 2189390790-0
                                                                      • Opcode ID: 6b32e1ffdfb1c6be3b0b1bb2344a32559392a4d36071645482220f4557a0aa3a
                                                                      • Instruction ID: 0bbfc8ece7826f931c6011413caaac85cc881b3e3e12e83f22d8ff573ab3d69a
                                                                      • Opcode Fuzzy Hash: 6b32e1ffdfb1c6be3b0b1bb2344a32559392a4d36071645482220f4557a0aa3a
                                                                      • Instruction Fuzzy Hash: 6542E170604652DFD729CF24E848BAABFF4BF96300F148A19F459872D1D774E884DBA2

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00522D07
                                                                      • RegisterClassExW.USER32(00000030), ref: 00522D31
                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00522D42
                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00522D5F
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00522D6F
                                                                      • LoadIconW.USER32(000000A9), ref: 00522D85
                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00522D94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                      • API String ID: 2914291525-1005189915
                                                                      • Opcode ID: 27be53318bdbaa4914c7be955449a8919a6111ab3933a76580a60c12e5288d5a
                                                                      • Instruction ID: 20fb9f7c750fe6cbf190dcaa84e2b3bb68d4fae14c14c2740285eca30142741a
                                                                      • Opcode Fuzzy Hash: 27be53318bdbaa4914c7be955449a8919a6111ab3933a76580a60c12e5288d5a
                                                                      • Instruction Fuzzy Hash: 9F21E5B5901208EFDB40DFA4E949BEDBFB4FB18700F00421AF511E62A0D7B51548DF98

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 302 558d45-558d55 303 558d57-558d6a call 54f2c6 call 54f2d9 302->303 304 558d6f-558d71 302->304 320 5590f1 303->320 306 558d77-558d7d 304->306 307 5590d9-5590e6 call 54f2c6 call 54f2d9 304->307 306->307 310 558d83-558dae 306->310 325 5590ec call 5527ec 307->325 310->307 313 558db4-558dbd 310->313 316 558dd7-558dd9 313->316 317 558dbf-558dd2 call 54f2c6 call 54f2d9 313->317 318 5590d5-5590d7 316->318 319 558ddf-558de3 316->319 317->325 324 5590f4-5590f9 318->324 319->318 323 558de9-558ded 319->323 320->324 323->317 327 558def-558e06 323->327 325->320 331 558e23-558e2c 327->331 332 558e08-558e0b 327->332 335 558e2e-558e45 call 54f2c6 call 54f2d9 call 5527ec 331->335 336 558e4a-558e54 331->336 333 558e15-558e1e 332->333 334 558e0d-558e13 332->334 339 558ebf-558ed9 333->339 334->333 334->335 364 55900c 335->364 337 558e56-558e58 336->337 338 558e5b-558e79 call 553820 call 5529c8 * 2 336->338 337->338 372 558e96-558ebc call 559424 338->372 373 558e7b-558e91 call 54f2d9 call 54f2c6 338->373 341 558fad-558fb6 call 55f89b 339->341 342 558edf-558eef 339->342 355 559029 341->355 356 558fb8-558fca 341->356 342->341 345 558ef5-558ef7 342->345 345->341 349 558efd-558f23 345->349 349->341 353 558f29-558f3c 349->353 353->341 358 558f3e-558f40 353->358 360 55902d-559045 ReadFile 355->360 356->355 361 558fcc-558fdb GetConsoleMode 356->361 358->341 365 558f42-558f6d 358->365 367 559047-55904d 360->367 368 5590a1-5590ac GetLastError 360->368 361->355 363 558fdd-558fe1 361->363 363->360 369 558fe3-558ffd ReadConsoleW 363->369 370 55900f-559019 call 5529c8 364->370 365->341 371 558f6f-558f82 365->371 367->368 376 55904f 367->376 374 5590c5-5590c8 368->374 375 5590ae-5590c0 call 54f2d9 call 54f2c6 368->375 377 558fff GetLastError 369->377 378 55901e-559027 369->378 370->324 371->341 382 558f84-558f86 371->382 372->339 373->364 379 559005-55900b call 54f2a3 374->379 380 5590ce-5590d0 374->380 375->364 386 559052-559064 376->386 377->379 378->386 379->364 380->370 382->341 391 558f88-558fa8 382->391 386->370 388 559066-55906a 386->388 395 559083-55908e 388->395 396 55906c-55907c call 558a61 388->396 391->341 401 559090 call 558bb1 395->401 402 55909a-55909f call 5588a1 395->402 407 55907f-559081 396->407 408 559095-559098 401->408 402->408 407->370 408->407
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: .T
                                                                      • API String ID: 0-3315649315
                                                                      • Opcode ID: 6376686349f1349e96c705ec28b0403e1254b247d315e41ee12865bd26f01535
                                                                      • Instruction ID: 249f21ae292bf7ced5e2cd6e6f1f3ab0a040504fe1d2b38457f2f2865cf77918
                                                                      • Opcode Fuzzy Hash: 6376686349f1349e96c705ec28b0403e1254b247d315e41ee12865bd26f01535
                                                                      • Instruction Fuzzy Hash: B7C1F274904249EFCF11DFA8C859BBDBFB0BF59311F08449AE814A72E2C7349949CB60

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 410 56065b-56068b call 56042f 413 5606a6-5606b2 call 555221 410->413 414 56068d-560698 call 54f2c6 410->414 419 5606b4-5606c9 call 54f2c6 call 54f2d9 413->419 420 5606cb-560714 call 56039a 413->420 421 56069a-5606a1 call 54f2d9 414->421 419->421 430 560716-56071f 420->430 431 560781-56078a GetFileType 420->431 428 56097d-560983 421->428 435 560756-56077c GetLastError call 54f2a3 430->435 436 560721-560725 430->436 432 5607d3-5607d6 431->432 433 56078c-5607bd GetLastError call 54f2a3 CloseHandle 431->433 439 5607df-5607e5 432->439 440 5607d8-5607dd 432->440 433->421 449 5607c3-5607ce call 54f2d9 433->449 435->421 436->435 441 560727-560754 call 56039a 436->441 445 5607e9-560837 call 55516a 439->445 446 5607e7 439->446 440->445 441->431 441->435 452 560847-56086b call 56014d 445->452 453 560839-560845 call 5605ab 445->453 446->445 449->421 460 56087e-5608c1 452->460 461 56086d 452->461 453->452 459 56086f-560879 call 5586ae 453->459 459->428 463 5608e2-5608f0 460->463 464 5608c3-5608c7 460->464 461->459 465 5608f6-5608fa 463->465 466 56097b 463->466 464->463 468 5608c9-5608dd 464->468 465->466 469 5608fc-56092f CloseHandle call 56039a 465->469 466->428 468->463 472 560963-560977 469->472 473 560931-56095d GetLastError call 54f2a3 call 555333 469->473 472->466 473->472
                                                                      APIs
                                                                        • Part of subcall function 0056039A: CreateFileW.KERNELBASE(00000000,00000000,?,00560704,?,?,00000000,?,00560704,00000000,0000000C), ref: 005603B7
                                                                      • GetLastError.KERNEL32 ref: 0056076F
                                                                      • __dosmaperr.LIBCMT ref: 00560776
                                                                      • GetFileType.KERNELBASE(00000000), ref: 00560782
                                                                      • GetLastError.KERNEL32 ref: 0056078C
                                                                      • __dosmaperr.LIBCMT ref: 00560795
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005607B5
                                                                      • CloseHandle.KERNEL32(?), ref: 005608FF
                                                                      • GetLastError.KERNEL32 ref: 00560931
                                                                      • __dosmaperr.LIBCMT ref: 00560938
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                      • String ID: H
                                                                      • API String ID: 4237864984-2852464175
                                                                      • Opcode ID: 0b1a583e2a46ad6d7a309eaa09e28163f89b21ed74a6747e9a85e64f9dc1ad66
                                                                      • Instruction ID: 651cbd961bf203190336d93fac3c473bb87be9b74fe957eea7b13a6f9716312c
                                                                      • Opcode Fuzzy Hash: 0b1a583e2a46ad6d7a309eaa09e28163f89b21ed74a6747e9a85e64f9dc1ad66
                                                                      • Instruction Fuzzy Hash: 89A14132A141098FDF19EF68DC55BAE3FA0FB46320F281159F811EB2D2DB349816CB91

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00523A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005F1418,?,00522E7F,?,?,?,00000000), ref: 00523A78
                                                                        • Part of subcall function 00523357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00523379
                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0052356A
                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0056318D
                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005631CE
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00563210
                                                                      • _wcslen.LIBCMT ref: 00563277
                                                                      • _wcslen.LIBCMT ref: 00563286
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                      • API String ID: 98802146-2727554177
                                                                      • Opcode ID: 93d0b21ee2ba3ff4c133fc7508b5d555e11447fc35514a815bca444948aab416
                                                                      • Instruction ID: d45a17d35de52009ed60591f3ac61506b3ad71738606f3543b2afa048855b8e5
                                                                      • Opcode Fuzzy Hash: 93d0b21ee2ba3ff4c133fc7508b5d555e11447fc35514a815bca444948aab416
                                                                      • Instruction Fuzzy Hash: FB715AB14043169FC314EF65E8859ABBFE8BFA5740F50082EF545D71A0EB389A48DB61

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00522B8E
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00522B9D
                                                                      • LoadIconW.USER32(00000063), ref: 00522BB3
                                                                      • LoadIconW.USER32(000000A4), ref: 00522BC5
                                                                      • LoadIconW.USER32(000000A2), ref: 00522BD7
                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00522BEF
                                                                      • RegisterClassExW.USER32(?), ref: 00522C40
                                                                        • Part of subcall function 00522CD4: GetSysColorBrush.USER32(0000000F), ref: 00522D07
                                                                        • Part of subcall function 00522CD4: RegisterClassExW.USER32(00000030), ref: 00522D31
                                                                        • Part of subcall function 00522CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00522D42
                                                                        • Part of subcall function 00522CD4: InitCommonControlsEx.COMCTL32(?), ref: 00522D5F
                                                                        • Part of subcall function 00522CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00522D6F
                                                                        • Part of subcall function 00522CD4: LoadIconW.USER32(000000A9), ref: 00522D85
                                                                        • Part of subcall function 00522CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00522D94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                      • String ID: #$0$AutoIt v3
                                                                      • API String ID: 423443420-4155596026
                                                                      • Opcode ID: 53ee402d4383ad269ed17ac0352bfcab3177d29efb4cb261552c9207c6c04923
                                                                      • Instruction ID: ddff06a5016a9c62746d2f87b2fcc58f80842705598c62cce29e524154f0c940
                                                                      • Opcode Fuzzy Hash: 53ee402d4383ad269ed17ac0352bfcab3177d29efb4cb261552c9207c6c04923
                                                                      • Instruction Fuzzy Hash: 72214C70E00715EBDB109FA6EC49AA97FB4FB68B50F00041AF500E66E0D7B91548EF9C
                                                                      APIs
                                                                      • __Init_thread_footer.LIBCMT ref: 0052BB4E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Init_thread_footer
                                                                      • String ID: p#_$p#_$p#_$p#_$p%_$p%_$x#_$x#_
                                                                      • API String ID: 1385522511-2767588913
                                                                      • Opcode ID: 823afaba2d6f56a132dfde661e915f69e8ad09ef605a84b871747f30ef647791
                                                                      • Instruction ID: 0a7d6010e6da582066d14684d7f31bd3056c8060f046ce58850ec07a3ff04820
                                                                      • Opcode Fuzzy Hash: 823afaba2d6f56a132dfde661e915f69e8ad09ef605a84b871747f30ef647791
                                                                      • Instruction Fuzzy Hash: 9A32BD75A0022ADFEB10CF54E898ABABFF5FF45300F148459E909AB2D1C778AD81DB51

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 758 523170-523185 759 523187-52318a 758->759 760 5231e5-5231e7 758->760 762 5231eb 759->762 763 52318c-523193 759->763 760->759 761 5231e9 760->761 764 5231d0-5231d8 DefWindowProcW 761->764 765 5231f1-5231f6 762->765 766 562dfb-562e23 call 5218e2 call 53e499 762->766 767 523265-52326d PostQuitMessage 763->767 768 523199-52319e 763->768 769 5231de-5231e4 764->769 771 5231f8-5231fb 765->771 772 52321d-523244 SetTimer RegisterWindowMessageW 765->772 801 562e28-562e2f 766->801 770 523219-52321b 767->770 774 5231a4-5231a8 768->774 775 562e7c-562e90 call 58bf30 768->775 770->769 777 523201-523214 KillTimer call 5230f2 call 523c50 771->777 778 562d9c-562d9f 771->778 772->770 780 523246-523251 CreatePopupMenu 772->780 781 5231ae-5231b3 774->781 782 562e68-562e72 call 58c161 774->782 775->770 794 562e96 775->794 777->770 786 562dd7-562df6 MoveWindow 778->786 787 562da1-562da5 778->787 780->770 783 562e4d-562e54 781->783 784 5231b9-5231be 781->784 799 562e77 782->799 783->764 797 562e5a-562e63 call 580ad7 783->797 792 523253-523263 call 52326f 784->792 793 5231c4-5231ca 784->793 786->770 795 562dc6-562dd2 SetFocus 787->795 796 562da7-562daa 787->796 792->770 793->764 793->801 794->764 795->770 796->793 802 562db0-562dc1 call 5218e2 796->802 797->764 799->770 801->764 806 562e35-562e48 call 5230f2 call 523837 801->806 802->770 806->764
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0052316A,?,?), ref: 005231D8
                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,0052316A,?,?), ref: 00523204
                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00523227
                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0052316A,?,?), ref: 00523232
                                                                      • CreatePopupMenu.USER32 ref: 00523246
                                                                      • PostQuitMessage.USER32(00000000), ref: 00523267
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                      • String ID: TaskbarCreated
                                                                      • API String ID: 129472671-2362178303
                                                                      • Opcode ID: 44a32153cf747f757afad99f6c76aefe73c5c3358d456602a9b3d617f3fdc999
                                                                      • Instruction ID: 520b3f19fa92a91a6d217f660f4c0f3c8d59bf3ca854b7b79e965da6877a659c
                                                                      • Opcode Fuzzy Hash: 44a32153cf747f757afad99f6c76aefe73c5c3358d456602a9b3d617f3fdc999
                                                                      • Instruction Fuzzy Hash: 2D412335200A29E7DB141B68ED0EB7D3E69FF57300F040529F942D61E2CB6E9A04E7A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: D%_$D%_$D%_$D%_$D%_D%_$Variable must be of type 'Object'.
                                                                      • API String ID: 0-126804711
                                                                      • Opcode ID: c426bc5a6811df0221978cfabdb7afe0f30c27878f2ae24b00b92b29a6ad237b
                                                                      • Instruction ID: b293bab60583567c1ad4c1c7fbc7874eb7079506c63c5537be910997d5f46704
                                                                      • Opcode Fuzzy Hash: c426bc5a6811df0221978cfabdb7afe0f30c27878f2ae24b00b92b29a6ad237b
                                                                      • Instruction Fuzzy Hash: 7DC2D271E00225CFCB14CF54E886AADBBB1FF5A310F248969E905AB391D335ED41DB51

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1324 13e6570-13e661e call 13e3f90 1327 13e6625-13e664b call 13e7480 CreateFileW 1324->1327 1330 13e664d 1327->1330 1331 13e6652-13e6662 1327->1331 1332 13e679d-13e67a1 1330->1332 1336 13e6669-13e6683 VirtualAlloc 1331->1336 1337 13e6664 1331->1337 1333 13e67e3-13e67e6 1332->1333 1334 13e67a3-13e67a7 1332->1334 1338 13e67e9-13e67f0 1333->1338 1339 13e67a9-13e67ac 1334->1339 1340 13e67b3-13e67b7 1334->1340 1341 13e668a-13e66a1 ReadFile 1336->1341 1342 13e6685 1336->1342 1337->1332 1343 13e6845-13e685a 1338->1343 1344 13e67f2-13e67fd 1338->1344 1339->1340 1345 13e67b9-13e67c3 1340->1345 1346 13e67c7-13e67cb 1340->1346 1349 13e66a8-13e66e8 VirtualAlloc 1341->1349 1350 13e66a3 1341->1350 1342->1332 1353 13e685c-13e6867 VirtualFree 1343->1353 1354 13e686a-13e6872 1343->1354 1351 13e67ff 1344->1351 1352 13e6801-13e680d 1344->1352 1345->1346 1347 13e67cd-13e67d7 1346->1347 1348 13e67db 1346->1348 1347->1348 1348->1333 1355 13e66ef-13e670a call 13e76d0 1349->1355 1356 13e66ea 1349->1356 1350->1332 1351->1343 1357 13e680f-13e681f 1352->1357 1358 13e6821-13e682d 1352->1358 1353->1354 1364 13e6715-13e671f 1355->1364 1356->1332 1360 13e6843 1357->1360 1361 13e682f-13e6838 1358->1361 1362 13e683a-13e6840 1358->1362 1360->1338 1361->1360 1362->1360 1365 13e6752-13e6766 call 13e74e0 1364->1365 1366 13e6721-13e6750 call 13e76d0 1364->1366 1371 13e676a-13e676e 1365->1371 1372 13e6768 1365->1372 1366->1364 1374 13e677a-13e677e 1371->1374 1375 13e6770-13e6774 CloseHandle 1371->1375 1372->1332 1376 13e678e-13e6797 1374->1376 1377 13e6780-13e678b VirtualFree 1374->1377 1375->1374 1376->1327 1376->1332 1377->1376
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 013E6641
                                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 013E6867
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFileFreeVirtual
                                                                      • String ID:
                                                                      • API String ID: 204039940-0
                                                                      • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                      • Instruction ID: 555d3e10a0b8241d93d90d97c4affbe09d1d983147eebb2cab616f661c7526e3
                                                                      • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                      • Instruction Fuzzy Hash: 1CA107B4E00219EBDB14CFA4C899BAEBBB5BF58308F208559E501BB2C1D7759A40CF94

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1388 522c63-522cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                      APIs
                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00522C91
                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00522CB2
                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00521CAD,?), ref: 00522CC6
                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00521CAD,?), ref: 00522CCF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CreateShow
                                                                      • String ID: AutoIt v3$edit
                                                                      • API String ID: 1584632944-3779509399
                                                                      • Opcode ID: f6eff5ac3bb35c33b76b9e101b8cce6578a4694a5eef364587836bdb6ae976de
                                                                      • Instruction ID: 5959e8ad3d42663b9fe8ee38c9a735e1a34374e644cda8a7e845e4181fc53ed8
                                                                      • Opcode Fuzzy Hash: f6eff5ac3bb35c33b76b9e101b8cce6578a4694a5eef364587836bdb6ae976de
                                                                      • Instruction Fuzzy Hash: 38F0D076540690BAE73117176C08E772EBDD7D7F60B00045DF900D65A0CA652858EA78

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1503 13e6340-13e6466 call 13e3f90 call 13e6230 CreateFileW 1510 13e646d-13e647d 1503->1510 1511 13e6468 1503->1511 1514 13e647f 1510->1514 1515 13e6484-13e649e VirtualAlloc 1510->1515 1512 13e651d-13e6522 1511->1512 1514->1512 1516 13e64a2-13e64b9 ReadFile 1515->1516 1517 13e64a0 1515->1517 1518 13e64bd-13e64f7 call 13e6270 call 13e5230 1516->1518 1519 13e64bb 1516->1519 1517->1512 1524 13e64f9-13e650e call 13e62c0 1518->1524 1525 13e6513-13e651b ExitProcess 1518->1525 1519->1512 1524->1525 1525->1512
                                                                      APIs
                                                                        • Part of subcall function 013E6230: Sleep.KERNELBASE(000001F4), ref: 013E6241
                                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 013E645C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFileSleep
                                                                      • String ID: MU9U980U3MH0JV7WG
                                                                      • API String ID: 2694422964-3725425649
                                                                      • Opcode ID: 637f93eccec02d9f7b7618054ce74fffcdff79b4cab0cbe0a287d2de19c36b47
                                                                      • Instruction ID: 81ff1ddeffd9a665903dc574cc404a15f5d498cc0e32c5c6d3a6deb2a6ad8f38
                                                                      • Opcode Fuzzy Hash: 637f93eccec02d9f7b7618054ce74fffcdff79b4cab0cbe0a287d2de19c36b47
                                                                      • Instruction Fuzzy Hash: 02518070D04259EBEF11DBA4C859BEEBBB9AF15304F004199E208BB2C1D6B91B45CBA5

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1527 592947-5929b9 call 561f50 call 5925d6 call 53fe0b call 525722 call 59274e call 52511f call 545232 1542 592a6c-592a73 call 592e66 1527->1542 1543 5929bf-5929c6 call 592e66 1527->1543 1548 592a7c 1542->1548 1549 592a75-592a77 1542->1549 1543->1549 1550 5929cc-592a6a call 54d583 call 544983 call 549038 call 54d583 call 549038 * 2 1543->1550 1553 592a7f-592b3a call 5250f5 * 8 call 593017 call 54e5eb 1548->1553 1551 592cb6-592cb7 1549->1551 1550->1553 1556 592cd5-592cdb 1551->1556 1592 592b3c-592b3e 1553->1592 1593 592b43-592b5e call 592792 1553->1593 1557 592cdd-592ced call 53fdcd call 53fe14 1556->1557 1558 592cf0-592cf6 1556->1558 1557->1558 1592->1551 1596 592bf0-592bfc call 54e678 1593->1596 1597 592b64-592b6c 1593->1597 1604 592bfe-592c0d DeleteFileW 1596->1604 1605 592c12-592c16 1596->1605 1598 592b6e-592b72 1597->1598 1599 592b74 1597->1599 1601 592b79-592b97 call 5250f5 1598->1601 1599->1601 1609 592b99-592b9e 1601->1609 1610 592bc1-592bd7 call 59211d call 54dbb3 1601->1610 1604->1551 1607 592c18-592c7e call 5925d6 call 54d2eb * 2 call 5922ce 1605->1607 1608 592c91-592ca5 CopyFileW 1605->1608 1612 592cb9-592ccf DeleteFileW call 592fd8 1607->1612 1632 592c80-592c8f DeleteFileW 1607->1632 1608->1612 1613 592ca7-592cb4 DeleteFileW 1608->1613 1615 592ba1-592bb4 call 5928d2 1609->1615 1627 592bdc-592be7 1610->1627 1618 592cd4 1612->1618 1613->1551 1625 592bb6-592bbf 1615->1625 1618->1556 1625->1610 1627->1597 1629 592bed 1627->1629 1629->1596 1632->1551
                                                                      APIs
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00592C05
                                                                      • DeleteFileW.KERNEL32(?), ref: 00592C87
                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00592C9D
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00592CAE
                                                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00592CC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: File$Delete$Copy
                                                                      • String ID:
                                                                      • API String ID: 3226157194-0
                                                                      • Opcode ID: cd6efb5d65c464f05b8e59ef851f70752048c20fc65d26f9d0d8ac655411e4d8
                                                                      • Instruction ID: f68160179dfd5e0d00b272aee2c39330fe315a401bfffc3f658aa815485eeb86
                                                                      • Opcode Fuzzy Hash: cd6efb5d65c464f05b8e59ef851f70752048c20fc65d26f9d0d8ac655411e4d8
                                                                      • Instruction Fuzzy Hash: 6FB11C72D0012ABBDF25DBA4CC89EDEBBBDFF49354F1040A6F509E6151EA309E448B61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1907 555aa9-555ace 1908 555ad7-555ad9 1907->1908 1909 555ad0-555ad2 1907->1909 1911 555adb-555af5 call 54f2c6 call 54f2d9 call 5527ec 1908->1911 1912 555afa-555b1f 1908->1912 1910 555ca5-555cb4 call 540a8c 1909->1910 1911->1910 1914 555b26-555b2c 1912->1914 1915 555b21-555b24 1912->1915 1919 555b2e-555b46 call 54f2c6 call 54f2d9 call 5527ec 1914->1919 1920 555b4b 1914->1920 1915->1914 1918 555b4e-555b53 1915->1918 1923 555b55-555b61 call 559424 1918->1923 1924 555b64-555b6d call 55564e 1918->1924 1954 555c9c-555c9f 1919->1954 1920->1918 1923->1924 1936 555b6f-555b71 1924->1936 1937 555ba8-555bba 1924->1937 1941 555b95-555b9e call 55542e 1936->1941 1942 555b73-555b78 1936->1942 1939 555c02-555c23 WriteFile 1937->1939 1940 555bbc-555bc2 1937->1940 1944 555c25-555c2b GetLastError 1939->1944 1945 555c2e 1939->1945 1947 555bc4-555bc7 1940->1947 1948 555bf2-555c00 call 5556c4 1940->1948 1955 555ba3-555ba6 1941->1955 1949 555c6c-555c7e 1942->1949 1950 555b7e-555b8b call 5555e1 1942->1950 1944->1945 1956 555c31-555c3c 1945->1956 1957 555be2-555bf0 call 555891 1947->1957 1958 555bc9-555bcc 1947->1958 1948->1955 1952 555c80-555c83 1949->1952 1953 555c89-555c99 call 54f2d9 call 54f2c6 1949->1953 1964 555b8e-555b90 1950->1964 1952->1953 1962 555c85-555c87 1952->1962 1953->1954 1968 555ca4 1954->1968 1955->1964 1965 555ca1 1956->1965 1966 555c3e-555c43 1956->1966 1957->1955 1958->1949 1967 555bd2-555be0 call 5557a3 1958->1967 1962->1968 1964->1956 1965->1968 1971 555c45-555c4a 1966->1971 1972 555c69 1966->1972 1967->1955 1968->1910 1976 555c60-555c67 call 54f2a3 1971->1976 1977 555c4c-555c5e call 54f2d9 call 54f2c6 1971->1977 1972->1949 1976->1954 1977->1954
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: JOR
                                                                      • API String ID: 0-1892200982
                                                                      • Opcode ID: 01578baeb9acbd259be534570c9f0bdbaa9ee8f22c577aeb96ccf12c1b238b95
                                                                      • Instruction ID: f1d7dd6b21ecbe12e6e06401dd4c3928565127a6e32b9963cc0831c4d3fa049e
                                                                      • Opcode Fuzzy Hash: 01578baeb9acbd259be534570c9f0bdbaa9ee8f22c577aeb96ccf12c1b238b95
                                                                      • Instruction Fuzzy Hash: 5051D175D0060A9BCB119FA8C879EEE7FB4BF45326F14005BF801A7291E6719E09DB61
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00523B0F,SwapMouseButtons,00000004,?), ref: 00523B40
                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00523B0F,SwapMouseButtons,00000004,?), ref: 00523B61
                                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00523B0F,SwapMouseButtons,00000004,?), ref: 00523B83
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValue
                                                                      • String ID: Control Panel\Mouse
                                                                      • API String ID: 3677997916-824357125
                                                                      • Opcode ID: 10a7567818f093dcd66623e3d3a63fc4b19ddaf6bc8730c3e2288cc76b6df1e7
                                                                      • Instruction ID: 17d2950c5dcdef0d18312b527db4b03a00c12065a01d8853448e78923d71572d
                                                                      • Opcode Fuzzy Hash: 10a7567818f093dcd66623e3d3a63fc4b19ddaf6bc8730c3e2288cc76b6df1e7
                                                                      • Instruction Fuzzy Hash: 58112AB5511218FFDB208FA5EC88AAEBBB8FF05744B104959B805D7150E235AE44AB64
                                                                      APIs
                                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 013E5A5D
                                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 013E5A81
                                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 013E5AA3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 2438371351-0
                                                                      • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                                      • Instruction ID: 1a2fc65f0fae82eeb9065418e242bc2223d3a3ac17ac4396e682a5628d85166a
                                                                      • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                                      • Instruction Fuzzy Hash: 84622934A142589BEB24CFA4C854BDEB376EF58304F1091A9D20DEB3D0E7769E81CB59
                                                                      APIs
                                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 005633A2
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00523A04
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                                      • String ID: Line:
                                                                      • API String ID: 2289894680-1585850449
                                                                      • Opcode ID: 3fd77a7a9d4b643fe4056c95434ef55b162c799325b8e8920614011a274cad2a
                                                                      • Instruction ID: dd508f9a9ba7dc7e70929b0177568218288de0039df7a60a8b253b693ab2c7ef
                                                                      • Opcode Fuzzy Hash: 3fd77a7a9d4b643fe4056c95434ef55b162c799325b8e8920614011a274cad2a
                                                                      • Instruction Fuzzy Hash: FA31E471508325AAC725EB10EC49BEB7BD8BF92310F100D2AF599831D1EB789648CBC6
                                                                      APIs
                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00562C8C
                                                                        • Part of subcall function 00523AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00523A97,?,?,00522E7F,?,?,?,00000000), ref: 00523AC2
                                                                        • Part of subcall function 00522DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00522DC4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                      • String ID: X$`e^
                                                                      • API String ID: 779396738-1033855823
                                                                      • Opcode ID: cbdad7de7b1f777ffd1827e5174b73486487b826829948cdf34e7e591c0b2b47
                                                                      • Instruction ID: e0126f0dab516e1dfc13f83c5a06ca196514e0cdb13210d0815b8e3ff99e036c
                                                                      • Opcode Fuzzy Hash: cbdad7de7b1f777ffd1827e5174b73486487b826829948cdf34e7e591c0b2b47
                                                                      • Instruction Fuzzy Hash: B9219971A00258AFDF05DF94D8497EE7FFCBF99314F004059E445A7281DBB859498FA1
                                                                      APIs
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00540668
                                                                        • Part of subcall function 005432A4: RaiseException.KERNEL32(?,?,?,0054068A,?,005F1444,?,?,?,?,?,?,0054068A,00521129,005E8738,00521129), ref: 00543304
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00540685
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                      • String ID: Unknown exception
                                                                      • API String ID: 3476068407-410509341
                                                                      • Opcode ID: 854e6c948e193178969af3de7e60698a17473a17837d4ed8d35824c88d356300
                                                                      • Instruction ID: 778426b57a9426b50fb839311504533861ca9ad8db2614c1e37fca7ac8083943
                                                                      • Opcode Fuzzy Hash: 854e6c948e193178969af3de7e60698a17473a17837d4ed8d35824c88d356300
                                                                      • Instruction Fuzzy Hash: 06F0C83490020E778F04B665D84ECDD7F6CBE80318B704931B914965E1EF71DA25CA80
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0059302F
                                                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00593044
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Temp$FileNamePath
                                                                      • String ID: aut
                                                                      • API String ID: 3285503233-3010740371
                                                                      • Opcode ID: b9b49d1bd36b8f7ee07a0ee45cf80b3b0e3acd270222351c272dd264a23e0745
                                                                      • Instruction ID: 07490903c561b8773ea497d0df2f5a71b4f9f95295514ce91bfc9f8ffda609c6
                                                                      • Opcode Fuzzy Hash: b9b49d1bd36b8f7ee07a0ee45cf80b3b0e3acd270222351c272dd264a23e0745
                                                                      • Instruction Fuzzy Hash: A7D05B7550031467DA6097959C0DFC77E6CD704750F0002E17795D2091DAB0A544CBD4
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 005A82F5
                                                                      • TerminateProcess.KERNEL32(00000000), ref: 005A82FC
                                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 005A84DD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                                      • String ID:
                                                                      • API String ID: 146820519-0
                                                                      • Opcode ID: ef62f3c9288aa4bbcafa08df503fe55c86c21ec7d0feeb510f07db0257349318
                                                                      • Instruction ID: 7cfa00bd8fd7a8a4bae5b8bd521f7395cb8505e64fb6479b9c5e142e30de083d
                                                                      • Opcode Fuzzy Hash: ef62f3c9288aa4bbcafa08df503fe55c86c21ec7d0feeb510f07db0257349318
                                                                      • Instruction Fuzzy Hash: 84125B719083519FC714DF28C484B6EBBE5BF8A318F04895DE8998B392DB31ED45CB92
                                                                      APIs
                                                                        • Part of subcall function 00521BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00521BF4
                                                                        • Part of subcall function 00521BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00521BFC
                                                                        • Part of subcall function 00521BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00521C07
                                                                        • Part of subcall function 00521BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00521C12
                                                                        • Part of subcall function 00521BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00521C1A
                                                                        • Part of subcall function 00521BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00521C22
                                                                        • Part of subcall function 00521B4A: RegisterWindowMessageW.USER32(00000004,?,005212C4), ref: 00521BA2
                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0052136A
                                                                      • OleInitialize.OLE32 ref: 00521388
                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 005624AB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                      • String ID:
                                                                      • API String ID: 1986988660-0
                                                                      • Opcode ID: 4a53237c94d7ae17146a2c7628e50b53988c956d8fceca1cdfbea2607e21b497
                                                                      • Instruction ID: e843846c92ae1cca355f3f65d471cd7ab6026f6ca7d0bc4ff8137418436d2d7f
                                                                      • Opcode Fuzzy Hash: 4a53237c94d7ae17146a2c7628e50b53988c956d8fceca1cdfbea2607e21b497
                                                                      • Instruction Fuzzy Hash: 2D71D0B4901A05CFC784EF7AA9496753EE1FBF9384704452AD00ADB2A1EB39540CEF4C
                                                                      APIs
                                                                        • Part of subcall function 00523923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00523A04
                                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0058C259
                                                                      • KillTimer.USER32(?,00000001,?,?), ref: 0058C261
                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0058C270
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: IconNotifyShell_Timer$Kill
                                                                      • String ID:
                                                                      • API String ID: 3500052701-0
                                                                      • Opcode ID: e82e1776d4f432ddecbf51eb044e7140c7231e7af82ccd6f13e5cd8e38b71cd4
                                                                      • Instruction ID: c451568079bd3e8285aa61c0c7a657fc5042b66f60742215bc013de2421be312
                                                                      • Opcode Fuzzy Hash: e82e1776d4f432ddecbf51eb044e7140c7231e7af82ccd6f13e5cd8e38b71cd4
                                                                      • Instruction Fuzzy Hash: 3B31B674904354AFEB629F648855BE6BFECAB16304F00049DD5DAA7181C7746A88CB61
                                                                      APIs
                                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,005585CC,?,005E8CC8,0000000C), ref: 00558704
                                                                      • GetLastError.KERNEL32(?,005585CC,?,005E8CC8,0000000C), ref: 0055870E
                                                                      • __dosmaperr.LIBCMT ref: 00558739
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                                      • String ID:
                                                                      • API String ID: 2583163307-0
                                                                      • Opcode ID: b172a2c0e234f7ee37b16458b108c6e4c7c8a47203fe001e6d853e8295fab210
                                                                      • Instruction ID: 638c7209d39285b16bcece34b1415fe27f823e37e31315501c9feebb30ba382a
                                                                      • Opcode Fuzzy Hash: b172a2c0e234f7ee37b16458b108c6e4c7c8a47203fe001e6d853e8295fab210
                                                                      • Instruction Fuzzy Hash: 15016B32A1522017D7606634A87977E2F49AFE1776F3A061BFC08AB1D2EEA18C8DC150
                                                                      APIs
                                                                      • TranslateMessage.USER32(?), ref: 0052DB7B
                                                                      • DispatchMessageW.USER32(?), ref: 0052DB89
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0052DB9F
                                                                      • Sleep.KERNEL32(0000000A), ref: 0052DBB1
                                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00571CC9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                      • String ID:
                                                                      • API String ID: 3288985973-0
                                                                      • Opcode ID: d54572a7198659e955e4c4dc0c522a03fe6deb7e4d23deb91c29190e061aeacf
                                                                      • Instruction ID: 0c57bdd89b2177e23cc279640442a0e78013dda284a2da849d55b8af49c792ca
                                                                      • Opcode Fuzzy Hash: d54572a7198659e955e4c4dc0c522a03fe6deb7e4d23deb91c29190e061aeacf
                                                                      • Instruction Fuzzy Hash: 26F05E306443449BEB70CBA09C59FEA7BBCFF95350F104A18E64AC30C0DB34A448EB29
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00592CD4,?,?,?,00000004,00000001), ref: 00592FF2
                                                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00592CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00593006
                                                                      • CloseHandle.KERNEL32(00000000,?,00592CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0059300D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleTime
                                                                      • String ID:
                                                                      • API String ID: 3397143404-0
                                                                      • Opcode ID: 533720753fd11afbc8653a38afe91a1883049f490a99b0123f92191be4db0214
                                                                      • Instruction ID: 1f99097566225b922b608ef8f9cc3ad019cd0fbb6281670c070aed9f517cbf95
                                                                      • Opcode Fuzzy Hash: 533720753fd11afbc8653a38afe91a1883049f490a99b0123f92191be4db0214
                                                                      • Instruction Fuzzy Hash: 8CE0863228061077D6701759BC0EF8B3E5CD786B71F104320F759760D046A0250592AC
                                                                      APIs
                                                                      • __Init_thread_footer.LIBCMT ref: 005317F6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Init_thread_footer
                                                                      • String ID: CALL
                                                                      • API String ID: 1385522511-4196123274
                                                                      • Opcode ID: 0625cae11c43d4a8e2611f2265eacf3ea47abafb4f878e552bffe77be4c7f45f
                                                                      • Instruction ID: 88093ce61c1b2cf18c336408d0888e3af9484511b3da8fc527768ec66267b9b6
                                                                      • Opcode Fuzzy Hash: 0625cae11c43d4a8e2611f2265eacf3ea47abafb4f878e552bffe77be4c7f45f
                                                                      • Instruction Fuzzy Hash: 73228B706086029FC714DF24D485A2ABFF1BF89314F18896DF49A8B3A2D731E845DF96
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 00596F6B
                                                                        • Part of subcall function 00524ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524EFD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad_wcslen
                                                                      • String ID: >>>AUTOIT SCRIPT<<<
                                                                      • API String ID: 3312870042-2806939583
                                                                      • Opcode ID: ad7b3edf4f2bab66c44f8d6b7962681849a3fa42dd5ee75efaf639fe28e156a2
                                                                      • Instruction ID: ce92a2ee78e0ded7dd802dd64da1f8f4d5afe7838443540d6a8d94c4346edfcb
                                                                      • Opcode Fuzzy Hash: ad7b3edf4f2bab66c44f8d6b7962681849a3fa42dd5ee75efaf639fe28e156a2
                                                                      • Instruction Fuzzy Hash: 1DB182311182168FCB14EF24D4959AEBBE5BFD9300F04496DF496972A2EB30ED49CB92
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: __fread_nolock
                                                                      • String ID: EA06
                                                                      • API String ID: 2638373210-3962188686
                                                                      • Opcode ID: cdbccafb7b3f13d61204e7a40c0b0df53017e9c16007aa2cc8e3b463c08861d2
                                                                      • Instruction ID: eb196910d1d08840cb65b1f9bc07196638188038f2c73919005584b9f9aa7124
                                                                      • Opcode Fuzzy Hash: cdbccafb7b3f13d61204e7a40c0b0df53017e9c16007aa2cc8e3b463c08861d2
                                                                      • Instruction Fuzzy Hash: F701B5729042587EDF18C7A8C85AEEEBFF8AB15305F00459EE192D61C1E5B4E618CB60
                                                                      APIs
                                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00523908
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: IconNotifyShell_
                                                                      • String ID:
                                                                      • API String ID: 1144537725-0
                                                                      • Opcode ID: 90e0b21ff82b8a3b49c0f0124ade2af91f8f514decb5066aca806e5484ce0de1
                                                                      • Instruction ID: d82c56289210cbb60891888f3f1e23f2d810cb8e1b190fc62ca9222b3b00c05b
                                                                      • Opcode Fuzzy Hash: 90e0b21ff82b8a3b49c0f0124ade2af91f8f514decb5066aca806e5484ce0de1
                                                                      • Instruction Fuzzy Hash: 30318D70605711CFD720DF24D8857A7BBE4FF5A308F00092EF59997280E775AA48DB56
                                                                      APIs
                                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 013E5A5D
                                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 013E5A81
                                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 013E5AA3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 2438371351-0
                                                                      • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                      • Instruction ID: 516a862a2b6f53a1acbb37c1fa36371fa794797b3a4f741d5bd7d5a002361019
                                                                      • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                      • Instruction Fuzzy Hash: 75120D24E24658C6EB24CF64D8547DEB232EF68304F1090E9910DEB7A4E77A4F81CF5A
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                      • Instruction ID: 10defbe766ebd456f9e1e907ddac04d0b153cdc9a0287904e84ba33657c1e029
                                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                      • Instruction Fuzzy Hash: 8C31E174A0410A9BC718CF59D484969FBB2FF49300F249AA5E80ACF656DB31EDC1CBD0
                                                                      APIs
                                                                        • Part of subcall function 00524E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00524EDD,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524E9C
                                                                        • Part of subcall function 00524E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00524EAE
                                                                        • Part of subcall function 00524E90: FreeLibrary.KERNEL32(00000000,?,?,00524EDD,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524EC0
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524EFD
                                                                        • Part of subcall function 00524E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00563CDE,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524E62
                                                                        • Part of subcall function 00524E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00524E74
                                                                        • Part of subcall function 00524E59: FreeLibrary.KERNEL32(00000000,?,?,00563CDE,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524E87
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressFreeProc
                                                                      • String ID:
                                                                      • API String ID: 2632591731-0
                                                                      • Opcode ID: 27a7df09a7c9956de086bf54e3ccd6d071b016869a9d4fc9a0ec56decd4f19b2
                                                                      • Instruction ID: 73a860ce978a574a42a8edb7a3a78d911cf6315594de8b9ae1dfadbb5265f6c8
                                                                      • Opcode Fuzzy Hash: 27a7df09a7c9956de086bf54e3ccd6d071b016869a9d4fc9a0ec56decd4f19b2
                                                                      • Instruction Fuzzy Hash: CC112731600216AADF24AB60ED0AFED7FA4BFD1710F10442DF542A62C1EE709E049F50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: __wsopen_s
                                                                      • String ID:
                                                                      • API String ID: 3347428461-0
                                                                      • Opcode ID: 8d267d4f6414a340bde614df07fc48e0d9bcfe424d5f8b379c80c15a0c5ae5ff
                                                                      • Instruction ID: 70afacacd3a20fc7b22d1fa087a1ff7e90d6aaa394bba8a954839d992116ec06
                                                                      • Opcode Fuzzy Hash: 8d267d4f6414a340bde614df07fc48e0d9bcfe424d5f8b379c80c15a0c5ae5ff
                                                                      • Instruction Fuzzy Hash: 1911367190410AAFCF05DF58E9409AA7BF9FF48304F14445AFC09AB312DA30DA15CBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                                      • Instruction ID: d929fa189da14bc73dda6f967e1f828fc7c3e8532cfcf214278737a57574ff27
                                                                      • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                                      • Instruction Fuzzy Hash: C4F0F932510A1196C7313A79AC1EBD73F9CBFD3339F110B16F825931D1CB7498058AA5
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000000,?,005F1444,?,0053FDF5,?,?,0052A976,00000010,005F1440,005213FC,?,005213C6,?,00521129), ref: 00553852
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: f7e92245e35af8116e65b7d556f6d8d3b6508f285aebe6560c9d2fcbb060215e
                                                                      • Instruction ID: 864618f5f8f1b19b81483d5689b5d00bd280df64d24e29d3528ed98c749f8b0c
                                                                      • Opcode Fuzzy Hash: f7e92245e35af8116e65b7d556f6d8d3b6508f285aebe6560c9d2fcbb060215e
                                                                      • Instruction Fuzzy Hash: FDE0E531102225A6D73526769C24BDA3E48BB827F6F050123BC1CA3580CB51DD0986E1
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00554D9C
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFreeHeapLast_free
                                                                      • String ID:
                                                                      • API String ID: 1353095263-0
                                                                      • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                                      • Instruction ID: f970592055789616d6f302ef45c9e6d8019f7acd5a79c7b37cdf0e2af5cdc48f
                                                                      • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                                      • Instruction Fuzzy Hash: 79E06D361002059F8720CE6CD400A92BBF4EF85325720852AEC9DD3310D331E856CB80
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524F6D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: beff238a291541083ff9051fc231f2fab32f50e972baebd35441161981a21578
                                                                      • Instruction ID: 65124cd8997748f8e44e6e97020e4ab3193f975df4e97e38ca37e9fbf17ec8df
                                                                      • Opcode Fuzzy Hash: beff238a291541083ff9051fc231f2fab32f50e972baebd35441161981a21578
                                                                      • Instruction Fuzzy Hash: 29F03071105762CFDB349F64E594812BFE4FF553197108D7EE1EA82651C7319844DF10
                                                                      APIs
                                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00522DC4
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LongNamePath_wcslen
                                                                      • String ID:
                                                                      • API String ID: 541455249-0
                                                                      • Opcode ID: 516b7a5c161ae9f672d38edc0643d4eddc8744e3c879c5a736771451fb957513
                                                                      • Instruction ID: 9271567be64fdd4b46b4f5eea9e0c09fefbefeef6a109bb2c2c656bfb2914076
                                                                      • Opcode Fuzzy Hash: 516b7a5c161ae9f672d38edc0643d4eddc8744e3c879c5a736771451fb957513
                                                                      • Instruction Fuzzy Hash: 8BE0CD766001245BC7209258DC09FEABBDDEFC8790F040171FD49D7248D960AD848554
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: __fread_nolock
                                                                      • String ID:
                                                                      • API String ID: 2638373210-0
                                                                      • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                      • Instruction ID: 2b53e34e73eb6af1289c7f12f3c780b40377616c56aebbe5bffa126ca075ce41
                                                                      • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                      • Instruction Fuzzy Hash: 16E048B06097005FDF395E28E8517F67BE4AF49300F10045EF69F92652E5726845864D
                                                                      APIs
                                                                        • Part of subcall function 00523837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00523908
                                                                        • Part of subcall function 0052D730: GetInputState.USER32 ref: 0052D807
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00522B6B
                                                                        • Part of subcall function 005230F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0052314E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                      • String ID:
                                                                      • API String ID: 3667716007-0
                                                                      • Opcode ID: 2ae62c85ceab10a9db33ec406a18fa48e65ce6528db43ce84fcb11bcec50dad6
                                                                      • Instruction ID: 6f672225d0d469cb57b14b417b7ee7600d7ef2fb15a8184fdb04c045e284b9da
                                                                      • Opcode Fuzzy Hash: 2ae62c85ceab10a9db33ec406a18fa48e65ce6528db43ce84fcb11bcec50dad6
                                                                      • Instruction Fuzzy Hash: 7DE0262130022A02CB08BB34B81E5BDAF99FFE3351F40053EF142831E2CE2D46498261
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,00560704,?,?,00000000,?,00560704,00000000,0000000C), ref: 005603B7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: 328031fb24ecfd9e6dd6d26c144e67db2df1e4a2dee0fdab891d2dd26d3b0dd2
                                                                      • Instruction ID: 6e2fc4586c862c9532894bc04ea94dfe61e5ebdc99610de2b9bf650625aa78d9
                                                                      • Opcode Fuzzy Hash: 328031fb24ecfd9e6dd6d26c144e67db2df1e4a2dee0fdab891d2dd26d3b0dd2
                                                                      • Instruction Fuzzy Hash: 0AD06C3204010DBBDF028F84DD06EDA3FAAFB48714F014100BE1866020C732E821EB94
                                                                      APIs
                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00521CBC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: InfoParametersSystem
                                                                      • String ID:
                                                                      • API String ID: 3098949447-0
                                                                      • Opcode ID: c9ac89450a85772bd694e50039e24bac42d50e94cd46ffee9f53bff597319c5e
                                                                      • Instruction ID: 0497e169268d9c5bc48108bc674d0615fe4c133f5ae5c2e8461cf896320716fb
                                                                      • Opcode Fuzzy Hash: c9ac89450a85772bd694e50039e24bac42d50e94cd46ffee9f53bff597319c5e
                                                                      • Instruction Fuzzy Hash: E8C09236280705EFF2248B80BC4AF207B65A368B01F048401F609E95E3C3A62828FA68
                                                                      APIs
                                                                      • Sleep.KERNELBASE(000001F4), ref: 013E6241
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Sleep
                                                                      • String ID:
                                                                      • API String ID: 3472027048-0
                                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                      • Instruction ID: 78b042d2843a164b66376fd77855ab3a61ea7b73b37b1433d707f0cfe9f62d58
                                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                      • Instruction Fuzzy Hash: 6DE0E67494020DDFDB00EFB4D54D69E7FF4EF04301F100165FD01D2281D6319D508A62
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 005B961A
                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005B965B
                                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 005B969F
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005B96C9
                                                                      • SendMessageW.USER32 ref: 005B96F2
                                                                      • GetKeyState.USER32(00000011), ref: 005B978B
                                                                      • GetKeyState.USER32(00000009), ref: 005B9798
                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005B97AE
                                                                      • GetKeyState.USER32(00000010), ref: 005B97B8
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005B97E9
                                                                      • SendMessageW.USER32 ref: 005B9810
                                                                      • SendMessageW.USER32(?,00001030,?,005B7E95), ref: 005B9918
                                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 005B992E
                                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 005B9941
                                                                      • SetCapture.USER32(?), ref: 005B994A
                                                                      • ClientToScreen.USER32(?,?), ref: 005B99AF
                                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 005B99BC
                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005B99D6
                                                                      • ReleaseCapture.USER32 ref: 005B99E1
                                                                      • GetCursorPos.USER32(?), ref: 005B9A19
                                                                      • ScreenToClient.USER32(?,?), ref: 005B9A26
                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 005B9A80
                                                                      • SendMessageW.USER32 ref: 005B9AAE
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 005B9AEB
                                                                      • SendMessageW.USER32 ref: 005B9B1A
                                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 005B9B3B
                                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 005B9B4A
                                                                      • GetCursorPos.USER32(?), ref: 005B9B68
                                                                      • ScreenToClient.USER32(?,?), ref: 005B9B75
                                                                      • GetParent.USER32(?), ref: 005B9B93
                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 005B9BFA
                                                                      • SendMessageW.USER32 ref: 005B9C2B
                                                                      • ClientToScreen.USER32(?,?), ref: 005B9C84
                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 005B9CB4
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 005B9CDE
                                                                      • SendMessageW.USER32 ref: 005B9D01
                                                                      • ClientToScreen.USER32(?,?), ref: 005B9D4E
                                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 005B9D82
                                                                        • Part of subcall function 00539944: GetWindowLongW.USER32(?,000000EB), ref: 00539952
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 005B9E05
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                      • String ID: @GUI_DRAGID$@U=u$F$p#_
                                                                      • API String ID: 3429851547-2323773707
                                                                      • Opcode ID: 06ac9380efbcedf5b9b682b22eb07a779c0242f5d62b206f609cf3076c08972d
                                                                      • Instruction ID: 6da1d4e0db5b129cc2b62ca8c70c3d887d685a343fe15627a0c02d93de4b809e
                                                                      • Opcode Fuzzy Hash: 06ac9380efbcedf5b9b682b22eb07a779c0242f5d62b206f609cf3076c08972d
                                                                      • Instruction Fuzzy Hash: 75428A74204241AFDB24CF28CC48EEABFE5FF99310F104A19F6998B2A1D771E854DB95
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 005B48F3
                                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 005B4908
                                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 005B4927
                                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 005B494B
                                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 005B495C
                                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 005B497B
                                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 005B49AE
                                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 005B49D4
                                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 005B4A0F
                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 005B4A56
                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 005B4A7E
                                                                      • IsMenu.USER32(?), ref: 005B4A97
                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005B4AF2
                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005B4B20
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 005B4B94
                                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 005B4BE3
                                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 005B4C82
                                                                      • wsprintfW.USER32 ref: 005B4CAE
                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005B4CC9
                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 005B4CF1
                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005B4D13
                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005B4D33
                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 005B4D5A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                      • String ID: %d/%02d/%02d$@U=u
                                                                      • API String ID: 4054740463-2764005415
                                                                      • Opcode ID: 4d80807cbcd854f1c60216b1cdea1f2c642c4c48673718b4a39554a993655ea7
                                                                      • Instruction ID: b5cb88d7b07e72fa77dfffb43c51e24a43c82a7cc0778e78b42534eb4a01354e
                                                                      • Opcode Fuzzy Hash: 4d80807cbcd854f1c60216b1cdea1f2c642c4c48673718b4a39554a993655ea7
                                                                      • Instruction Fuzzy Hash: 0312AB71600215ABEB358F28CC49FEE7FB8BB89710F104629F515EB2A2DB74A941DF50
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0053F998
                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0057F474
                                                                      • IsIconic.USER32(00000000), ref: 0057F47D
                                                                      • ShowWindow.USER32(00000000,00000009), ref: 0057F48A
                                                                      • SetForegroundWindow.USER32(00000000), ref: 0057F494
                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0057F4AA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0057F4B1
                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0057F4BD
                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0057F4CE
                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0057F4D6
                                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0057F4DE
                                                                      • SetForegroundWindow.USER32(00000000), ref: 0057F4E1
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0057F4F6
                                                                      • keybd_event.USER32(00000012,00000000), ref: 0057F501
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0057F50B
                                                                      • keybd_event.USER32(00000012,00000000), ref: 0057F510
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0057F519
                                                                      • keybd_event.USER32(00000012,00000000), ref: 0057F51E
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0057F528
                                                                      • keybd_event.USER32(00000012,00000000), ref: 0057F52D
                                                                      • SetForegroundWindow.USER32(00000000), ref: 0057F530
                                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0057F557
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                      • String ID: Shell_TrayWnd
                                                                      • API String ID: 4125248594-2988720461
                                                                      • Opcode ID: 0a88840bf934210bea556772d66933e28a59d85e62c2be4c08b19369fe26fe7b
                                                                      • Instruction ID: 545ea03317160cd78e1d03d212a2c687e89aee1d4e2b437e35d6af5f81e81896
                                                                      • Opcode Fuzzy Hash: 0a88840bf934210bea556772d66933e28a59d85e62c2be4c08b19369fe26fe7b
                                                                      • Instruction Fuzzy Hash: E2315E71A40218BBEB306BB59C4AFBF7E6CFB44B50F104566FA05E61D1C6B16900BBA4
                                                                      APIs
                                                                        • Part of subcall function 005816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0058170D
                                                                        • Part of subcall function 005816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0058173A
                                                                        • Part of subcall function 005816C3: GetLastError.KERNEL32 ref: 0058174A
                                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00581286
                                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 005812A8
                                                                      • CloseHandle.KERNEL32(?), ref: 005812B9
                                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005812D1
                                                                      • GetProcessWindowStation.USER32 ref: 005812EA
                                                                      • SetProcessWindowStation.USER32(00000000), ref: 005812F4
                                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00581310
                                                                        • Part of subcall function 005810BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005811FC), ref: 005810D4
                                                                        • Part of subcall function 005810BF: CloseHandle.KERNEL32(?,?,005811FC), ref: 005810E9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                      • String ID: $default$winsta0$Z^
                                                                      • API String ID: 22674027-2132372335
                                                                      • Opcode ID: 24a2dca6c8b078aa33352562ef07ed5c69bc3774262f4e4d04c29395b2f8412f
                                                                      • Instruction ID: 68d6611442a914855e753c09eb0c833a750ada386097badd27f28c19f665d650
                                                                      • Opcode Fuzzy Hash: 24a2dca6c8b078aa33352562ef07ed5c69bc3774262f4e4d04c29395b2f8412f
                                                                      • Instruction Fuzzy Hash: 5A816871900609ABDF21AFA8DC49BEE7FBDFF04704F144129F911B61A0D731994ADB28
                                                                      APIs
                                                                        • Part of subcall function 005810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00581114
                                                                        • Part of subcall function 005810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 00581120
                                                                        • Part of subcall function 005810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 0058112F
                                                                        • Part of subcall function 005810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 00581136
                                                                        • Part of subcall function 005810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0058114D
                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00580BCC
                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00580C00
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00580C17
                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00580C51
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00580C6D
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00580C84
                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00580C8C
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00580C93
                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00580CB4
                                                                      • CopySid.ADVAPI32(00000000), ref: 00580CBB
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00580CEA
                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00580D0C
                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00580D1E
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00580D45
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580D4C
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00580D55
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580D5C
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00580D65
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580D6C
                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00580D78
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580D7F
                                                                        • Part of subcall function 00581193: GetProcessHeap.KERNEL32(00000008,00580BB1,?,00000000,?,00580BB1,?), ref: 005811A1
                                                                        • Part of subcall function 00581193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00580BB1,?), ref: 005811A8
                                                                        • Part of subcall function 00581193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00580BB1,?), ref: 005811B7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                      • String ID:
                                                                      • API String ID: 4175595110-0
                                                                      • Opcode ID: bc6ce303de2d6f3164f7f1b3cd133b26cf5c51c98dbe763e854a3c46b60700d9
                                                                      • Instruction ID: edc451d756cff16e0493f2b45485bd68df5291f9edb96c381f35358683b411d2
                                                                      • Opcode Fuzzy Hash: bc6ce303de2d6f3164f7f1b3cd133b26cf5c51c98dbe763e854a3c46b60700d9
                                                                      • Instruction Fuzzy Hash: BA716A7290120AAFDF90EFA4DC49BAEBFB8BF14300F045615E914B7191D771AA09CB60
                                                                      APIs
                                                                      • OpenClipboard.USER32(005BCC08), ref: 0059EB29
                                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0059EB37
                                                                      • GetClipboardData.USER32(0000000D), ref: 0059EB43
                                                                      • CloseClipboard.USER32 ref: 0059EB4F
                                                                      • GlobalLock.KERNEL32(00000000), ref: 0059EB87
                                                                      • CloseClipboard.USER32 ref: 0059EB91
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0059EBBC
                                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0059EBC9
                                                                      • GetClipboardData.USER32(00000001), ref: 0059EBD1
                                                                      • GlobalLock.KERNEL32(00000000), ref: 0059EBE2
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0059EC22
                                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 0059EC38
                                                                      • GetClipboardData.USER32(0000000F), ref: 0059EC44
                                                                      • GlobalLock.KERNEL32(00000000), ref: 0059EC55
                                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0059EC77
                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0059EC94
                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0059ECD2
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0059ECF3
                                                                      • CountClipboardFormats.USER32 ref: 0059ED14
                                                                      • CloseClipboard.USER32 ref: 0059ED59
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                      • String ID:
                                                                      • API String ID: 420908878-0
                                                                      • Opcode ID: 7662738c4fd72e333c60e0ccc0d203bb1e9944b4ec35660c65cd02a371520b9b
                                                                      • Instruction ID: 9eaf41846e94f1fc2f49d82ff86d34a4d4142165beaf2efd7ac8e30d8d3b3eeb
                                                                      • Opcode Fuzzy Hash: 7662738c4fd72e333c60e0ccc0d203bb1e9944b4ec35660c65cd02a371520b9b
                                                                      • Instruction Fuzzy Hash: CF61BE352043029FD700EF24D88AF6ABFA4BF95714F14451DF496972A2DB31ED09DB62
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 005969BE
                                                                      • FindClose.KERNEL32(00000000), ref: 00596A12
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00596A4E
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00596A75
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00596AB2
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00596ADF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                      • API String ID: 3830820486-3289030164
                                                                      • Opcode ID: 760007c25133de121655c2b615e4203fb27e11e25d2c37878f1731b597cb2b75
                                                                      • Instruction ID: 29ac4727a0f8fab831061985fad2cc4444ceb91cd89122689e8b13ac4405090c
                                                                      • Opcode Fuzzy Hash: 760007c25133de121655c2b615e4203fb27e11e25d2c37878f1731b597cb2b75
                                                                      • Instruction Fuzzy Hash: 50D180B1508311AFC700EBA0D995EAFBBECBF99704F04491DF585D6291EB34DA48CB62
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00599663
                                                                      • GetFileAttributesW.KERNEL32(?), ref: 005996A1
                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 005996BB
                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 005996D3
                                                                      • FindClose.KERNEL32(00000000), ref: 005996DE
                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 005996FA
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0059974A
                                                                      • SetCurrentDirectoryW.KERNEL32(005E6B7C), ref: 00599768
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00599772
                                                                      • FindClose.KERNEL32(00000000), ref: 0059977F
                                                                      • FindClose.KERNEL32(00000000), ref: 0059978F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                      • String ID: *.*
                                                                      • API String ID: 1409584000-438819550
                                                                      • Opcode ID: 63e366f655f45f968fbae92762528caf73ec37d70a280091f24079076c5d3a1e
                                                                      • Instruction ID: af71b93bda00d47972544d39ccb87588ac4b27329449e2350c428fe9611483e6
                                                                      • Opcode Fuzzy Hash: 63e366f655f45f968fbae92762528caf73ec37d70a280091f24079076c5d3a1e
                                                                      • Instruction Fuzzy Hash: 1831E23650021A6BCF14AFF9DC48ADE7FACFF5A360F14425AF955E2090EB30ED448A24
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 005997BE
                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00599819
                                                                      • FindClose.KERNEL32(00000000), ref: 00599824
                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00599840
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00599890
                                                                      • SetCurrentDirectoryW.KERNEL32(005E6B7C), ref: 005998AE
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 005998B8
                                                                      • FindClose.KERNEL32(00000000), ref: 005998C5
                                                                      • FindClose.KERNEL32(00000000), ref: 005998D5
                                                                        • Part of subcall function 0058DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0058DB00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                      • String ID: *.*
                                                                      • API String ID: 2640511053-438819550
                                                                      • Opcode ID: f43254dec2c82d959895a90e7a2187c7580acdc95b2315ab26ac06295ff1b3b7
                                                                      • Instruction ID: e52e81020d35964c24cf348f659a5b58c794adf6f46334c64e07920b3cc608a2
                                                                      • Opcode Fuzzy Hash: f43254dec2c82d959895a90e7a2187c7580acdc95b2315ab26ac06295ff1b3b7
                                                                      • Instruction Fuzzy Hash: E631F63250061A6BDF14EFB9DC48ADE7FACBF46360F14415DE850A2090EB70ED45CA64
                                                                      APIs
                                                                      • GetLocalTime.KERNEL32(?), ref: 00598257
                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00598267
                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00598273
                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00598310
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00598324
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00598356
                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0059838C
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00598395
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                                      • String ID: *.*
                                                                      • API String ID: 1464919966-438819550
                                                                      • Opcode ID: bec181b856445a9e1d3178571238d748e983cabcfd10a5dd346152dfd1368d40
                                                                      • Instruction ID: 5809cb3e346dc20208f9be8b163a43a1eb8a423dbd4896b057b25540af12e868
                                                                      • Opcode Fuzzy Hash: bec181b856445a9e1d3178571238d748e983cabcfd10a5dd346152dfd1368d40
                                                                      • Instruction Fuzzy Hash: 98616B765043069FCB10EF60D8459AEBBE8FF8A314F04491DF989D7251EB31E949CB92
                                                                      APIs
                                                                        • Part of subcall function 00523AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00523A97,?,?,00522E7F,?,?,?,00000000), ref: 00523AC2
                                                                        • Part of subcall function 0058E199: GetFileAttributesW.KERNEL32(?,0058CF95), ref: 0058E19A
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0058D122
                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0058D1DD
                                                                      • MoveFileW.KERNEL32(?,?), ref: 0058D1F0
                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0058D20D
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0058D237
                                                                        • Part of subcall function 0058D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0058D21C,?,?), ref: 0058D2B2
                                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 0058D253
                                                                      • FindClose.KERNEL32(00000000), ref: 0058D264
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                      • String ID: \*.*
                                                                      • API String ID: 1946585618-1173974218
                                                                      • Opcode ID: 43d9bd3c73dfa7ecd5d853fdbaf127adcce51d294d71158501131db58efcc2cb
                                                                      • Instruction ID: d369d980a58f60ed01cf38416a8947b8dd08ba550a1696f697079b6741279e82
                                                                      • Opcode Fuzzy Hash: 43d9bd3c73dfa7ecd5d853fdbaf127adcce51d294d71158501131db58efcc2cb
                                                                      • Instruction Fuzzy Hash: 9A61383580111EAACF05FBA0E99A9EDBFB5BF96300F244165E802771D1EB316F09DB60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                      • String ID:
                                                                      • API String ID: 1737998785-0
                                                                      • Opcode ID: 1cc71ea80e882ab6753e5540dd050e8509ec5e23ecba95f6e1b7c338ede9f4cb
                                                                      • Instruction ID: 747540d70e86a058ab9fe120284dd42ea2bdc44da4696c154228fbf674e0f511
                                                                      • Opcode Fuzzy Hash: 1cc71ea80e882ab6753e5540dd050e8509ec5e23ecba95f6e1b7c338ede9f4cb
                                                                      • Instruction Fuzzy Hash: 7141AB35204612AFEB20CF19E88AF1ABFA5FF55328F148599E4158B6A2C735FC41CB90
                                                                      APIs
                                                                        • Part of subcall function 005816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0058170D
                                                                        • Part of subcall function 005816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0058173A
                                                                        • Part of subcall function 005816C3: GetLastError.KERNEL32 ref: 0058174A
                                                                      • ExitWindowsEx.USER32(?,00000000), ref: 0058E932
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                      • String ID: $ $@$SeShutdownPrivilege
                                                                      • API String ID: 2234035333-3163812486
                                                                      • Opcode ID: ebab04642497bfd48653ed06db6407227cf915a627293f090f30111a15866061
                                                                      • Instruction ID: 5524edb452c36f95e3b8618e51ffe52dad80dbc3467d789680e6fa254d31fb53
                                                                      • Opcode Fuzzy Hash: ebab04642497bfd48653ed06db6407227cf915a627293f090f30111a15866061
                                                                      • Instruction Fuzzy Hash: 0B01F232610211ABEB6432B49C8BBBB7A6CB714750F140921FC02F21E2D6E0AC4493A4
                                                                      APIs
                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 005A1276
                                                                      • WSAGetLastError.WSOCK32 ref: 005A1283
                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 005A12BA
                                                                      • WSAGetLastError.WSOCK32 ref: 005A12C5
                                                                      • closesocket.WSOCK32(00000000), ref: 005A12F4
                                                                      • listen.WSOCK32(00000000,00000005), ref: 005A1303
                                                                      • WSAGetLastError.WSOCK32 ref: 005A130D
                                                                      • closesocket.WSOCK32(00000000), ref: 005A133C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                                      • String ID:
                                                                      • API String ID: 540024437-0
                                                                      • Opcode ID: 854b87973d0db3c7b0c666c80cad9025267c2c14b73f0b3b6f599e138b0ae0c0
                                                                      • Instruction ID: dd42b26c3beceaf0551757666b2d5c20a227711a2bd6c8a6ee33f56b47d88c5f
                                                                      • Opcode Fuzzy Hash: 854b87973d0db3c7b0c666c80cad9025267c2c14b73f0b3b6f599e138b0ae0c0
                                                                      • Instruction Fuzzy Hash: 0B41AE35A005119FD710DF24D488B2ABFE6BF86318F188188E8568F2D2C771EC85CBE4
                                                                      APIs
                                                                      • _free.LIBCMT ref: 0055B9D4
                                                                      • _free.LIBCMT ref: 0055B9F8
                                                                      • _free.LIBCMT ref: 0055BB7F
                                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,005C3700), ref: 0055BB91
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,005F121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0055BC09
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,005F1270,000000FF,?,0000003F,00000000,?), ref: 0055BC36
                                                                      • _free.LIBCMT ref: 0055BD4B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                      • String ID:
                                                                      • API String ID: 314583886-0
                                                                      • Opcode ID: 971579f0507ae68173c9e49ea6b98471a2cd8b850fb19254700ad060e81ba726
                                                                      • Instruction ID: a40cb08f02d5552ac02949d56e81f551c5e0d5db5625509b394a1d174af381c9
                                                                      • Opcode Fuzzy Hash: 971579f0507ae68173c9e49ea6b98471a2cd8b850fb19254700ad060e81ba726
                                                                      • Instruction Fuzzy Hash: B8C12571904206AFEB209F69C869BAE7FB8FF81312F14459BEC94D7291E7308E49C750
                                                                      APIs
                                                                        • Part of subcall function 00523AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00523A97,?,?,00522E7F,?,?,?,00000000), ref: 00523AC2
                                                                        • Part of subcall function 0058E199: GetFileAttributesW.KERNEL32(?,0058CF95), ref: 0058E19A
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0058D420
                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0058D470
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0058D481
                                                                      • FindClose.KERNEL32(00000000), ref: 0058D498
                                                                      • FindClose.KERNEL32(00000000), ref: 0058D4A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                      • String ID: \*.*
                                                                      • API String ID: 2649000838-1173974218
                                                                      • Opcode ID: 54f357366184de507e68fb1280c809102e08015f0fdee7875c87e54b589d3ee3
                                                                      • Instruction ID: c144fac0c53bb3324955f3ed78560de4d8225061c92a60f1b6eb298547c50fa1
                                                                      • Opcode Fuzzy Hash: 54f357366184de507e68fb1280c809102e08015f0fdee7875c87e54b589d3ee3
                                                                      • Instruction Fuzzy Hash: 32315E710083569BC704EF64D8558AFBFE8BEE2310F444E1DF8D1521E1EB64AA0DDB62
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: __floor_pentium4
                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                      • API String ID: 4168288129-2761157908
                                                                      • Opcode ID: 270e82af8f719929ccff3af275010a6692b686473ea660f5a612bfbd9f0220e9
                                                                      • Instruction ID: 5b17fbd1502d3c2d0758b6ce0b22298ec9fd4794f34abb869d975b2c37799686
                                                                      • Opcode Fuzzy Hash: 270e82af8f719929ccff3af275010a6692b686473ea660f5a612bfbd9f0220e9
                                                                      • Instruction Fuzzy Hash: 00C25B71D046288FDB29CE28DD557EABBB5FB44306F1445EAD80DE7240E774AE898F40
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 005964DC
                                                                      • CoInitialize.OLE32(00000000), ref: 00596639
                                                                      • CoCreateInstance.OLE32(005BFCF8,00000000,00000001,005BFB68,?), ref: 00596650
                                                                      • CoUninitialize.OLE32 ref: 005968D4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                      • String ID: .lnk
                                                                      • API String ID: 886957087-24824748
                                                                      • Opcode ID: 94da644d646847cb68502ba6eb86558f6492ce4f4b4c5d151016ff863b0f67d6
                                                                      • Instruction ID: 07d2931181623a4a3546ca39d2d6ab80cae032c17fc9a9e76a517a624b6592c2
                                                                      • Opcode Fuzzy Hash: 94da644d646847cb68502ba6eb86558f6492ce4f4b4c5d151016ff863b0f67d6
                                                                      • Instruction Fuzzy Hash: 25D14871508212AFC704EF24D89596BBBE8FFD9304F40496DF5958B2A1EB70ED09CB92
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 005A22E8
                                                                        • Part of subcall function 0059E4EC: GetWindowRect.USER32(?,?), ref: 0059E504
                                                                      • GetDesktopWindow.USER32 ref: 005A2312
                                                                      • GetWindowRect.USER32(00000000), ref: 005A2319
                                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 005A2355
                                                                      • GetCursorPos.USER32(?), ref: 005A2381
                                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 005A23DF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                      • String ID:
                                                                      • API String ID: 2387181109-0
                                                                      • Opcode ID: d4ad085e9259bee45e9b7a95f92969a825c6c45d36df401fcc60f7b3848d9465
                                                                      • Instruction ID: 82bb8c495bdf1294c51f8c7c8384fbbcaf6066222db11766094042bb8e10c88e
                                                                      • Opcode Fuzzy Hash: d4ad085e9259bee45e9b7a95f92969a825c6c45d36df401fcc60f7b3848d9465
                                                                      • Instruction Fuzzy Hash: 2B31D072504315AFCB20DF18C84AF5FBBA9FF86310F000A1AF985A7181DB34E908CB92
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00599B78
                                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00599C8B
                                                                        • Part of subcall function 00593874: GetInputState.USER32 ref: 005938CB
                                                                        • Part of subcall function 00593874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00593966
                                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00599BA8
                                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00599C75
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                      • String ID: *.*
                                                                      • API String ID: 1972594611-438819550
                                                                      • Opcode ID: 02a7027c82959f8a28c62721a65f8ea0164d78fae5f903d37e2d4837b27c0bc9
                                                                      • Instruction ID: 23fc1e6aaf6a3758c0699e7d266a05eebcaa443a4f92c23cd45538de40f03fde
                                                                      • Opcode Fuzzy Hash: 02a7027c82959f8a28c62721a65f8ea0164d78fae5f903d37e2d4837b27c0bc9
                                                                      • Instruction Fuzzy Hash: 8B41817190420A9FCF54DF68DC89AEEBFB8FF55310F24455AE805A2191EB34AE44CF60
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00539A4E
                                                                      • GetSysColor.USER32(0000000F), ref: 00539B23
                                                                      • SetBkColor.GDI32(?,00000000), ref: 00539B36
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Color$LongProcWindow
                                                                      • String ID:
                                                                      • API String ID: 3131106179-0
                                                                      • Opcode ID: 3f200f1af817ad29d608863bfef4d436441d6ffef190891a1334b009263630f4
                                                                      • Instruction ID: d8c331868d1dae48e11aa02b5ac52ba979acd3f6e52fa5bdeae33f168400d2ad
                                                                      • Opcode Fuzzy Hash: 3f200f1af817ad29d608863bfef4d436441d6ffef190891a1334b009263630f4
                                                                      • Instruction Fuzzy Hash: 4DA13BF1108408EEE7299A3DAC9DEBB3F9DFBC6340F154709F102C6695CAA59D01E276
                                                                      APIs
                                                                        • Part of subcall function 005A304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 005A307A
                                                                        • Part of subcall function 005A304E: _wcslen.LIBCMT ref: 005A309B
                                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 005A185D
                                                                      • WSAGetLastError.WSOCK32 ref: 005A1884
                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 005A18DB
                                                                      • WSAGetLastError.WSOCK32 ref: 005A18E6
                                                                      • closesocket.WSOCK32(00000000), ref: 005A1915
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                      • String ID:
                                                                      • API String ID: 1601658205-0
                                                                      • Opcode ID: 21e2cb04f8068c5c7ed881454dcbb1f84c6179bc4df259438e3a3e4cd8358b4c
                                                                      • Instruction ID: dbcd311a1f9bf064e5d79897a0cffc6a0edc89682c73e4d6452d029cb232ce47
                                                                      • Opcode Fuzzy Hash: 21e2cb04f8068c5c7ed881454dcbb1f84c6179bc4df259438e3a3e4cd8358b4c
                                                                      • Instruction Fuzzy Hash: C451A175A002119FDB10AF24D88AF2A7FE5BF8A718F148458F9065F3C3D775AD418BA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                      • API String ID: 0-1546025612
                                                                      • Opcode ID: 6a98c377d146df82b8d4df7b7aff2916d9be258315c13b6292e4d31a0dff60de
                                                                      • Instruction ID: f84189122a6814540795e612f435b201461c49c04e4ec39bed028e98e7eef327
                                                                      • Opcode Fuzzy Hash: 6a98c377d146df82b8d4df7b7aff2916d9be258315c13b6292e4d31a0dff60de
                                                                      • Instruction Fuzzy Hash: 8EA29F74E0162ACBDF24CF98D8847BDBBB1BF55310F2485AAD815A7385EB709D81CB90
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 005882AA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: ($tb^$|
                                                                      • API String ID: 1659193697-2919713065
                                                                      • Opcode ID: e6d7400c189849ddfaf701810f19d9e41bf96ca38df6767ac4cebee49bf29014
                                                                      • Instruction ID: a0e797eaacda442ed6052325d63aaedd7f8e3a6496b188f058efb54f25828086
                                                                      • Opcode Fuzzy Hash: e6d7400c189849ddfaf701810f19d9e41bf96ca38df6767ac4cebee49bf29014
                                                                      • Instruction Fuzzy Hash: 0B324874A00605DFC728DF59C48196ABBF0FF48710B55C96EE89AEB3A1EB70E941CB40
                                                                      APIs
                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 005AA6AC
                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 005AA6BA
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 005AA79C
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005AA7AB
                                                                        • Part of subcall function 0053CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00563303,?), ref: 0053CE8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                      • String ID:
                                                                      • API String ID: 1991900642-0
                                                                      • Opcode ID: 74f0e50f03811f82e38c2159ede280d498009bd91bdd2dcc5b41c7124d37a96e
                                                                      • Instruction ID: 0884d86eb73eb2628b7b2bafda021028d55520ef7fe6417f3e489870932fa895
                                                                      • Opcode Fuzzy Hash: 74f0e50f03811f82e38c2159ede280d498009bd91bdd2dcc5b41c7124d37a96e
                                                                      • Instruction Fuzzy Hash: 7A511A71508311AFD710DF24D88AA6BBBE8FFCA754F00492DF58597291EB30E904CB92
                                                                      APIs
                                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0058AAAC
                                                                      • SetKeyboardState.USER32(00000080), ref: 0058AAC8
                                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0058AB36
                                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0058AB88
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                      • String ID:
                                                                      • API String ID: 432972143-0
                                                                      • Opcode ID: 4c2cecbf09c7c143cbce8c46db7861497f4dddb77986006488d93a9e904b09fa
                                                                      • Instruction ID: 97f2b8493bccd93bbecfee0a9e361739c94259280e9421e1c2df07416ad5a095
                                                                      • Opcode Fuzzy Hash: 4c2cecbf09c7c143cbce8c46db7861497f4dddb77986006488d93a9e904b09fa
                                                                      • Instruction Fuzzy Hash: 98312A30A40248AEFF35EB64CC05BFA7FAABB44311F04421BF881761D0D7759985D766
                                                                      APIs
                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 0059CE89
                                                                      • GetLastError.KERNEL32(?,00000000), ref: 0059CEEA
                                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 0059CEFE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventFileInternetLastRead
                                                                      • String ID:
                                                                      • API String ID: 234945975-0
                                                                      • Opcode ID: afcbc7ba9b30ef9ae2db3d83ba9a828c133604f1beb4afb6dd18a4ea0fb43956
                                                                      • Instruction ID: d93e32231076b748b17edfcdde169a9b4cf2e75910d84ba0c69b3bd540e6d73c
                                                                      • Opcode Fuzzy Hash: afcbc7ba9b30ef9ae2db3d83ba9a828c133604f1beb4afb6dd18a4ea0fb43956
                                                                      • Instruction Fuzzy Hash: F521BAB1500705ABEB21CFA5C949BAABFFCFB50358F10482EE546D2151E770EE089B64
                                                                      APIs
                                                                      • IsDebuggerPresent.KERNEL32 ref: 0055271A
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00552724
                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00552731
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                      • String ID:
                                                                      • API String ID: 3906539128-0
                                                                      • Opcode ID: c42933428ec6f2c9e7df692ca5197d86cee94bf5f74b978a3279f54ca43372f2
                                                                      • Instruction ID: 8ceaecbb6f986dff374f0e2de2b60d202fcfa249452cfd93569a063368636637
                                                                      • Opcode Fuzzy Hash: c42933428ec6f2c9e7df692ca5197d86cee94bf5f74b978a3279f54ca43372f2
                                                                      • Instruction Fuzzy Hash: 0931D5749112299BCB21DF64DC88BDCBBB8BF18310F5046EAE80CA7261E7309F858F45
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 005951DA
                                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00595238
                                                                      • SetErrorMode.KERNEL32(00000000), ref: 005952A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$DiskFreeSpace
                                                                      • String ID:
                                                                      • API String ID: 1682464887-0
                                                                      • Opcode ID: b692298865f49fbbdc4f2fe656fb316d2dded051229cf81c645c00ede65f5c04
                                                                      • Instruction ID: 5743c68438eb994fd05d7ec25d7dbb2178ce368ec922a2681aee6184727420f7
                                                                      • Opcode Fuzzy Hash: b692298865f49fbbdc4f2fe656fb316d2dded051229cf81c645c00ede65f5c04
                                                                      • Instruction Fuzzy Hash: 74313075A00519DFDB00DF54D888EADBFB4FF49314F088099E845AB392DB31E859CB90
                                                                      APIs
                                                                        • Part of subcall function 0053FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00540668
                                                                        • Part of subcall function 0053FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00540685
                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0058170D
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0058173A
                                                                      • GetLastError.KERNEL32 ref: 0058174A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                      • String ID:
                                                                      • API String ID: 577356006-0
                                                                      • Opcode ID: 3fde63756b0e981fae907f9d44ccdf3e5f7d7a0f826a17d4ebe1a374ecf91e95
                                                                      • Instruction ID: 48d4276cc81f6d741358fe1912d3e4c138c8983232b36b40f38fbdec5a5707d5
                                                                      • Opcode Fuzzy Hash: 3fde63756b0e981fae907f9d44ccdf3e5f7d7a0f826a17d4ebe1a374ecf91e95
                                                                      • Instruction Fuzzy Hash: 9F11C1B2800309AFD718AF54DC8AD6ABBBDFF44714B20852EF45697241EB70BC428B24
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0058D608
                                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0058D645
                                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0058D650
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                                      • String ID:
                                                                      • API String ID: 33631002-0
                                                                      • Opcode ID: 4128b3dc7e5946bbe2c4a266521215dd271ea2ce4da70d1edc817b32bdf82221
                                                                      • Instruction ID: 27463f5c8fbc0ca1a08e2e06f4f330540175e3de79a445e5130624630b9ae9cf
                                                                      • Opcode Fuzzy Hash: 4128b3dc7e5946bbe2c4a266521215dd271ea2ce4da70d1edc817b32bdf82221
                                                                      • Instruction Fuzzy Hash: C7117C75E05228BBDB108F99AC45FAFBFBCEB45B50F108121F904F7290D2705A058BA1
                                                                      APIs
                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0058168C
                                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 005816A1
                                                                      • FreeSid.ADVAPI32(?), ref: 005816B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                      • String ID:
                                                                      • API String ID: 3429775523-0
                                                                      • Opcode ID: f08ef81f01e0f30bb337a305e26c3cb086f34915cae8c865f3ebfd543075a2c9
                                                                      • Instruction ID: 099d2c6982bcc3866ab4280089988402ccc7ddd7bdec06c0a1820e77c7046214
                                                                      • Opcode Fuzzy Hash: f08ef81f01e0f30bb337a305e26c3cb086f34915cae8c865f3ebfd543075a2c9
                                                                      • Instruction Fuzzy Hash: B9F0F47195030DFBEB00EFE49D89AAEBBBCFB08604F504565E901E2181E774AA489B64
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(005528E9,?,00544CBE,005528E9,005E88B8,0000000C,00544E15,005528E9,00000002,00000000,?,005528E9), ref: 00544D09
                                                                      • TerminateProcess.KERNEL32(00000000,?,00544CBE,005528E9,005E88B8,0000000C,00544E15,005528E9,00000002,00000000,?,005528E9), ref: 00544D10
                                                                      • ExitProcess.KERNEL32 ref: 00544D22
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: d61d3f07d13f31ac19f38e5403948f44730ae360eff9e533d2c0b6c82957f600
                                                                      • Instruction ID: 09101f74300c55828b291a5f21ab734a84c00d91090503c4b86a725d308386d6
                                                                      • Opcode Fuzzy Hash: d61d3f07d13f31ac19f38e5403948f44730ae360eff9e533d2c0b6c82957f600
                                                                      • Instruction Fuzzy Hash: B1E0B631440149ABCF51AF54DD19A983FA9FB91785B504518FC099B122CB35ED46DE84
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /
                                                                      • API String ID: 0-2043925204
                                                                      • Opcode ID: 683606b70b4871a4d93eed289c0310ad9b16e7ace1456070972028bb105bddfb
                                                                      • Instruction ID: f613d724deb936510384b32ae3f3c9b7f65dc76bd5745008ba0653026a241147
                                                                      • Opcode Fuzzy Hash: 683606b70b4871a4d93eed289c0310ad9b16e7ace1456070972028bb105bddfb
                                                                      • Instruction Fuzzy Hash: FF412676500319AFCB209FB9CC59DAB7FB8FB84316F50466AFD05C7180E6709D858B50
                                                                      APIs
                                                                      • GetUserNameW.ADVAPI32(?,?), ref: 0057D28C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: NameUser
                                                                      • String ID: X64
                                                                      • API String ID: 2645101109-893830106
                                                                      • Opcode ID: 55a1f7998c889c0e145b9e44322e2e6ea59e07da1280ccb9978184d0d04acd94
                                                                      • Instruction ID: 5b79255bd5d54936a68d8db6b98bd36693e9f0e0e8edb3ba0820c96ecaa7ffd0
                                                                      • Opcode Fuzzy Hash: 55a1f7998c889c0e145b9e44322e2e6ea59e07da1280ccb9978184d0d04acd94
                                                                      • Instruction Fuzzy Hash: 09D0E9B581511DEBCB94DB90EC8CDDDBB7CBB14345F104656F506A2140DB7495499F20
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                      • Instruction ID: 298023b276c343e6f763899e538c1dcad4de91f1b049a0b49dd41e346fef65e3
                                                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                      • Instruction Fuzzy Hash: 73021B71E012199BDF54CFA9C8806EDBFF5FF88318F258169D919EB280D731AE418B94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Variable is not of type 'Object'.$p#_
                                                                      • API String ID: 0-2852649800
                                                                      • Opcode ID: 7eece69babbd7c5fe8104ad57fe3ddbcd423295d8bfa063781d699b767dfba41
                                                                      • Instruction ID: c8c53c734ec7038e037ac80836c7239124f725786ebe372e8709ed901d0e41b7
                                                                      • Opcode Fuzzy Hash: 7eece69babbd7c5fe8104ad57fe3ddbcd423295d8bfa063781d699b767dfba41
                                                                      • Instruction Fuzzy Hash: AF32AE70900229DFCF14DF90E985AEDBFB9BF46304F108459E80AAB2C2D775AE45DB60
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00596918
                                                                      • FindClose.KERNEL32(00000000), ref: 00596961
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID:
                                                                      • API String ID: 2295610775-0
                                                                      • Opcode ID: 469148834dc9382723bb107a2b0a79d65ce5fd70e5e413222562c87b2c6aebdc
                                                                      • Instruction ID: 1e2b4b947334c53d22e574b1acfe0486ab57cb3e893953f9b8730f2c6b14bb35
                                                                      • Opcode Fuzzy Hash: 469148834dc9382723bb107a2b0a79d65ce5fd70e5e413222562c87b2c6aebdc
                                                                      • Instruction Fuzzy Hash: E6118E356042119FCB10DF29D488A1ABFE5FF89328F14C699E4698F7A2C730EC09CB91
                                                                      APIs
                                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,005A4891,?,?,00000035,?), ref: 005937E4
                                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,005A4891,?,?,00000035,?), ref: 005937F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFormatLastMessage
                                                                      • String ID:
                                                                      • API String ID: 3479602957-0
                                                                      • Opcode ID: f4907163bf7f0781ba7a1a055082710496056564503905ed8c73eec060d1cba2
                                                                      • Instruction ID: a8503a44258d9f25ea16e360f9448f30ba142f3f96d9bfd7ff77a2837039a0c1
                                                                      • Opcode Fuzzy Hash: f4907163bf7f0781ba7a1a055082710496056564503905ed8c73eec060d1cba2
                                                                      • Instruction Fuzzy Hash: 5BF0E5B06042296AEB6057A69C4DFEB7FAEFFC5761F000275F509E2291D9609E08C6B0
                                                                      APIs
                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0058B25D
                                                                      • keybd_event.USER32(?,753DC0D0,?,00000000), ref: 0058B270
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: InputSendkeybd_event
                                                                      • String ID:
                                                                      • API String ID: 3536248340-0
                                                                      • Opcode ID: d643928a2fcb8f3fb0b5b9965800665e0a90fba68f349bf03904f7e01c9825a7
                                                                      • Instruction ID: ee25af8331d9e113681f61b01e7ab82fccf6657bbdfd78a46aec236d44d9ad39
                                                                      • Opcode Fuzzy Hash: d643928a2fcb8f3fb0b5b9965800665e0a90fba68f349bf03904f7e01c9825a7
                                                                      • Instruction Fuzzy Hash: D9F06D7480424DABEB059FA0C805BEE7FB4FF04305F008009F951A5191C37992059F98
                                                                      APIs
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005811FC), ref: 005810D4
                                                                      • CloseHandle.KERNEL32(?,?,005811FC), ref: 005810E9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                      • String ID:
                                                                      • API String ID: 81990902-0
                                                                      • Opcode ID: 2b7439b1b7a542e32705d8f136a697b1f45989b58f9ba93e5adc88e6de1fa866
                                                                      • Instruction ID: 624df70db57487e106c9027de9d5d1f343f993363273f19fe3e389bd8d162fcf
                                                                      • Opcode Fuzzy Hash: 2b7439b1b7a542e32705d8f136a697b1f45989b58f9ba93e5adc88e6de1fa866
                                                                      • Instruction Fuzzy Hash: 4FE01A32408601AFE7652B11FC09E777BA9FB04310F10892DB4A5804B1DA626C90AB14
                                                                      APIs
                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00556766,?,?,00000008,?,?,0055FEFE,00000000), ref: 00556998
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise
                                                                      • String ID:
                                                                      • API String ID: 3997070919-0
                                                                      • Opcode ID: eb3fb4703aff2b4d2db4eab4be3c84e89942e350930c620dd26e3872dd276da1
                                                                      • Instruction ID: be0647259083dfc94fb39e1a660208a531e896f27706b15544469f9e19486d70
                                                                      • Opcode Fuzzy Hash: eb3fb4703aff2b4d2db4eab4be3c84e89942e350930c620dd26e3872dd276da1
                                                                      • Instruction Fuzzy Hash: 70B16931610648CFD714CF28C4AAB647FE0FF45366F698659E899CF2A2C335E989CB40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID: 0-3916222277
                                                                      • Opcode ID: 8d7092839258fdb065e7bc03a16b68e70d91003e84701a08c0ce4cc3c19d5db5
                                                                      • Instruction ID: a360b6c2368668ef327a14b7f3bea1a79f6ceda705ba80197359208c3035dae8
                                                                      • Opcode Fuzzy Hash: 8d7092839258fdb065e7bc03a16b68e70d91003e84701a08c0ce4cc3c19d5db5
                                                                      • Instruction Fuzzy Hash: F8127F759002299FDF24CF58D8846FEBBB5FF48310F14859AE949EB251EB309E81DB90
                                                                      APIs
                                                                      • BlockInput.USER32(00000001), ref: 0059EABD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: BlockInput
                                                                      • String ID:
                                                                      • API String ID: 3456056419-0
                                                                      • Opcode ID: cd5d9427e47f368023d2b7db4f1f3a20df8993fc76e5ea886ee1bd6a6ab761b2
                                                                      • Instruction ID: bd3c33d94cf1a79872435995327a240dc82bea7900af0011da493ee611484129
                                                                      • Opcode Fuzzy Hash: cd5d9427e47f368023d2b7db4f1f3a20df8993fc76e5ea886ee1bd6a6ab761b2
                                                                      • Instruction Fuzzy Hash: 9BE01A312002159FD710EF59E809E9ABFEDBF99760F048426FC49CB3A1DA70A8418BA0
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,005403EE), ref: 005409DA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled
                                                                      • String ID:
                                                                      • API String ID: 3192549508-0
                                                                      • Opcode ID: 72f1158fc07eb1971defa4271aa0591251f17acea7aeb70d35eb1b390729a938
                                                                      • Instruction ID: dc03e6309c38e32813b40e54b278447e0b8018a125b82aa77e8a720caa747d58
                                                                      • Opcode Fuzzy Hash: 72f1158fc07eb1971defa4271aa0591251f17acea7aeb70d35eb1b390729a938
                                                                      • Instruction Fuzzy Hash:
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0
                                                                      • API String ID: 0-4108050209
                                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                      • Instruction ID: 2982b3aee6f819efad9bb2ced9b726ebd9f251535f2dc336b059c0873ca29312
                                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                      • Instruction Fuzzy Hash: CF51787160C74E6BDB388568885E7FE2F99BB5E34CF180909D882D7282C715DE05D356
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0&_
                                                                      • API String ID: 0-3810587587
                                                                      • Opcode ID: 00f6d967899b69f22ba60262181f5b6c20b0547ce6a388906bb23abaa5f4fc89
                                                                      • Instruction ID: a00096c8e15a64b1a1d52556c034d31f393ad23b48284e4ac6825706b9206692
                                                                      • Opcode Fuzzy Hash: 00f6d967899b69f22ba60262181f5b6c20b0547ce6a388906bb23abaa5f4fc89
                                                                      • Instruction Fuzzy Hash: 7F21EB722605118BDB28CF79C81767E77E5B764310F14862EE4A7C33D0DE39A904D780
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a0d06863634491cb1e68ba55b75149067cc82f3668aa753b43277aa332053c6e
                                                                      • Instruction ID: 2324f523a7959630fb1543e23f0de0fbc41daabcc3fecb5a793f4795f2207e23
                                                                      • Opcode Fuzzy Hash: a0d06863634491cb1e68ba55b75149067cc82f3668aa753b43277aa332053c6e
                                                                      • Instruction Fuzzy Hash: B5321231D29F054ED7239634D8323356A8DAFBB3C6F15D737E81AB59A6EB28C4875100
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3e9dd1a8b03e609aa2a575109a9db1c38f3760dbb4c7490d0898de98ab14caa
                                                                      • Instruction ID: 020ab6963242bbee3810b0a2cd9cc19c8f9d8f2c76e0d91ddc28d94e250b512c
                                                                      • Opcode Fuzzy Hash: b3e9dd1a8b03e609aa2a575109a9db1c38f3760dbb4c7490d0898de98ab14caa
                                                                      • Instruction Fuzzy Hash: 0232E431A001598BDF28CE29E4D467D7FA1FB45300F68C56ED8AEAB691D630DD82FB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c98139c68aeaa94cbc4733870a5c26eaeb3a91a4146e9b4c4c43989419030c0b
                                                                      • Instruction ID: 2812b4b42a969531758c32d3af9f759225ddacead881b4b2cc9c16f4c7f91df1
                                                                      • Opcode Fuzzy Hash: c98139c68aeaa94cbc4733870a5c26eaeb3a91a4146e9b4c4c43989419030c0b
                                                                      • Instruction Fuzzy Hash: 8122C170A0061ADFDF14CF64D885AAEBBF5FF49300F244929E816AB291FB35AD54CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7367dd3caa1cd0b397a637dd44544bb763e356029ca023c8cfcb2241a165f9d7
                                                                      • Instruction ID: 2f13ac7c6ac00a0b3265dbebec7ca7a1eebfd413d83c7a0c415e2f4537489168
                                                                      • Opcode Fuzzy Hash: 7367dd3caa1cd0b397a637dd44544bb763e356029ca023c8cfcb2241a165f9d7
                                                                      • Instruction Fuzzy Hash: 2E02C8B4E00216EFDB04DF54D886AAEBFB5FF54304F108569E8069B391EB319E24DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction ID: f234e420d3a8d22b7616f7688606ab7f66d903221a0966cd85f68b69992e8d80
                                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction Fuzzy Hash: 9C9156722098E34ADB2D467A85740BDFFE1AA923A931E079DD4F2CB1C1FE24C5D4D624
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d567c7d8081fdac1fe5f29c6e0ea78303345414c79f9ae39e4341439262b465
                                                                      • Instruction ID: 7fb82730e0bdb3e39c6da4c8e6a99491298fe8288bae887b1373956e7315f270
                                                                      • Opcode Fuzzy Hash: 9d567c7d8081fdac1fe5f29c6e0ea78303345414c79f9ae39e4341439262b465
                                                                      • Instruction Fuzzy Hash: D2617A71208B4E56DE389A288C99BFE3F94FF8D70CF140D19E982DB281E7119E42C355
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction ID: 56a562c5ed29c650a1cbe5b54aa76d3862873eb88f84cb65d8c2c598331fde4e
                                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction Fuzzy Hash: 6F8185326084E349DB6D423A85340BEFFE1BA923A931A079DD4F2CB1C1FE24C594E624
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                      • Instruction ID: 8b9909ba91fc303314a2e5c57e9e3a767e52425dd5744adb0328e31a17033ee5
                                                                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                      • Instruction Fuzzy Hash: 6541C171D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                      • Instruction ID: 19c7fcd7e63fa2bd16ff57f40069190e611338b743886f0cb83e1790cd9a9695
                                                                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                      • Instruction Fuzzy Hash: 67019D78A00219EFCB48DF98C5949AEFBF5FB48314F208599E809A7741E730AE41DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                      • Instruction ID: 1d9ac37c2afb44b31a6518b3a6143e03edf4979d8f6b005e4e6d6cae90f663bd
                                                                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                      • Instruction Fuzzy Hash: 65019278A00209EFCB44DF98C5949AEFBF5FB88314F208599D909A7745E730AE41DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1441298743.00000000013E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 013E3000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_13e3000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                                      APIs
                                                                      • DeleteObject.GDI32(00000000), ref: 005A2B30
                                                                      • DeleteObject.GDI32(00000000), ref: 005A2B43
                                                                      • DestroyWindow.USER32 ref: 005A2B52
                                                                      • GetDesktopWindow.USER32 ref: 005A2B6D
                                                                      • GetWindowRect.USER32(00000000), ref: 005A2B74
                                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 005A2CA3
                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 005A2CB1
                                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2CF8
                                                                      • GetClientRect.USER32(00000000,?), ref: 005A2D04
                                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 005A2D40
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2D62
                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2D75
                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2D80
                                                                      • GlobalLock.KERNEL32(00000000), ref: 005A2D89
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2D98
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 005A2DA1
                                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2DA8
                                                                      • GlobalFree.KERNEL32(00000000), ref: 005A2DB3
                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2DC5
                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,005BFC38,00000000), ref: 005A2DDB
                                                                      • GlobalFree.KERNEL32(00000000), ref: 005A2DEB
                                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 005A2E11
                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 005A2E30
                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A2E52
                                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005A303F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                      • String ID: $@U=u$AutoIt v3$DISPLAY$static
                                                                      • API String ID: 2211948467-3613752883
                                                                      • Opcode ID: ce2162083dfa7dc74e2bd0e2034ca7a43e71eead069cf4dc82d25ab8ca4a1458
                                                                      • Instruction ID: 2c3951be3dd0f21bc57b104fc96809edb3c23ace9ad10c020b00858bcd6c1ccb
                                                                      • Opcode Fuzzy Hash: ce2162083dfa7dc74e2bd0e2034ca7a43e71eead069cf4dc82d25ab8ca4a1458
                                                                      • Instruction Fuzzy Hash: D8027C71A00219AFDB14DF68CC89EAE7FB9FF49310F008558F915AB2A1DB34AD05DB64
                                                                      APIs
                                                                      • SetTextColor.GDI32(?,00000000), ref: 005B712F
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 005B7160
                                                                      • GetSysColor.USER32(0000000F), ref: 005B716C
                                                                      • SetBkColor.GDI32(?,000000FF), ref: 005B7186
                                                                      • SelectObject.GDI32(?,?), ref: 005B7195
                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 005B71C0
                                                                      • GetSysColor.USER32(00000010), ref: 005B71C8
                                                                      • CreateSolidBrush.GDI32(00000000), ref: 005B71CF
                                                                      • FrameRect.USER32(?,?,00000000), ref: 005B71DE
                                                                      • DeleteObject.GDI32(00000000), ref: 005B71E5
                                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 005B7230
                                                                      • FillRect.USER32(?,?,?), ref: 005B7262
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 005B7284
                                                                        • Part of subcall function 005B73E8: GetSysColor.USER32(00000012), ref: 005B7421
                                                                        • Part of subcall function 005B73E8: SetTextColor.GDI32(?,?), ref: 005B7425
                                                                        • Part of subcall function 005B73E8: GetSysColorBrush.USER32(0000000F), ref: 005B743B
                                                                        • Part of subcall function 005B73E8: GetSysColor.USER32(0000000F), ref: 005B7446
                                                                        • Part of subcall function 005B73E8: GetSysColor.USER32(00000011), ref: 005B7463
                                                                        • Part of subcall function 005B73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 005B7471
                                                                        • Part of subcall function 005B73E8: SelectObject.GDI32(?,00000000), ref: 005B7482
                                                                        • Part of subcall function 005B73E8: SetBkColor.GDI32(?,00000000), ref: 005B748B
                                                                        • Part of subcall function 005B73E8: SelectObject.GDI32(?,?), ref: 005B7498
                                                                        • Part of subcall function 005B73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 005B74B7
                                                                        • Part of subcall function 005B73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005B74CE
                                                                        • Part of subcall function 005B73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 005B74DB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                      • String ID: @U=u
                                                                      • API String ID: 4124339563-2594219639
                                                                      • Opcode ID: f5d138d0bcfa7f3f59599f9238a249ac0a7f2c8468d6f950ccdf60a9b494cb0f
                                                                      • Instruction ID: dfd72859a4bc2c3b87a1a0bc421368f5ba2c8d214a1fb85b0df507dc4ec7d098
                                                                      • Opcode Fuzzy Hash: f5d138d0bcfa7f3f59599f9238a249ac0a7f2c8468d6f950ccdf60a9b494cb0f
                                                                      • Instruction Fuzzy Hash: CCA1A172008305AFD7509F64DC48E9BBFA9FB98320F100B19F9A2A61E1D771F948DB65
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,?), ref: 00538E14
                                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00576AC5
                                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00576AFE
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00576F43
                                                                        • Part of subcall function 00538F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00538BE8,?,00000000,?,?,?,?,00538BBA,00000000,?), ref: 00538FC5
                                                                      • SendMessageW.USER32(?,00001053), ref: 00576F7F
                                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00576F96
                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00576FAC
                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00576FB7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                      • String ID: 0$@U=u
                                                                      • API String ID: 2760611726-975001249
                                                                      • Opcode ID: 2e4e11202a0610b3d9dfa06ff83f12cb7a67f4e62f8888e28e9331c38feae646
                                                                      • Instruction ID: a100b8b35626c8abdc515f5f8d1d942347ff85499ed88f18adc301eda9e6295d
                                                                      • Opcode Fuzzy Hash: 2e4e11202a0610b3d9dfa06ff83f12cb7a67f4e62f8888e28e9331c38feae646
                                                                      • Instruction Fuzzy Hash: 1A129B30200A11DFDB29CF24E948BBABFA9FB55300F148569F489CB261CB71EC55EB95
                                                                      APIs
                                                                      • DestroyWindow.USER32(00000000), ref: 005A273E
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 005A286A
                                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 005A28A9
                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 005A28B9
                                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 005A2900
                                                                      • GetClientRect.USER32(00000000,?), ref: 005A290C
                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 005A2955
                                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 005A2964
                                                                      • GetStockObject.GDI32(00000011), ref: 005A2974
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 005A2978
                                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 005A2988
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005A2991
                                                                      • DeleteDC.GDI32(00000000), ref: 005A299A
                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 005A29C6
                                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 005A29DD
                                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 005A2A1D
                                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 005A2A31
                                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 005A2A42
                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 005A2A77
                                                                      • GetStockObject.GDI32(00000011), ref: 005A2A82
                                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 005A2A8D
                                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 005A2A97
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                      • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
                                                                      • API String ID: 2910397461-2771358697
                                                                      • Opcode ID: f0d54542eb1fe6ececb123009688fbac67c3ef93c0c6ca177e9d3cabf9e52eba
                                                                      • Instruction ID: a9973679f0b774082835b011bcb2cdfe62a60b78c1806c4bbf7af0b22bd321a8
                                                                      • Opcode Fuzzy Hash: f0d54542eb1fe6ececb123009688fbac67c3ef93c0c6ca177e9d3cabf9e52eba
                                                                      • Instruction Fuzzy Hash: E3B16A71A00219AFEB14DF68DC4AEAE7BA9FF59710F008614F915EB2D0D774AD04CBA4
                                                                      APIs
                                                                      • GetSysColor.USER32(00000012), ref: 005B7421
                                                                      • SetTextColor.GDI32(?,?), ref: 005B7425
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 005B743B
                                                                      • GetSysColor.USER32(0000000F), ref: 005B7446
                                                                      • CreateSolidBrush.GDI32(?), ref: 005B744B
                                                                      • GetSysColor.USER32(00000011), ref: 005B7463
                                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 005B7471
                                                                      • SelectObject.GDI32(?,00000000), ref: 005B7482
                                                                      • SetBkColor.GDI32(?,00000000), ref: 005B748B
                                                                      • SelectObject.GDI32(?,?), ref: 005B7498
                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 005B74B7
                                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005B74CE
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 005B74DB
                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005B752A
                                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 005B7554
                                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 005B7572
                                                                      • DrawFocusRect.USER32(?,?), ref: 005B757D
                                                                      • GetSysColor.USER32(00000011), ref: 005B758E
                                                                      • SetTextColor.GDI32(?,00000000), ref: 005B7596
                                                                      • DrawTextW.USER32(?,005B70F5,000000FF,?,00000000), ref: 005B75A8
                                                                      • SelectObject.GDI32(?,?), ref: 005B75BF
                                                                      • DeleteObject.GDI32(?), ref: 005B75CA
                                                                      • SelectObject.GDI32(?,?), ref: 005B75D0
                                                                      • DeleteObject.GDI32(?), ref: 005B75D5
                                                                      • SetTextColor.GDI32(?,?), ref: 005B75DB
                                                                      • SetBkColor.GDI32(?,?), ref: 005B75E5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                      • String ID: @U=u
                                                                      • API String ID: 1996641542-2594219639
                                                                      • Opcode ID: f372431e540242d8d2e270b9cbfbc818568998338eeb8bae645d852b446d54b4
                                                                      • Instruction ID: f076fec701beaeb5971547e490161bbb73e7f2a14006bea10f7103425d2497a9
                                                                      • Opcode Fuzzy Hash: f372431e540242d8d2e270b9cbfbc818568998338eeb8bae645d852b446d54b4
                                                                      • Instruction Fuzzy Hash: 62616C72904218AFDF119FA8DC49EEE7FB9FB48320F104615F911BB2A1D770A940DBA4
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00594AED
                                                                      • GetDriveTypeW.KERNEL32(?,005BCB68,?,\\.\,005BCC08), ref: 00594BCA
                                                                      • SetErrorMode.KERNEL32(00000000,005BCB68,?,\\.\,005BCC08), ref: 00594D36
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$DriveType
                                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                      • API String ID: 2907320926-4222207086
                                                                      • Opcode ID: 1b1587d43872cf574ad10c735f97b61fafcd047f585242989949f4011c85abd2
                                                                      • Instruction ID: ba51c39b65af41576096fc1b75fb8ba0ddecda04127f5b6daa2c4f8ceb34e212
                                                                      • Opcode Fuzzy Hash: 1b1587d43872cf574ad10c735f97b61fafcd047f585242989949f4011c85abd2
                                                                      • Instruction Fuzzy Hash: 2661BE3060524A9FCF08DF25CA86D6CBFA1BF59380B248865F846AB291DB31ED42DF51
                                                                      APIs
                                                                      • CharUpperBuffW.USER32(?,?), ref: 005B02E5
                                                                      • _wcslen.LIBCMT ref: 005B031F
                                                                      • _wcslen.LIBCMT ref: 005B0389
                                                                      • _wcslen.LIBCMT ref: 005B03F1
                                                                      • _wcslen.LIBCMT ref: 005B0475
                                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 005B04C5
                                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005B0504
                                                                        • Part of subcall function 0053F9F2: _wcslen.LIBCMT ref: 0053F9FD
                                                                        • Part of subcall function 0058223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00582258
                                                                        • Part of subcall function 0058223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0058228A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                      • String ID: @U=u$DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                      • API String ID: 1103490817-1753161424
                                                                      • Opcode ID: fb46f4b8ab9c4159a0d278755d6fd90a6fc02be4de14406f6c90cd67c5109314
                                                                      • Instruction ID: 453b4f79a54f778cfb8f4a119d6963fdd0ad38851d1312f3720eafac3e959745
                                                                      • Opcode Fuzzy Hash: fb46f4b8ab9c4159a0d278755d6fd90a6fc02be4de14406f6c90cd67c5109314
                                                                      • Instruction Fuzzy Hash: B6E1AC312082129FCB14DF24C5559ABBBE6BFC8314F145A6CF896AB2E1DB30ED46CB51
                                                                      APIs
                                                                      • GetCursorPos.USER32(?), ref: 005B1128
                                                                      • GetDesktopWindow.USER32 ref: 005B113D
                                                                      • GetWindowRect.USER32(00000000), ref: 005B1144
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 005B1199
                                                                      • DestroyWindow.USER32(?), ref: 005B11B9
                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 005B11ED
                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005B120B
                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005B121D
                                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 005B1232
                                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 005B1245
                                                                      • IsWindowVisible.USER32(00000000), ref: 005B12A1
                                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 005B12BC
                                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 005B12D0
                                                                      • GetWindowRect.USER32(00000000,?), ref: 005B12E8
                                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 005B130E
                                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 005B1328
                                                                      • CopyRect.USER32(?,?), ref: 005B133F
                                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 005B13AA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                      • String ID: ($0$tooltips_class32
                                                                      • API String ID: 698492251-4156429822
                                                                      • Opcode ID: 693ae75bde8b9d26c01a42c394a4ff69b6364b28267722287aaddfb53d878005
                                                                      • Instruction ID: ad7a001b89a9d765bfe923ba2a374a46a8dea9575490f6de79989fb334cb6cf4
                                                                      • Opcode Fuzzy Hash: 693ae75bde8b9d26c01a42c394a4ff69b6364b28267722287aaddfb53d878005
                                                                      • Instruction Fuzzy Hash: 81B1AD71608751AFD740DF68C898BAABFE4FF89340F408918F9999B2A1D731E844CB95
                                                                      APIs
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00538968
                                                                      • GetSystemMetrics.USER32(00000007), ref: 00538970
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0053899B
                                                                      • GetSystemMetrics.USER32(00000008), ref: 005389A3
                                                                      • GetSystemMetrics.USER32(00000004), ref: 005389C8
                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005389E5
                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005389F5
                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00538A28
                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00538A3C
                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00538A5A
                                                                      • GetStockObject.GDI32(00000011), ref: 00538A76
                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00538A81
                                                                        • Part of subcall function 0053912D: GetCursorPos.USER32(?), ref: 00539141
                                                                        • Part of subcall function 0053912D: ScreenToClient.USER32(00000000,?), ref: 0053915E
                                                                        • Part of subcall function 0053912D: GetAsyncKeyState.USER32(00000001), ref: 00539183
                                                                        • Part of subcall function 0053912D: GetAsyncKeyState.USER32(00000002), ref: 0053919D
                                                                      • SetTimer.USER32(00000000,00000000,00000028,005390FC), ref: 00538AA8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                      • String ID: @U=u$AutoIt v3 GUI
                                                                      • API String ID: 1458621304-2077007950
                                                                      • Opcode ID: 543de467eccb167a4c5188602a36a71e6377b5b87223f7f54e2aed47ce3de151
                                                                      • Instruction ID: 352198b9ed8420b4fe11306c5ed09fcf0fd691a81a0fcf80c7ac2a617f4870c9
                                                                      • Opcode Fuzzy Hash: 543de467eccb167a4c5188602a36a71e6377b5b87223f7f54e2aed47ce3de151
                                                                      • Instruction Fuzzy Hash: 12B18A71A0020ADFDB18DFA8DD49BAA7FB4FB48314F104229FA15E7290DB74A804DB55
                                                                      APIs
                                                                      • LoadIconW.USER32(00000063), ref: 00585A2E
                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00585A40
                                                                      • SetWindowTextW.USER32(?,?), ref: 00585A57
                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00585A6C
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00585A72
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00585A82
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00585A88
                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00585AA9
                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00585AC3
                                                                      • GetWindowRect.USER32(?,?), ref: 00585ACC
                                                                      • _wcslen.LIBCMT ref: 00585B33
                                                                      • SetWindowTextW.USER32(?,?), ref: 00585B6F
                                                                      • GetDesktopWindow.USER32 ref: 00585B75
                                                                      • GetWindowRect.USER32(00000000), ref: 00585B7C
                                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00585BD3
                                                                      • GetClientRect.USER32(?,?), ref: 00585BE0
                                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00585C05
                                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00585C2F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                      • String ID: @U=u
                                                                      • API String ID: 895679908-2594219639
                                                                      • Opcode ID: cba2bc3cf96a9597907906456712a7b0e2c6aa41433c63d1751c0e17a26d23d9
                                                                      • Instruction ID: fd2cde1c786b715db5320a9a3a25d98738de1649978dd0d8de947eaf4eded576
                                                                      • Opcode Fuzzy Hash: cba2bc3cf96a9597907906456712a7b0e2c6aa41433c63d1751c0e17a26d23d9
                                                                      • Instruction Fuzzy Hash: 1E717E31900B05AFDB20EFA8CD85AAEBFF5FF58705F100A18E582B65A0E775A904CB14
                                                                      APIs
                                                                      • CharUpperBuffW.USER32(?,?), ref: 005B09C6
                                                                      • _wcslen.LIBCMT ref: 005B0A01
                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005B0A54
                                                                      • _wcslen.LIBCMT ref: 005B0A8A
                                                                      • _wcslen.LIBCMT ref: 005B0B06
                                                                      • _wcslen.LIBCMT ref: 005B0B81
                                                                        • Part of subcall function 0053F9F2: _wcslen.LIBCMT ref: 0053F9FD
                                                                        • Part of subcall function 00582BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00582BFA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                      • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                      • API String ID: 1103490817-383632319
                                                                      • Opcode ID: 1d0be9f5eb42bebee51bc21fcf6f470bc7202b5905f6122f3dafdd545122a632
                                                                      • Instruction ID: 5211971806af79e3e071a8c6e0f7fff2a57951369ce346312df32d4e8517dfa3
                                                                      • Opcode Fuzzy Hash: 1d0be9f5eb42bebee51bc21fcf6f470bc7202b5905f6122f3dafdd545122a632
                                                                      • Instruction Fuzzy Hash: C5E167322083529FC714EF25C4509AABFE1BF99314F14895DE896AB3A2DB31FD45CB81
                                                                      APIs
                                                                        • Part of subcall function 005810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00581114
                                                                        • Part of subcall function 005810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 00581120
                                                                        • Part of subcall function 005810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 0058112F
                                                                        • Part of subcall function 005810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 00581136
                                                                        • Part of subcall function 005810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0058114D
                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00580DF5
                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00580E29
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00580E40
                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00580E7A
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00580E96
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00580EAD
                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00580EB5
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00580EBC
                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00580EDD
                                                                      • CopySid.ADVAPI32(00000000), ref: 00580EE4
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00580F13
                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00580F35
                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00580F47
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00580F6E
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580F75
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00580F7E
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580F85
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00580F8E
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580F95
                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00580FA1
                                                                      • HeapFree.KERNEL32(00000000), ref: 00580FA8
                                                                        • Part of subcall function 00581193: GetProcessHeap.KERNEL32(00000008,00580BB1,?,00000000,?,00580BB1,?), ref: 005811A1
                                                                        • Part of subcall function 00581193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00580BB1,?), ref: 005811A8
                                                                        • Part of subcall function 00581193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00580BB1,?), ref: 005811B7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                      • String ID:
                                                                      • API String ID: 4175595110-0
                                                                      • Opcode ID: db11af365062c8685e74e6c21589269d39d390c999fcec63a6aa7b5d5746fb3d
                                                                      • Instruction ID: 49a2cfdd0abf50f395599c9f0b2c30843095be69f42a84f99d392db19d4efe28
                                                                      • Opcode Fuzzy Hash: db11af365062c8685e74e6c21589269d39d390c999fcec63a6aa7b5d5746fb3d
                                                                      • Instruction Fuzzy Hash: 34715E7190020AEBDF60AFA4DC48FAEBFB8BF14340F148215FA19B6191D731A909CB60
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 005B835A
                                                                      • _wcslen.LIBCMT ref: 005B836E
                                                                      • _wcslen.LIBCMT ref: 005B8391
                                                                      • _wcslen.LIBCMT ref: 005B83B4
                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 005B83F2
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,005B361A,?), ref: 005B844E
                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005B8487
                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 005B84CA
                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005B8501
                                                                      • FreeLibrary.KERNEL32(?), ref: 005B850D
                                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 005B851D
                                                                      • DestroyIcon.USER32(?), ref: 005B852C
                                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 005B8549
                                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 005B8555
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                      • String ID: .dll$.exe$.icl$@U=u
                                                                      • API String ID: 799131459-1639919054
                                                                      • Opcode ID: b6a13dc0bd8bf5802df5a61c7fd99ae66a44ed87dd4d311b9d92e2086b3c65c4
                                                                      • Instruction ID: c164989393829e5048ebf89f464fc8f503c802a6806ef400fd0de65c45d7fb81
                                                                      • Opcode Fuzzy Hash: b6a13dc0bd8bf5802df5a61c7fd99ae66a44ed87dd4d311b9d92e2086b3c65c4
                                                                      • Instruction Fuzzy Hash: 6261CD7154061ABAEB24DF64CC85BFE7FACBB48711F104609F815D61D1EB74A980DBA0
                                                                      APIs
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005AC4BD
                                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,005BCC08,00000000,?,00000000,?,?), ref: 005AC544
                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 005AC5A4
                                                                      • _wcslen.LIBCMT ref: 005AC5F4
                                                                      • _wcslen.LIBCMT ref: 005AC66F
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 005AC6B2
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 005AC7C1
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 005AC84D
                                                                      • RegCloseKey.ADVAPI32(?), ref: 005AC881
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 005AC88E
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 005AC960
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                      • API String ID: 9721498-966354055
                                                                      • Opcode ID: 2e5b09fce1a16ef3ab2c6ff3156f4be4fcc8b24e2b288b89d6929b4fa18a21c3
                                                                      • Instruction ID: 63966215606ba9e1b5d251bc80adb1cab06c4611521bfd1f7f59b8729e80008b
                                                                      • Opcode Fuzzy Hash: 2e5b09fce1a16ef3ab2c6ff3156f4be4fcc8b24e2b288b89d6929b4fa18a21c3
                                                                      • Instruction Fuzzy Hash: D31256356042129FDB14DF14D885A2ABFE5FF8A714F04885CF88A9B3A2DB31EC45CB85
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                      • API String ID: 1256254125-909552448
                                                                      • Opcode ID: 52c84e28344566e9b5bb71cf4710eb619880887b2a2cda01c8a503b7b526c82d
                                                                      • Instruction ID: 0be6c30190f02a51874b6cc8a2cc55e7aa23a1ab19da7143239e42d455a2f11f
                                                                      • Opcode Fuzzy Hash: 52c84e28344566e9b5bb71cf4710eb619880887b2a2cda01c8a503b7b526c82d
                                                                      • Instruction Fuzzy Hash: F571E433A0016F8BCB20DE7CD9516BE3F91BFA6764F550524F8669B284EA31CD85C7A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                      • API String ID: 0-1645009161
                                                                      • Opcode ID: 5b4817a5bdf9f1b609f3bcd7abc6060e82bedba5ea35bb3df2783c46f5a5993f
                                                                      • Instruction ID: 76f2c59f9bad8b050629d835abab51411cbe8a80bb2d48592f833afa63282138
                                                                      • Opcode Fuzzy Hash: 5b4817a5bdf9f1b609f3bcd7abc6060e82bedba5ea35bb3df2783c46f5a5993f
                                                                      • Instruction Fuzzy Hash: A181D67164461AABDB24AF61DC46FEE3F68FF9A300F044424F905AB1D2EB70D951C791
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 005B8592
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 005B85A2
                                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 005B85AD
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005B85BA
                                                                      • GlobalLock.KERNEL32(00000000), ref: 005B85C8
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 005B85D7
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 005B85E0
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005B85E7
                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 005B85F8
                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,005BFC38,?), ref: 005B8611
                                                                      • GlobalFree.KERNEL32(00000000), ref: 005B8621
                                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 005B8641
                                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 005B8671
                                                                      • DeleteObject.GDI32(00000000), ref: 005B8699
                                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 005B86AF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                      • String ID: @U=u
                                                                      • API String ID: 3840717409-2594219639
                                                                      • Opcode ID: 079d1dde11912189af38c55ed5a9c15b951201ea48157f0926924cfa9411a047
                                                                      • Instruction ID: b9d3c6b1398fb4df538e0b6ebec8854ab7efaac396244f4a5e8942896ecfdcb2
                                                                      • Opcode Fuzzy Hash: 079d1dde11912189af38c55ed5a9c15b951201ea48157f0926924cfa9411a047
                                                                      • Instruction Fuzzy Hash: A0411875600209BFDB519FA9CC48EAABFBCFB99711F104158F905E72A0DB30A905DB24
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[^
                                                                      • API String ID: 176396367-1827482509
                                                                      • Opcode ID: 21d4dec13860e830e166b918f6833d6d22d81acbf34b84fb547fb31d75c78813
                                                                      • Instruction ID: ab4b3a5451981d0745c986fb33c9d8c386e19054b36901730f9042f7bfb42a6e
                                                                      • Opcode Fuzzy Hash: 21d4dec13860e830e166b918f6833d6d22d81acbf34b84fb547fb31d75c78813
                                                                      • Instruction Fuzzy Hash: C1E10532A00516ABCF18AF68C4557EEBFB4BF44B10F548529EC56B7250EF30AE85CB90
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • DragQueryPoint.SHELL32(?,?), ref: 005B9147
                                                                        • Part of subcall function 005B7674: ClientToScreen.USER32(?,?), ref: 005B769A
                                                                        • Part of subcall function 005B7674: GetWindowRect.USER32(?,?), ref: 005B7710
                                                                        • Part of subcall function 005B7674: PtInRect.USER32(?,?,005B8B89), ref: 005B7720
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 005B91B0
                                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 005B91BB
                                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005B91DE
                                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 005B9225
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 005B923E
                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 005B9255
                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 005B9277
                                                                      • DragFinish.SHELL32(?), ref: 005B927E
                                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 005B9371
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u$p#_
                                                                      • API String ID: 221274066-21923269
                                                                      • Opcode ID: b7838d261d7fcf359ec21f5e802a631f15b94d058a00dd47478816f253c18d85
                                                                      • Instruction ID: a76bf8bf10aa50ce71026e87306f5ac17487733a4c6aa5aafbc3ae2667378b84
                                                                      • Opcode Fuzzy Hash: b7838d261d7fcf359ec21f5e802a631f15b94d058a00dd47478816f253c18d85
                                                                      • Instruction Fuzzy Hash: 90615971108302AFC701DF54D889DAFBFE8FFD9750F000A2DB595962A1DB70AA49CB52
                                                                      APIs
                                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005400C6
                                                                        • Part of subcall function 005400ED: InitializeCriticalSectionAndSpinCount.KERNEL32(005F070C,00000FA0,F31CE961,?,?,?,?,005623B3,000000FF), ref: 0054011C
                                                                        • Part of subcall function 005400ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,005623B3,000000FF), ref: 00540127
                                                                        • Part of subcall function 005400ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,005623B3,000000FF), ref: 00540138
                                                                        • Part of subcall function 005400ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0054014E
                                                                        • Part of subcall function 005400ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0054015C
                                                                        • Part of subcall function 005400ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0054016A
                                                                        • Part of subcall function 005400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00540195
                                                                        • Part of subcall function 005400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005401A0
                                                                      • ___scrt_fastfail.LIBCMT ref: 005400E7
                                                                        • Part of subcall function 005400A3: __onexit.LIBCMT ref: 005400A9
                                                                      Strings
                                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00540122
                                                                      • SleepConditionVariableCS, xrefs: 00540154
                                                                      • kernel32.dll, xrefs: 00540133
                                                                      • InitializeConditionVariable, xrefs: 00540148
                                                                      • WakeAllConditionVariable, xrefs: 00540162
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                      • API String ID: 66158676-1714406822
                                                                      • Opcode ID: c287ee41e94982f25675a3ae7e293ce71d55b610a7c2df6c30a3e0e12fe7b60d
                                                                      • Instruction ID: caa8a16a9d47f7d4c60fdd9cd95f93320756fa1b53cf21b8a83a31c8a2143d36
                                                                      • Opcode Fuzzy Hash: c287ee41e94982f25675a3ae7e293ce71d55b610a7c2df6c30a3e0e12fe7b60d
                                                                      • Instruction Fuzzy Hash: 5B214932A417116FD7106B68AC49BAA3F98FB54B64F242225FA01E72D2DB74A800DB94
                                                                      APIs
                                                                      • CharLowerBuffW.USER32(00000000,00000000,005BCC08), ref: 00594527
                                                                      • _wcslen.LIBCMT ref: 0059453B
                                                                      • _wcslen.LIBCMT ref: 00594599
                                                                      • _wcslen.LIBCMT ref: 005945F4
                                                                      • _wcslen.LIBCMT ref: 0059463F
                                                                      • _wcslen.LIBCMT ref: 005946A7
                                                                        • Part of subcall function 0053F9F2: _wcslen.LIBCMT ref: 0053F9FD
                                                                      • GetDriveTypeW.KERNEL32(?,005E6BF0,00000061), ref: 00594743
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                      • API String ID: 2055661098-1000479233
                                                                      • Opcode ID: 591d6d1573fcaa7f3d7e078e6f519b4de3201a010fb253076e46c28126626fc8
                                                                      • Instruction ID: 73b6e40eb443089a189fd331268c50cbfca13d5cd11cdbfc8bd044c1c3015ecf
                                                                      • Opcode Fuzzy Hash: 591d6d1573fcaa7f3d7e078e6f519b4de3201a010fb253076e46c28126626fc8
                                                                      • Instruction Fuzzy Hash: FDB1DC716083129BCB14DF28D890E6ABFE5BFA6760F50491DF49687291E730DC46CBA2
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,?), ref: 005B6DEB
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 005B6E5F
                                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 005B6E81
                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005B6E94
                                                                      • DestroyWindow.USER32(?), ref: 005B6EB5
                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00520000,00000000), ref: 005B6EE4
                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005B6EFD
                                                                      • GetDesktopWindow.USER32 ref: 005B6F16
                                                                      • GetWindowRect.USER32(00000000), ref: 005B6F1D
                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005B6F35
                                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 005B6F4D
                                                                        • Part of subcall function 00539944: GetWindowLongW.USER32(?,000000EB), ref: 00539952
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                      • String ID: 0$@U=u$tooltips_class32
                                                                      • API String ID: 2429346358-1130792468
                                                                      • Opcode ID: c5fdb71e58b1809ec79c718ba2c4049880d1d7b08a9e8451ca34b8096445f2c9
                                                                      • Instruction ID: df2dd869ae27be342da8459332f9959d6adaab1318bfac590141ecd2bd411d94
                                                                      • Opcode Fuzzy Hash: c5fdb71e58b1809ec79c718ba2c4049880d1d7b08a9e8451ca34b8096445f2c9
                                                                      • Instruction Fuzzy Hash: C6716675504244AFDB21CF28DC88EBABFE9FB99304F04091DF9898B261C778E909DB15
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 005AB198
                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 005AB1B0
                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 005AB1D4
                                                                      • _wcslen.LIBCMT ref: 005AB200
                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 005AB214
                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 005AB236
                                                                      • _wcslen.LIBCMT ref: 005AB332
                                                                        • Part of subcall function 005905A7: GetStdHandle.KERNEL32(000000F6), ref: 005905C6
                                                                      • _wcslen.LIBCMT ref: 005AB34B
                                                                      • _wcslen.LIBCMT ref: 005AB366
                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 005AB3B6
                                                                      • GetLastError.KERNEL32(00000000), ref: 005AB407
                                                                      • CloseHandle.KERNEL32(?), ref: 005AB439
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005AB44A
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005AB45C
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005AB46E
                                                                      • CloseHandle.KERNEL32(?), ref: 005AB4E3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 2178637699-0
                                                                      • Opcode ID: 9bac9f493054b2333c577a3753c0d21b7bdc37b870b12f036c28f9ae31282d80
                                                                      • Instruction ID: b84e3178c70103e18e0c94d595398b6b6451f032438ed6e33e4ab149dab79991
                                                                      • Opcode Fuzzy Hash: 9bac9f493054b2333c577a3753c0d21b7bdc37b870b12f036c28f9ae31282d80
                                                                      • Instruction Fuzzy Hash: 14F18A316042419FDB14EF24D885B6EBFE5BF8A314F14895DF8859B2A2DB31EC44CB92
                                                                      APIs
                                                                      • GetMenuItemCount.USER32(005F1990), ref: 00562F8D
                                                                      • GetMenuItemCount.USER32(005F1990), ref: 0056303D
                                                                      • GetCursorPos.USER32(?), ref: 00563081
                                                                      • SetForegroundWindow.USER32(00000000), ref: 0056308A
                                                                      • TrackPopupMenuEx.USER32(005F1990,00000000,?,00000000,00000000,00000000), ref: 0056309D
                                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 005630A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                      • String ID: 0
                                                                      • API String ID: 36266755-4108050209
                                                                      • Opcode ID: aa2c36b913e0bf9809a9966857556b57b6ab784ba0d584ac1469c533cbfd520d
                                                                      • Instruction ID: 280cb651e4f26c6e45535760c72d52d79777e9825e73a1de3fa60c091d923d77
                                                                      • Opcode Fuzzy Hash: aa2c36b913e0bf9809a9966857556b57b6ab784ba0d584ac1469c533cbfd520d
                                                                      • Instruction Fuzzy Hash: F0710631640616BEEB219F64DC4AFAAFF69FF05324F204216F524AB1E1C7B1AD14DB90
                                                                      APIs
                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0059C4B0
                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0059C4C3
                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0059C4D7
                                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0059C4F0
                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0059C533
                                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0059C549
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0059C554
                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0059C584
                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0059C5DC
                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0059C5F0
                                                                      • InternetCloseHandle.WININET(00000000), ref: 0059C5FB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                      • String ID:
                                                                      • API String ID: 3800310941-3916222277
                                                                      • Opcode ID: b9381f8a2f1cdfa007d7dcdcade7b04004bc2d4341827318b8f25ed959953478
                                                                      • Instruction ID: ee7b8796849c4dbf1697cfe32b0a0d7dad14b59c4488825c1ff8a529145ec048
                                                                      • Opcode Fuzzy Hash: b9381f8a2f1cdfa007d7dcdcade7b04004bc2d4341827318b8f25ed959953478
                                                                      • Instruction Fuzzy Hash: 70514AB1600209BFEF218F65C988AAB7FFCFF59754F004519F94696250EB34E948AB60
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(00000000), ref: 00591502
                                                                      • VariantCopy.OLEAUT32(?,?), ref: 0059150B
                                                                      • VariantClear.OLEAUT32(?), ref: 00591517
                                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 005915FB
                                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00591657
                                                                      • VariantInit.OLEAUT32(?), ref: 00591708
                                                                      • SysFreeString.OLEAUT32(?), ref: 0059178C
                                                                      • VariantClear.OLEAUT32(?), ref: 005917D8
                                                                      • VariantClear.OLEAUT32(?), ref: 005917E7
                                                                      • VariantInit.OLEAUT32(00000000), ref: 00591823
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                      • API String ID: 1234038744-3931177956
                                                                      • Opcode ID: aeb7164b6afceb81004dccc7f8600933debc49557626a5e750d883cef9656983
                                                                      • Instruction ID: 2a06961bc0d35a6ce3085be820ca9863c11358473af2b3436fc1dc2520dd01d6
                                                                      • Opcode Fuzzy Hash: aeb7164b6afceb81004dccc7f8600933debc49557626a5e750d883cef9656983
                                                                      • Instruction Fuzzy Hash: C7D1ED71A00927DBDF009F65E888B79BFB5FF85700F128856E446AB290DB30EC45DB65
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                        • Part of subcall function 005AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,005AB6AE,?,?), ref: 005AC9B5
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005AC9F1
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005ACA68
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005ACA9E
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005AB6F4
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 005AB772
                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 005AB80A
                                                                      • RegCloseKey.ADVAPI32(?), ref: 005AB87E
                                                                      • RegCloseKey.ADVAPI32(?), ref: 005AB89C
                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 005AB8F2
                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 005AB904
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 005AB922
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 005AB983
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 005AB994
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                      • API String ID: 146587525-4033151799
                                                                      • Opcode ID: 4b48de97469a789dd14d3c307f6b96af7049718eb11e36e704a8011419369900
                                                                      • Instruction ID: 152683b75e46a0e845ad935dd1eff0fea6c645b45c6d15fc6ea9be2f3fc905dd
                                                                      • Opcode Fuzzy Hash: 4b48de97469a789dd14d3c307f6b96af7049718eb11e36e704a8011419369900
                                                                      • Instruction Fuzzy Hash: 56C15A30208242AFE714DF14C499B2ABFE5BF86318F14855CE59A8B2A3CB75ED45CBD1
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 005B5504
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005B5515
                                                                      • CharNextW.USER32(00000158), ref: 005B5544
                                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 005B5585
                                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 005B559B
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005B55AC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CharNext
                                                                      • String ID: @U=u
                                                                      • API String ID: 1350042424-2594219639
                                                                      • Opcode ID: d026e734e79d2480dea343ff5cb6ead8dd59475c81b1994019398277904cc0ab
                                                                      • Instruction ID: 08f9365e9e9b9adef9e79d5c1fb2827834a23ba5ae294c9bd8c6cdfd912ba89a
                                                                      • Opcode Fuzzy Hash: d026e734e79d2480dea343ff5cb6ead8dd59475c81b1994019398277904cc0ab
                                                                      • Instruction Fuzzy Hash: 9B61AA30900609EFDF249F64CC85EFE7FB9FB19321F104545F925AA290E774AA84DB60
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 005A25D8
                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 005A25E8
                                                                      • CreateCompatibleDC.GDI32(?), ref: 005A25F4
                                                                      • SelectObject.GDI32(00000000,?), ref: 005A2601
                                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 005A266D
                                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 005A26AC
                                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 005A26D0
                                                                      • SelectObject.GDI32(?,?), ref: 005A26D8
                                                                      • DeleteObject.GDI32(?), ref: 005A26E1
                                                                      • DeleteDC.GDI32(?), ref: 005A26E8
                                                                      • ReleaseDC.USER32(00000000,?), ref: 005A26F3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                      • String ID: (
                                                                      • API String ID: 2598888154-3887548279
                                                                      • Opcode ID: 43a8dcc400c02a909070267b9ddeb406c1cdd3b8392dddc10d54680de7790b97
                                                                      • Instruction ID: bb22def2e1ad619b65b6c2dd035cd96b8033e36b5e61be91424d3345321d4126
                                                                      • Opcode Fuzzy Hash: 43a8dcc400c02a909070267b9ddeb406c1cdd3b8392dddc10d54680de7790b97
                                                                      • Instruction Fuzzy Hash: 1A61E275D00219EFCF04CFA8D989EAEBBB5FF48310F208529E956A7250D770A941DF64
                                                                      APIs
                                                                      • timeGetTime.WINMM ref: 0058E6B4
                                                                        • Part of subcall function 0053E551: timeGetTime.WINMM(?,?,0058E6D4), ref: 0053E555
                                                                      • Sleep.KERNEL32(0000000A), ref: 0058E6E1
                                                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0058E705
                                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0058E727
                                                                      • SetActiveWindow.USER32 ref: 0058E746
                                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0058E754
                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0058E773
                                                                      • Sleep.KERNEL32(000000FA), ref: 0058E77E
                                                                      • IsWindow.USER32 ref: 0058E78A
                                                                      • EndDialog.USER32(00000000), ref: 0058E79B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                      • String ID: @U=u$BUTTON
                                                                      • API String ID: 1194449130-2582809321
                                                                      • Opcode ID: 9bb844ad152479ef39ed0ebedc64f0d845e514edc44ed87dd88612b2c6699b41
                                                                      • Instruction ID: c2efd65a86c5b47c0ef031f89bb9ab84daf906273bce0e505a0c3d234f0d82b8
                                                                      • Opcode Fuzzy Hash: 9bb844ad152479ef39ed0ebedc64f0d845e514edc44ed87dd88612b2c6699b41
                                                                      • Instruction Fuzzy Hash: 6E2130B0200245AFEB106F66EC8AE353F69F775749F101525F916E11A1DB65AC08EB28
                                                                      APIs
                                                                      • ___free_lconv_mon.LIBCMT ref: 0055DAA1
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D659
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D66B
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D67D
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D68F
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D6A1
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D6B3
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D6C5
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D6D7
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D6E9
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D6FB
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D70D
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D71F
                                                                        • Part of subcall function 0055D63C: _free.LIBCMT ref: 0055D731
                                                                      • _free.LIBCMT ref: 0055DA96
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      • _free.LIBCMT ref: 0055DAB8
                                                                      • _free.LIBCMT ref: 0055DACD
                                                                      • _free.LIBCMT ref: 0055DAD8
                                                                      • _free.LIBCMT ref: 0055DAFA
                                                                      • _free.LIBCMT ref: 0055DB0D
                                                                      • _free.LIBCMT ref: 0055DB1B
                                                                      • _free.LIBCMT ref: 0055DB26
                                                                      • _free.LIBCMT ref: 0055DB5E
                                                                      • _free.LIBCMT ref: 0055DB65
                                                                      • _free.LIBCMT ref: 0055DB82
                                                                      • _free.LIBCMT ref: 0055DB9A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                      • String ID:
                                                                      • API String ID: 161543041-0
                                                                      • Opcode ID: 239c0a3287ac1e7841c3c5eea3f12eafe8fa8d807259eec3985abc23d94282dd
                                                                      • Instruction ID: aa735865c77749154405dc833d8569d035997dc5d3f6ba4bef31da8b3f3276f7
                                                                      • Opcode Fuzzy Hash: 239c0a3287ac1e7841c3c5eea3f12eafe8fa8d807259eec3985abc23d94282dd
                                                                      • Instruction Fuzzy Hash: 4D313D326046069FDB31AA39D859B967FF9FF41322F15441BE849E7291DA31AC88CB30
                                                                      APIs
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0058369C
                                                                      • _wcslen.LIBCMT ref: 005836A7
                                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00583797
                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 0058380C
                                                                      • GetDlgCtrlID.USER32(?), ref: 0058385D
                                                                      • GetWindowRect.USER32(?,?), ref: 00583882
                                                                      • GetParent.USER32(?), ref: 005838A0
                                                                      • ScreenToClient.USER32(00000000), ref: 005838A7
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00583921
                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0058395D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                      • String ID: %s%u
                                                                      • API String ID: 4010501982-679674701
                                                                      • Opcode ID: 2186ad177571160033323050751b70cea51fb35639af7d356c67146197d19aff
                                                                      • Instruction ID: 43f15cc7d5334c181772cbd1284b50112fb174f0ff91fc8f3b1d46c931ca93ac
                                                                      • Opcode Fuzzy Hash: 2186ad177571160033323050751b70cea51fb35639af7d356c67146197d19aff
                                                                      • Instruction Fuzzy Hash: C291A471204606AFD719EF24C885FEAFBA8FF44754F004629FD99E2190EB30EA45CB91
                                                                      APIs
                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00584994
                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 005849DA
                                                                      • _wcslen.LIBCMT ref: 005849EB
                                                                      • CharUpperBuffW.USER32(?,00000000), ref: 005849F7
                                                                      • _wcsstr.LIBVCRUNTIME ref: 00584A2C
                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00584A64
                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00584A9D
                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00584AE6
                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00584B20
                                                                      • GetWindowRect.USER32(?,?), ref: 00584B8B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                      • String ID: ThumbnailClass
                                                                      • API String ID: 1311036022-1241985126
                                                                      • Opcode ID: cf115a5a69d98da345b7987f3dd0eaf9a790be1d47197ba4729b4b7c0dc53468
                                                                      • Instruction ID: e59d52d232a05158bdb05fad38c03a55f9f6e9fe429b0e25da94b177e75ce805
                                                                      • Opcode Fuzzy Hash: cf115a5a69d98da345b7987f3dd0eaf9a790be1d47197ba4729b4b7c0dc53468
                                                                      • Instruction Fuzzy Hash: 74919D311042069BDB08EF14C985BBA7FE9FF84314F04856AFD85AA196EB34ED45CFA1
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005B8D5A
                                                                      • GetFocus.USER32 ref: 005B8D6A
                                                                      • GetDlgCtrlID.USER32(00000000), ref: 005B8D75
                                                                      • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 005B8E1D
                                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 005B8ECF
                                                                      • GetMenuItemCount.USER32(?), ref: 005B8EEC
                                                                      • GetMenuItemID.USER32(?,00000000), ref: 005B8EFC
                                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 005B8F2E
                                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 005B8F70
                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 005B8FA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                      • String ID: 0
                                                                      • API String ID: 1026556194-4108050209
                                                                      • Opcode ID: d7d7c9a67ab8400b8af3834681c9018c854f6658152b5cf35d87a8a1277666d8
                                                                      • Instruction ID: 67de988367bd783215cf407f934aedd0dc0d768ea00b4e0b50b87a77a862f09b
                                                                      • Opcode Fuzzy Hash: d7d7c9a67ab8400b8af3834681c9018c854f6658152b5cf35d87a8a1277666d8
                                                                      • Instruction Fuzzy Hash: 80819F715043019FDB20CF24C889ABBBFEDFB98354F141A19F98597291DB70E905DBA1
                                                                      APIs
                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 005ACC64
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 005ACC8D
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 005ACD48
                                                                        • Part of subcall function 005ACC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 005ACCAA
                                                                        • Part of subcall function 005ACC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 005ACCBD
                                                                        • Part of subcall function 005ACC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 005ACCCF
                                                                        • Part of subcall function 005ACC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 005ACD05
                                                                        • Part of subcall function 005ACC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 005ACD28
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 005ACCF3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                      • API String ID: 2734957052-4033151799
                                                                      • Opcode ID: 81ddfe7c22faa7cca13003a9855c2399907b3d781683c37b0991b909d932ab4e
                                                                      • Instruction ID: bc651ce95fdeaabc4285f3f299e9c72b2da2bc8486dfb8ef1fcbebcfd4d93ffa
                                                                      • Opcode Fuzzy Hash: 81ddfe7c22faa7cca13003a9855c2399907b3d781683c37b0991b909d932ab4e
                                                                      • Instruction Fuzzy Hash: 0D319A71901128BBDB209B95DC88EFFBF7CEF16750F000165B916E6200DB709E49EAA4
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0058EA5D
                                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0058EA73
                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0058EA84
                                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0058EA96
                                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0058EAA7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: SendString$_wcslen
                                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                      • API String ID: 2420728520-1007645807
                                                                      • Opcode ID: 950ba71d8ded73b553baa28d354652150be1bdf43339c2330ad00b5cfd6ddf1c
                                                                      • Instruction ID: 124b9afcbe326911e816001e5d59b62787237ec12382ca0595d6c69442e6e6ad
                                                                      • Opcode Fuzzy Hash: 950ba71d8ded73b553baa28d354652150be1bdf43339c2330ad00b5cfd6ddf1c
                                                                      • Instruction Fuzzy Hash: 4E11122165026A79D728E766DC4FDFF6E7CFFE2F80F400429B851A20D1DA705945C6B0
                                                                      APIs
                                                                        • Part of subcall function 00538F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00538BE8,?,00000000,?,?,?,?,00538BBA,00000000,?), ref: 00538FC5
                                                                      • DestroyWindow.USER32(?), ref: 00538C81
                                                                      • KillTimer.USER32(00000000,?,?,?,?,00538BBA,00000000,?), ref: 00538D1B
                                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00576973
                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00538BBA,00000000,?), ref: 005769A1
                                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00538BBA,00000000,?), ref: 005769B8
                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00538BBA,00000000), ref: 005769D4
                                                                      • DeleteObject.GDI32(00000000), ref: 005769E6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                      • String ID:
                                                                      • API String ID: 641708696-0
                                                                      • Opcode ID: 40c4516055f12a3deebd18453a8b0b695c71d44df83c45049b6b4a4a779adad8
                                                                      • Instruction ID: 89a087a2b2e700f6aba75268a8ccf13bbf28433e575e6a64535fd6ba65e53bbc
                                                                      • Opcode Fuzzy Hash: 40c4516055f12a3deebd18453a8b0b695c71d44df83c45049b6b4a4a779adad8
                                                                      • Instruction Fuzzy Hash: 0A618B30502B05DFCB299F25DA48B397FF1FB60312F149918E0469B560CB75AD88EBA8
                                                                      APIs
                                                                        • Part of subcall function 00539944: GetWindowLongW.USER32(?,000000EB), ref: 00539952
                                                                      • GetSysColor.USER32(0000000F), ref: 00539862
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ColorLongWindow
                                                                      • String ID:
                                                                      • API String ID: 259745315-0
                                                                      • Opcode ID: 1c90466e8c6b4c9e2c82efa7add4d1a3827a9f4da976d0152dc79624fca5e4ad
                                                                      • Instruction ID: e05cc25274b457ef2075a9dd40c8db3e3bf61d992059d17c178a314038d694c0
                                                                      • Opcode Fuzzy Hash: 1c90466e8c6b4c9e2c82efa7add4d1a3827a9f4da976d0152dc79624fca5e4ad
                                                                      • Instruction Fuzzy Hash: 7E41C471104644AFDB205F3CAC88BBA7F65FB96330F144645F9A2972E1D7B19C42EB60
                                                                      APIs
                                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00576890
                                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 005768A9
                                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005768B9
                                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 005768D1
                                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 005768F2
                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00538874,00000000,00000000,00000000,000000FF,00000000), ref: 00576901
                                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0057691E
                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00538874,00000000,00000000,00000000,000000FF,00000000), ref: 0057692D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 1268354404-2594219639
                                                                      • Opcode ID: 80cfc127409f4ba3c773efef7f4a5db6b9a1e824c1177da4f6d40dbb5aca2d19
                                                                      • Instruction ID: 0c45a5bfc5d62b294d44b60e0745d52f1f32d4da13cfc547a0c54f49052c7365
                                                                      • Opcode Fuzzy Hash: 80cfc127409f4ba3c773efef7f4a5db6b9a1e824c1177da4f6d40dbb5aca2d19
                                                                      • Instruction Fuzzy Hash: 5B51787060070AEFDB248F24DC65BAABFB5FB58750F104618F956A62A0DBB0A950EB50
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                        • Part of subcall function 0053912D: GetCursorPos.USER32(?), ref: 00539141
                                                                        • Part of subcall function 0053912D: ScreenToClient.USER32(00000000,?), ref: 0053915E
                                                                        • Part of subcall function 0053912D: GetAsyncKeyState.USER32(00000001), ref: 00539183
                                                                        • Part of subcall function 0053912D: GetAsyncKeyState.USER32(00000002), ref: 0053919D
                                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 005B8B6B
                                                                      • ImageList_EndDrag.COMCTL32 ref: 005B8B71
                                                                      • ReleaseCapture.USER32 ref: 005B8B77
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 005B8C12
                                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 005B8C25
                                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 005B8CFF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID$@U=u$p#_
                                                                      • API String ID: 1924731296-3474493772
                                                                      • Opcode ID: 484c698e62c6d7878f8301cab14c5f8dacb016262e09b7f41633afdda672be8d
                                                                      • Instruction ID: 6924af96848f588ebb123e4051e54eb33ddfca6d24e46ed1296483a1efebdeb2
                                                                      • Opcode Fuzzy Hash: 484c698e62c6d7878f8301cab14c5f8dacb016262e09b7f41633afdda672be8d
                                                                      • Instruction Fuzzy Hash: E6516C71104205AFD704DF14D959FBA7FE4FB98710F000629F996AB2E1CB75AD08CBA6
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0056F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00589717
                                                                      • LoadStringW.USER32(00000000,?,0056F7F8,00000001), ref: 00589720
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0056F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00589742
                                                                      • LoadStringW.USER32(00000000,?,0056F7F8,00000001), ref: 00589745
                                                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00589866
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                      • API String ID: 747408836-2268648507
                                                                      • Opcode ID: c13b2dbfd2dcb1e6ff7198872215a1084c490b251a00cdbc65dceb27507cf973
                                                                      • Instruction ID: 3fb0e8be180150c4193c193c924db437e467d13d9360e7e2fc3dc44b2d2ea4e9
                                                                      • Opcode Fuzzy Hash: c13b2dbfd2dcb1e6ff7198872215a1084c490b251a00cdbc65dceb27507cf973
                                                                      • Instruction Fuzzy Hash: 3B411E7280021AAACF04FBA0DD9ADFE7B78BFA5340F240465F505721D1EA356F48CB61
                                                                      APIs
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005807A2
                                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005807BE
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005807DA
                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00580804
                                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0058082C
                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00580837
                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0058083C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                      • API String ID: 323675364-22481851
                                                                      • Opcode ID: 444d2db1e824a7c0210be9d3f0014b2234fcd224910c65366b0757d1aff4895c
                                                                      • Instruction ID: 4469f339ad02d69d2984d81217e7d989688da37e889d66afbdd13aa572b0ec29
                                                                      • Opcode Fuzzy Hash: 444d2db1e824a7c0210be9d3f0014b2234fcd224910c65366b0757d1aff4895c
                                                                      • Instruction Fuzzy Hash: FC41F972C10229ABDF15EBA4DC998EDBB78FF54750F144565E901B31A1EB30AE48CF90
                                                                      APIs
                                                                      • CoInitialize.OLE32(00000000), ref: 00597AF3
                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00597B8F
                                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00597BA3
                                                                      • CoCreateInstance.OLE32(005BFD08,00000000,00000001,005E6E6C,?), ref: 00597BEF
                                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00597C74
                                                                      • CoTaskMemFree.OLE32(?,?), ref: 00597CCC
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00597D57
                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00597D7A
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00597D81
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00597DD6
                                                                      • CoUninitialize.OLE32 ref: 00597DDC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                      • String ID:
                                                                      • API String ID: 2762341140-0
                                                                      • Opcode ID: a95bdac1e3c389d3758b2827a981c99e6d9d1cc1cc211ebd313187199556fbaa
                                                                      • Instruction ID: 1960603a7945a699bb60a0e0ef03ffc271639d865cea41539e265a8eefa6c4a3
                                                                      • Opcode Fuzzy Hash: a95bdac1e3c389d3758b2827a981c99e6d9d1cc1cc211ebd313187199556fbaa
                                                                      • Instruction Fuzzy Hash: 2AC10975A04219AFDB14DF64C888DAEBFB9FF48304F148599F8199B261D730EE45CB90
                                                                      APIs
                                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0057FAAF
                                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 0057FB08
                                                                      • VariantInit.OLEAUT32(?), ref: 0057FB1A
                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 0057FB3A
                                                                      • VariantCopy.OLEAUT32(?,?), ref: 0057FB8D
                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 0057FBA1
                                                                      • VariantClear.OLEAUT32(?), ref: 0057FBB6
                                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 0057FBC3
                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0057FBCC
                                                                      • VariantClear.OLEAUT32(?), ref: 0057FBDE
                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0057FBE9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                      • String ID:
                                                                      • API String ID: 2706829360-0
                                                                      • Opcode ID: cdbb3e452b721ba92bc47eaba852f3c7f29ce76153a1d94fc71a6e1050e9feaf
                                                                      • Instruction ID: 2adf097f784b6f62be67dbe893641d5eb8089dcaeadcf10c2d31e7c2978263ad
                                                                      • Opcode Fuzzy Hash: cdbb3e452b721ba92bc47eaba852f3c7f29ce76153a1d94fc71a6e1050e9feaf
                                                                      • Instruction Fuzzy Hash: 33416235A0021ADFCF00DF64D8589AEBFB9FF58345F00C465E959A7261DB30AA45DFA0
                                                                      APIs
                                                                      • WSAStartup.WSOCK32(00000101,?), ref: 005A05BC
                                                                      • inet_addr.WSOCK32(?), ref: 005A061C
                                                                      • gethostbyname.WSOCK32(?), ref: 005A0628
                                                                      • IcmpCreateFile.IPHLPAPI ref: 005A0636
                                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 005A06C6
                                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 005A06E5
                                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 005A07B9
                                                                      • WSACleanup.WSOCK32 ref: 005A07BF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                      • String ID: Ping
                                                                      • API String ID: 1028309954-2246546115
                                                                      • Opcode ID: 13a2b0cbb44c1d9b1cf52cd2381bfb185e6b9bd2502bb17894737a3dcca72cd6
                                                                      • Instruction ID: 96b93e27f119230fc4e416573f52a6769733fec5d302e84e0b43a9fa7d214723
                                                                      • Opcode Fuzzy Hash: 13a2b0cbb44c1d9b1cf52cd2381bfb185e6b9bd2502bb17894737a3dcca72cd6
                                                                      • Instruction Fuzzy Hash: FD917A356142019FD720DF15D489B1ABFE0FF8A318F1489A9E46A9B6A2C730FC45CF91
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharLower
                                                                      • String ID: cdecl$none$stdcall$winapi
                                                                      • API String ID: 707087890-567219261
                                                                      • Opcode ID: 98218c3e5622d37b8e3bd5c2fab55034cd6808248ceac60c618e82c3b224bc71
                                                                      • Instruction ID: c39133632e17d08139e04c869623dafced9af0aaa35ee87e22669c06b553ae0f
                                                                      • Opcode Fuzzy Hash: 98218c3e5622d37b8e3bd5c2fab55034cd6808248ceac60c618e82c3b224bc71
                                                                      • Instruction Fuzzy Hash: E5519171A00116DBCF14DF68C9509BEBBA9BF66724B244629E866E72C4EF31DD40C790
                                                                      APIs
                                                                      • CoInitialize.OLE32 ref: 005A3774
                                                                      • CoUninitialize.OLE32 ref: 005A377F
                                                                      • CoCreateInstance.OLE32(?,00000000,00000017,005BFB78,?), ref: 005A37D9
                                                                      • IIDFromString.OLE32(?,?), ref: 005A384C
                                                                      • VariantInit.OLEAUT32(?), ref: 005A38E4
                                                                      • VariantClear.OLEAUT32(?), ref: 005A3936
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                      • API String ID: 636576611-1287834457
                                                                      • Opcode ID: fb076fdc010f09ae5f22e2d861da5f60a555a9fd6cecf0d6bb526920ef0f5f9a
                                                                      • Instruction ID: 8f585fce80aafe3888156e854d20ad667704b891bc7eaca5cd430d7cc1d65d42
                                                                      • Opcode Fuzzy Hash: fb076fdc010f09ae5f22e2d861da5f60a555a9fd6cecf0d6bb526920ef0f5f9a
                                                                      • Instruction Fuzzy Hash: 8B616B70608212AFD310DF54D849A6EBFE8FF8A718F100919F9859B291D774EE48CB92
                                                                      APIs
                                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 005933CF
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 005933F0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LoadString$_wcslen
                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                      • API String ID: 4099089115-3080491070
                                                                      • Opcode ID: 23aaf209560f10dca621c7daba59802abb610ceacf8ebe77528f72f59774660f
                                                                      • Instruction ID: 409208b8dcbc2f2cf4b6c51b97510df7473b65186b2a9a5b3eb6d2da833769d1
                                                                      • Opcode Fuzzy Hash: 23aaf209560f10dca621c7daba59802abb610ceacf8ebe77528f72f59774660f
                                                                      • Instruction Fuzzy Hash: 0751AF7280021AAACF14EBA0DD4AEFEBB78BF65340F244465F405720A1EB352F58DB60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                      • API String ID: 1256254125-769500911
                                                                      • Opcode ID: 4e15f75f856087dc7ab5a1feebb2ba23a8335c5a1afff842ffbab429b1d7eab6
                                                                      • Instruction ID: 98b26785f71271e3a77770a49781de227bb3b2c90d274d125f32a7545042792d
                                                                      • Opcode Fuzzy Hash: 4e15f75f856087dc7ab5a1feebb2ba23a8335c5a1afff842ffbab429b1d7eab6
                                                                      • Instruction Fuzzy Hash: 7841A732A001279ADB107F7E88915BE7FA9FFA1794B254629E861E7284F731CD81C790
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 005953A0
                                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00595416
                                                                      • GetLastError.KERNEL32 ref: 00595420
                                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 005954A7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                      • API String ID: 4194297153-14809454
                                                                      • Opcode ID: 66e9d9ad4078ac2b46944d3c8821bc8b32479a79ea36f43f173bca49d3289ea6
                                                                      • Instruction ID: 61026827549e90a17a57a4c2886960cfccfbeb429fee1e399221b5d22f2bebbc
                                                                      • Opcode Fuzzy Hash: 66e9d9ad4078ac2b46944d3c8821bc8b32479a79ea36f43f173bca49d3289ea6
                                                                      • Instruction Fuzzy Hash: 8631CE35A002059FCF52DF68C888AAABFF4FF55345F548065E409DB292E770ED96CB90
                                                                      APIs
                                                                      • DeleteObject.GDI32(00000000), ref: 005B2D1B
                                                                      • GetDC.USER32(00000000), ref: 005B2D23
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005B2D2E
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 005B2D3A
                                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 005B2D76
                                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 005B2D87
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,005B5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 005B2DC2
                                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 005B2DE1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                      • String ID: @U=u
                                                                      • API String ID: 3864802216-2594219639
                                                                      • Opcode ID: e019e27999ec10ad7f5ca338d94ef86320e408587ef76934dabf91342c98c7ca
                                                                      • Instruction ID: b0f64bcc2daa47dfffa887bb8a4a500a46e4ed7e5b9f80e34b4891ec46c84629
                                                                      • Opcode Fuzzy Hash: e019e27999ec10ad7f5ca338d94ef86320e408587ef76934dabf91342c98c7ca
                                                                      • Instruction Fuzzy Hash: 13317872201214BFEB218F548C8AFEB3FA9FB59711F044155FE089A291C6B5A851CBB4
                                                                      APIs
                                                                      • GetParent.USER32 ref: 005820AB
                                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 005820C0
                                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0058214D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ClassMessageNameParentSend
                                                                      • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                      • API String ID: 1290815626-1428604138
                                                                      • Opcode ID: eb2e5ad760fa56571dcbaa1e3eb9365410c22c326e9d0dc81209ed3eba734502
                                                                      • Instruction ID: a7eaed66f81bde03b34706bd8cc6a9b6e317117f73247d2a8cc580bfbda92587
                                                                      • Opcode Fuzzy Hash: eb2e5ad760fa56571dcbaa1e3eb9365410c22c326e9d0dc81209ed3eba734502
                                                                      • Instruction Fuzzy Hash: 1111C17A688707BAF60976259C0EDE63F9DFB14328F30011AFB45B90D1FAA168459B18
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 005B3A9D
                                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 005B3AA0
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 005B3AC7
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005B3AEA
                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 005B3B62
                                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 005B3BAC
                                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 005B3BC7
                                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 005B3BE2
                                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 005B3BF6
                                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 005B3C13
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$LongWindow
                                                                      • String ID:
                                                                      • API String ID: 312131281-0
                                                                      • Opcode ID: 852437b29e6cb2a472cf58df3b4955487f49b33bef615478dbf93d2b845f13f0
                                                                      • Instruction ID: 9d4e271c789105e1f57f41f084b10229e554ff92858b6099000d01e6b46995f7
                                                                      • Opcode Fuzzy Hash: 852437b29e6cb2a472cf58df3b4955487f49b33bef615478dbf93d2b845f13f0
                                                                      • Instruction Fuzzy Hash: AE615775900248AFDB10DFA8CD85EEE7BB8FF49700F100199FA15AB2A1C774AE45DB50
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0058B151
                                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B165
                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0058B16C
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B17B
                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0058B18D
                                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B1A6
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B1B8
                                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B1FD
                                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B212
                                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0058A1E1,?,00000001), ref: 0058B21D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                      • String ID:
                                                                      • API String ID: 2156557900-0
                                                                      • Opcode ID: 30fecc862c3ecd9f12ed7a7972c2de42ded77adae2f7f3113ec5cf3d935e78a2
                                                                      • Instruction ID: d49d6c63b17e3964fe5475ebc40edc060e7131bb62e131465a6232e4a7a87630
                                                                      • Opcode Fuzzy Hash: 30fecc862c3ecd9f12ed7a7972c2de42ded77adae2f7f3113ec5cf3d935e78a2
                                                                      • Instruction Fuzzy Hash: 6F314BB5500204AFFB10AF64DC48B7D7FADBB61311F104156FE05E7190EBB8AA48DB68
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00552C94
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      • _free.LIBCMT ref: 00552CA0
                                                                      • _free.LIBCMT ref: 00552CAB
                                                                      • _free.LIBCMT ref: 00552CB6
                                                                      • _free.LIBCMT ref: 00552CC1
                                                                      • _free.LIBCMT ref: 00552CCC
                                                                      • _free.LIBCMT ref: 00552CD7
                                                                      • _free.LIBCMT ref: 00552CE2
                                                                      • _free.LIBCMT ref: 00552CED
                                                                      • _free.LIBCMT ref: 00552CFB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: f1bc964e7cc3e65126b158534b475d28999b757f1104c2f6a25439f4e3942316
                                                                      • Instruction ID: f397b0da501c30dfdc929e1b26ddb30d5d2b9fb9411635144a3cf8389b06cc71
                                                                      • Opcode Fuzzy Hash: f1bc964e7cc3e65126b158534b475d28999b757f1104c2f6a25439f4e3942316
                                                                      • Instruction Fuzzy Hash: 84119276100109AFCB02EF94D896CDD3FB5FF46351F5144A6FA48AB322DA31EA949B90
                                                                      APIs
                                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00521459
                                                                      • OleUninitialize.OLE32(?,00000000), ref: 005214F8
                                                                      • UnregisterHotKey.USER32(?), ref: 005216DD
                                                                      • DestroyWindow.USER32(?), ref: 005624B9
                                                                      • FreeLibrary.KERNEL32(?), ref: 0056251E
                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0056254B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                      • String ID: close all
                                                                      • API String ID: 469580280-3243417748
                                                                      • Opcode ID: 7d0640a420216bf8cbb9de01ba5f09850f856efbdd49f8beb83e43e9fcc2d0d4
                                                                      • Instruction ID: 5afa59b49eca3959c08af8838d9195526e11da40b60d428a8e7dc0f4fae505e7
                                                                      • Opcode Fuzzy Hash: 7d0640a420216bf8cbb9de01ba5f09850f856efbdd49f8beb83e43e9fcc2d0d4
                                                                      • Instruction Fuzzy Hash: D7D18F31701623CFDB29EF14D499A69FFA4BF66700F1442ADE44A6B2A1DB30AD12CF54
                                                                      APIs
                                                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005935E4
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • LoadStringW.USER32(005F2390,?,00000FFF,?), ref: 0059360A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LoadString$_wcslen
                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                      • API String ID: 4099089115-2391861430
                                                                      • Opcode ID: f7f41a7aeba79c6145ac3595f47c51c66a36c4bd9ed925191d4f51f8abebb9fe
                                                                      • Instruction ID: de15ad1b4953d8c88fac88465ee64f5c2c56da243cefe1d1ca3468363990ae4d
                                                                      • Opcode Fuzzy Hash: f7f41a7aeba79c6145ac3595f47c51c66a36c4bd9ed925191d4f51f8abebb9fe
                                                                      • Instruction Fuzzy Hash: F5514C7280021AEACF15EBA0DC46EEDBF74FF65340F144525F505721A1DB352B98DB61
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 005B3925
                                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 005B393A
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 005B3954
                                                                      • _wcslen.LIBCMT ref: 005B3999
                                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 005B39C6
                                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 005B39F4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window_wcslen
                                                                      • String ID: @U=u$SysListView32
                                                                      • API String ID: 2147712094-1908207174
                                                                      • Opcode ID: 26ffa094191cad5a381e4033bc488347b49daacd358adadcbd1df82cfc7f0e6a
                                                                      • Instruction ID: 95dfaa16e3b6a8036130ab477d623906b640c396245926a746eb56866390b98a
                                                                      • Opcode Fuzzy Hash: 26ffa094191cad5a381e4033bc488347b49daacd358adadcbd1df82cfc7f0e6a
                                                                      • Instruction Fuzzy Hash: 3441C231A00219ABEB219F64CC49FEA7FA9FF58350F100526F958F7281D7B1A984CB94
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005B2E1C
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 005B2E4F
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 005B2E84
                                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 005B2EB6
                                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 005B2EE0
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 005B2EF1
                                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 005B2F0B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow$MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 2178440468-2594219639
                                                                      • Opcode ID: b3f0a76967e67187c7add5244384f63f8f278208179733cb471e94554ed20932
                                                                      • Instruction ID: 2c190bfd7f7668d31667b3ca0d2727e9ae545ea5e74d12183ef5fd154c7deb73
                                                                      • Opcode Fuzzy Hash: b3f0a76967e67187c7add5244384f63f8f278208179733cb471e94554ed20932
                                                                      • Instruction Fuzzy Hash: D631F230644250AFDB218F59DD84FA53BA9FBAA710F150164F904CF2B1CBB1F844EB65
                                                                      APIs
                                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0059C272
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0059C29A
                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0059C2CA
                                                                      • GetLastError.KERNEL32 ref: 0059C322
                                                                      • SetEvent.KERNEL32(?), ref: 0059C336
                                                                      • InternetCloseHandle.WININET(00000000), ref: 0059C341
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                      • String ID:
                                                                      • API String ID: 3113390036-3916222277
                                                                      • Opcode ID: 48309e4fd4adcb525a8f7135c12cc173b839d142028c201146a9f856a8a4774e
                                                                      • Instruction ID: 7bfbc7774d81b32ea6038c62f309ebdb25cd4ee3b6befa1d8fbb488b9d3bb3c0
                                                                      • Opcode Fuzzy Hash: 48309e4fd4adcb525a8f7135c12cc173b839d142028c201146a9f856a8a4774e
                                                                      • Instruction Fuzzy Hash: BD317CB1600208AFDF219F648D88AAB7FFCFB59744B10891EF48692201DB34ED089B65
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00563AAF,?,?,Bad directive syntax error,005BCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 005898BC
                                                                      • LoadStringW.USER32(00000000,?,00563AAF,?), ref: 005898C3
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00589987
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                      • API String ID: 858772685-4153970271
                                                                      • Opcode ID: 3769a93ef3ed32cbcd7017e68d1418cb31b50f09d9e82216a848956797d3c417
                                                                      • Instruction ID: a34f8789996aa47cce1d08d2243159be5dfc72785e6af7e9ada8595dca09bb98
                                                                      • Opcode Fuzzy Hash: 3769a93ef3ed32cbcd7017e68d1418cb31b50f09d9e82216a848956797d3c417
                                                                      • Instruction Fuzzy Hash: 96217132C0021AABCF15EF90DC5AEED7F35BF69340F084825F515720A1EB75AA18DB10
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                      • String ID:
                                                                      • API String ID: 1282221369-0
                                                                      • Opcode ID: ac6ace7fe034e4728dd867fae6dfbcb59ebe1d44d26e76a995bbb328e821941a
                                                                      • Instruction ID: c7afdc306c6def7fad0fa481ec6dfdb526813f4745f96871c5975435cbb959e4
                                                                      • Opcode Fuzzy Hash: ac6ace7fe034e4728dd867fae6dfbcb59ebe1d44d26e76a995bbb328e821941a
                                                                      • Instruction Fuzzy Hash: 31614572904301AFDB21AFB498A9A7A7FA5BF41312F04016FEC05E7282E6359D4CCB60
                                                                      APIs
                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0059C182
                                                                      • GetLastError.KERNEL32 ref: 0059C195
                                                                      • SetEvent.KERNEL32(?), ref: 0059C1A9
                                                                        • Part of subcall function 0059C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0059C272
                                                                        • Part of subcall function 0059C253: GetLastError.KERNEL32 ref: 0059C322
                                                                        • Part of subcall function 0059C253: SetEvent.KERNEL32(?), ref: 0059C336
                                                                        • Part of subcall function 0059C253: InternetCloseHandle.WININET(00000000), ref: 0059C341
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                      • String ID:
                                                                      • API String ID: 337547030-0
                                                                      • Opcode ID: a33cdd61694bcf6954ebb95bb94f2a945089955182c7d585c9eb95b1643d9a44
                                                                      • Instruction ID: 971893f92ba9f7e8228ac4226c2c4c0083a85b7c4fee432617e0480dab9292ba
                                                                      • Opcode Fuzzy Hash: a33cdd61694bcf6954ebb95bb94f2a945089955182c7d585c9eb95b1643d9a44
                                                                      • Instruction Fuzzy Hash: EA319C75200701AFDF219FA5DC48A66BFF9FF68300B10492DF99686611DB30E818EFA0
                                                                      APIs
                                                                        • Part of subcall function 00583A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00583A57
                                                                        • Part of subcall function 00583A3D: GetCurrentThreadId.KERNEL32 ref: 00583A5E
                                                                        • Part of subcall function 00583A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005825B3), ref: 00583A65
                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 005825BD
                                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005825DB
                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 005825DF
                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 005825E9
                                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00582601
                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00582605
                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 0058260F
                                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00582623
                                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00582627
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                      • String ID:
                                                                      • API String ID: 2014098862-0
                                                                      • Opcode ID: 29096913d191542b093877ae4147552007fd5598b712f809f2fc586cc7db7666
                                                                      • Instruction ID: dfbafd1219a775115320df16a1c0f776b245d73d63f9ed270a8b204784958e0a
                                                                      • Opcode Fuzzy Hash: 29096913d191542b093877ae4147552007fd5598b712f809f2fc586cc7db7666
                                                                      • Instruction Fuzzy Hash: 9901B170290210BBFB107B699C8EF593F59EB9EB12F100102F758BE0D1C9E22448DA6D
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00581449,?,?,00000000), ref: 0058180C
                                                                      • HeapAlloc.KERNEL32(00000000,?,00581449,?,?,00000000), ref: 00581813
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00581449,?,?,00000000), ref: 00581828
                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00581449,?,?,00000000), ref: 00581830
                                                                      • DuplicateHandle.KERNEL32(00000000,?,00581449,?,?,00000000), ref: 00581833
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00581449,?,?,00000000), ref: 00581843
                                                                      • GetCurrentProcess.KERNEL32(00581449,00000000,?,00581449,?,?,00000000), ref: 0058184B
                                                                      • DuplicateHandle.KERNEL32(00000000,?,00581449,?,?,00000000), ref: 0058184E
                                                                      • CreateThread.KERNEL32(00000000,00000000,00581874,00000000,00000000,00000000), ref: 00581868
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                      • String ID:
                                                                      • API String ID: 1957940570-0
                                                                      • Opcode ID: 50faf27764b14f460be20bb997560feb5ccd257e1d999666c3328ca2afff0d69
                                                                      • Instruction ID: 4d9c90a202b8b3bb900db25932a39f0e6b73f3c621b8be9b8f2bb617f0ac9bf8
                                                                      • Opcode Fuzzy Hash: 50faf27764b14f460be20bb997560feb5ccd257e1d999666c3328ca2afff0d69
                                                                      • Instruction Fuzzy Hash: 3001BFB5240304BFE750AFA5DC4DF573FACEB99B11F404511FA05EB191C670A804DB24
                                                                      APIs
                                                                        • Part of subcall function 0058D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0058D501
                                                                        • Part of subcall function 0058D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0058D50F
                                                                        • Part of subcall function 0058D4DC: CloseHandle.KERNEL32(00000000), ref: 0058D5DC
                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 005AA16D
                                                                      • GetLastError.KERNEL32 ref: 005AA180
                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 005AA1B3
                                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 005AA268
                                                                      • GetLastError.KERNEL32(00000000), ref: 005AA273
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005AA2C4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                      • String ID: SeDebugPrivilege
                                                                      • API String ID: 2533919879-2896544425
                                                                      • Opcode ID: ba814a2e9ae1c63aab1f30d287a56492af502f11c2ab160e66f293837cc10045
                                                                      • Instruction ID: f5f30af732350f4f5e8a98e35426ff0a5bb39745ddf5eb0901a63ceae338a812
                                                                      • Opcode Fuzzy Hash: ba814a2e9ae1c63aab1f30d287a56492af502f11c2ab160e66f293837cc10045
                                                                      • Instruction Fuzzy Hash: 57615B34204242AFD720DF18D498F1ABFA1BF95318F54849CE4564BBA3C772EC49CB92
                                                                      APIs
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00542D4B
                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00542D53
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00542DE1
                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00542E0C
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00542E61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                      • String ID: &HT$csm
                                                                      • API String ID: 1170836740-2742057123
                                                                      • Opcode ID: bcef93e26af8d85bde232a66d32648663b459eca41ea480fdffab8a5445cccd8
                                                                      • Instruction ID: 62b47809bbaaf8d3647640c1b3234d30d0abcd38e34f3d03756b580f5b7f6e28
                                                                      • Opcode Fuzzy Hash: bcef93e26af8d85bde232a66d32648663b459eca41ea480fdffab8a5445cccd8
                                                                      • Instruction Fuzzy Hash: 43419434E01219EBCF14DF68C849ADEBFB5BF44328F548155F815AB392D7319A16CB90
                                                                      APIs
                                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0057F3AB,00000000,?,?,00000000,?,0057682C,00000004,00000000,00000000), ref: 005B824C
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 005B8272
                                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 005B82D1
                                                                      • ShowWindow.USER32(00000000,00000004), ref: 005B82E5
                                                                      • EnableWindow.USER32(00000000,00000001), ref: 005B830B
                                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 005B832F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Show$Enable$MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 642888154-2594219639
                                                                      • Opcode ID: 2bcca94f0e7ab720a48aec0c5fe82532fc7dda9cc01a632bde06cd51760e5955
                                                                      • Instruction ID: 4a4dc0db33f297d003a1c40cda4ff265672bcf6635711f296766341dc453feec
                                                                      • Opcode Fuzzy Hash: 2bcca94f0e7ab720a48aec0c5fe82532fc7dda9cc01a632bde06cd51760e5955
                                                                      • Instruction Fuzzy Hash: 7A41A138601A40EFDB11CF14CD99BF4BFE4BB1AB14F1822A8E5088F262CB71B845DB54
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 00584C95
                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00584CB2
                                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00584CEA
                                                                      • _wcslen.LIBCMT ref: 00584D08
                                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00584D10
                                                                      • _wcsstr.LIBVCRUNTIME ref: 00584D1A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                      • String ID: @U=u
                                                                      • API String ID: 72514467-2594219639
                                                                      • Opcode ID: 49ce8320763de39aea868aad0da0ba13894081e9422400b28bc29424a00c4ad3
                                                                      • Instruction ID: 2ae198a13bff307323f1e0c7cd1d9c8d88fdf1538d11364e1f4e36217b6172c4
                                                                      • Opcode Fuzzy Hash: 49ce8320763de39aea868aad0da0ba13894081e9422400b28bc29424a00c4ad3
                                                                      • Instruction Fuzzy Hash: B4212932605202BBEB556B39DC09E7B7F9CEF45750F104029FC05DE191EA61DC009BA0
                                                                      APIs
                                                                      • LoadIconW.USER32(00000000,00007F03), ref: 0058C913
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: IconLoad
                                                                      • String ID: blank$info$question$stop$warning
                                                                      • API String ID: 2457776203-404129466
                                                                      • Opcode ID: 06d0643cf1c206327f258302a4e26077ec00529117972e0e7e3c59d612b933dd
                                                                      • Instruction ID: a5f2b2dac1e4f94d8056c930c66748f0a85e75c91c5e1b49c32e27e49ceaefa2
                                                                      • Opcode Fuzzy Hash: 06d0643cf1c206327f258302a4e26077ec00529117972e0e7e3c59d612b933dd
                                                                      • Instruction Fuzzy Hash: D2112E316C9707BBA70477159C82DDA2F9CFF25794B10006BF900B5282E7747D405775
                                                                      APIs
                                                                      • GetClientRect.USER32(?), ref: 00577452
                                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00577469
                                                                      • GetWindowDC.USER32(?), ref: 00577475
                                                                      • GetPixel.GDI32(00000000,?,?), ref: 00577484
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00577496
                                                                      • GetSysColor.USER32(00000005), ref: 005774B0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                      • String ID: @U=u
                                                                      • API String ID: 272304278-2594219639
                                                                      • Opcode ID: c50556ad5d7697494c66b3772012cebe4fddaf3c78e7ae0cd9c0667a29447c7d
                                                                      • Instruction ID: 0e889c0c77f7d253007fb4504f5d24222ba26fc799ba1877419ad10144191433
                                                                      • Opcode Fuzzy Hash: c50556ad5d7697494c66b3772012cebe4fddaf3c78e7ae0cd9c0667a29447c7d
                                                                      • Instruction Fuzzy Hash: 2B018B31400209EFDB905F68EC08FAA7FB6FB18311F6146A4F91AA20A0CB312E45FB14
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$LocalTime
                                                                      • String ID:
                                                                      • API String ID: 952045576-0
                                                                      • Opcode ID: d75113f6b34f60c4c5ad7808cc275076c4ba714a1b0cdd3a96eaa3885d77b6ad
                                                                      • Instruction ID: 9f1510a82ed0683864286780e9b0ff3159962111d8703ea9a1891cadedef9eb2
                                                                      • Opcode Fuzzy Hash: d75113f6b34f60c4c5ad7808cc275076c4ba714a1b0cdd3a96eaa3885d77b6ad
                                                                      • Instruction Fuzzy Hash: 52417F79C1021975CB11FBB4888BACFBBB8BF85710F508566E914F3122EB34E255C7A6
                                                                      APIs
                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0057682C,00000004,00000000,00000000), ref: 0053F953
                                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0057682C,00000004,00000000,00000000), ref: 0057F3D1
                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0057682C,00000004,00000000,00000000), ref: 0057F454
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ShowWindow
                                                                      • String ID:
                                                                      • API String ID: 1268545403-0
                                                                      • Opcode ID: 49a97ac856548f50c46fdecbd6f13e9c549d8263f5be31c377053ebc92db2c33
                                                                      • Instruction ID: b574392ec28c1ab0c97f725b84b4aac8e615b789969f8e050562226b02b93765
                                                                      • Opcode Fuzzy Hash: 49a97ac856548f50c46fdecbd6f13e9c549d8263f5be31c377053ebc92db2c33
                                                                      • Instruction Fuzzy Hash: 89411D32A08640BFC739CB2DD98877A7F92BF96324F14893CE04B56660D676A884E711
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _memcmp
                                                                      • String ID:
                                                                      • API String ID: 2931989736-0
                                                                      • Opcode ID: d1cd6a74d5cce4b4a880aca098ebb9651dd3dd329d9d2377f101a4bc5c6bcd3a
                                                                      • Instruction ID: 353c62cf5f81015f0a4621693d798531d5f9f297834fb4db0b28c4e73d007f24
                                                                      • Opcode Fuzzy Hash: d1cd6a74d5cce4b4a880aca098ebb9651dd3dd329d9d2377f101a4bc5c6bcd3a
                                                                      • Instruction Fuzzy Hash: 4821D471644E0A7BD6157A228E86FFA3F5CBF60388F444420FD06AA681F720FD5083A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                                      • API String ID: 0-572801152
                                                                      • Opcode ID: 9d670931fdeec04d70d7ec23e9bad96cb7190bd9cce062c9649197846ce8e450
                                                                      • Instruction ID: 6b61f601e9cd95373e9bbcb76be92577a21217a69844ab6a556b8e91d417532c
                                                                      • Opcode Fuzzy Hash: 9d670931fdeec04d70d7ec23e9bad96cb7190bd9cce062c9649197846ce8e450
                                                                      • Instruction Fuzzy Hash: 87D1C475A0060AAFDF10CFA8C885FAEBBB5FF89344F148469E915AB281E770DD45CB50
                                                                      APIs
                                                                      • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,005617FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 005615CE
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,005617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00561651
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,005617FB,?,005617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005616E4
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,005617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005616FB
                                                                        • Part of subcall function 00553820: RtlAllocateHeap.NTDLL(00000000,?,005F1444,?,0053FDF5,?,?,0052A976,00000010,005F1440,005213FC,?,005213C6,?,00521129), ref: 00553852
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,005617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00561777
                                                                      • __freea.LIBCMT ref: 005617A2
                                                                      • __freea.LIBCMT ref: 005617AE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                      • String ID:
                                                                      • API String ID: 2829977744-0
                                                                      • Opcode ID: d6fc38ac81c65d14c4eba41d259f15fcce4ac9bfdaee98f69547e995018f35b7
                                                                      • Instruction ID: f881b5c19ef3c64ece64d7ef93bbee3dbd9da6522acc7f626461f551148c2384
                                                                      • Opcode Fuzzy Hash: d6fc38ac81c65d14c4eba41d259f15fcce4ac9bfdaee98f69547e995018f35b7
                                                                      • Instruction Fuzzy Hash: E691E371E00A169ADB208E74C895AFEBFB5FF99310F1C4619E802E7191DB35DD44CBA8
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                      • API String ID: 2610073882-625585964
                                                                      • Opcode ID: b241cfd2af3ce8839889c09cb013fdb29bec9985fde5ebe493d2d35b7e940473
                                                                      • Instruction ID: 1d292e4943562156aec5812e0fa994e789638b604ca94112e1ea38c8a5683407
                                                                      • Opcode Fuzzy Hash: b241cfd2af3ce8839889c09cb013fdb29bec9985fde5ebe493d2d35b7e940473
                                                                      • Instruction Fuzzy Hash: F2919171A00219ABDF24CFA5D848FAEBFB8FF86714F108559F505AB281D7B09945CFA0
                                                                      APIs
                                                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0059125C
                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00591284
                                                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 005912A8
                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005912D8
                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0059135F
                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005913C4
                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00591430
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                      • String ID:
                                                                      • API String ID: 2550207440-0
                                                                      • Opcode ID: 607cd77c0a0974bbc4bd353d70122c6c62c7069326eb090328078e2fa668760e
                                                                      • Instruction ID: 22a21a8aecc9697a5e98c46df9c9e2879d406ab53706950cef8bb05448b24823
                                                                      • Opcode Fuzzy Hash: 607cd77c0a0974bbc4bd353d70122c6c62c7069326eb090328078e2fa668760e
                                                                      • Instruction Fuzzy Hash: CC91F475A0062AAFDF00DF94C889BBEBFB5FF85315F104429E904EB291D774A941CB98
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                      • String ID:
                                                                      • API String ID: 3225163088-0
                                                                      • Opcode ID: b1361ef08584bfe508e15c1367ddc686bbb6b1ad2c3f01f46cee490ec6d95467
                                                                      • Instruction ID: 344c3880771174298b0ee11630ad98bff7042d23d5bed20b6d0739787abc735c
                                                                      • Opcode Fuzzy Hash: b1361ef08584bfe508e15c1367ddc686bbb6b1ad2c3f01f46cee490ec6d95467
                                                                      • Instruction Fuzzy Hash: 9A9116B1D0021AEFCB10CFA9C888AEEBFB8FF49320F148555E515B7251D374A981DB60
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(?), ref: 005A396B
                                                                      • CharUpperBuffW.USER32(?,?), ref: 005A3A7A
                                                                      • _wcslen.LIBCMT ref: 005A3A8A
                                                                      • VariantClear.OLEAUT32(?), ref: 005A3C1F
                                                                        • Part of subcall function 00590CDF: VariantInit.OLEAUT32(00000000), ref: 00590D1F
                                                                        • Part of subcall function 00590CDF: VariantCopy.OLEAUT32(?,?), ref: 00590D28
                                                                        • Part of subcall function 00590CDF: VariantClear.OLEAUT32(?), ref: 00590D34
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                      • API String ID: 4137639002-1221869570
                                                                      • Opcode ID: 7ecc0ae5f29ab42ce139321050fbc54ca7a1cac60c24ffa752e7631f8108c3e3
                                                                      • Instruction ID: be3020a7c06f599ac59fb2decd4f4b94c508c44780cdb9ccdb85343d668f48f6
                                                                      • Opcode Fuzzy Hash: 7ecc0ae5f29ab42ce139321050fbc54ca7a1cac60c24ffa752e7631f8108c3e3
                                                                      • Instruction Fuzzy Hash: C29136756083469FC704DF24C48596EBBE5BF8A318F14896DF88A9B351DB30EE05CB92
                                                                      APIs
                                                                        • Part of subcall function 0058000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?,?,0058035E), ref: 0058002B
                                                                        • Part of subcall function 0058000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?), ref: 00580046
                                                                        • Part of subcall function 0058000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?), ref: 00580054
                                                                        • Part of subcall function 0058000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?), ref: 00580064
                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 005A4C51
                                                                      • _wcslen.LIBCMT ref: 005A4D59
                                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 005A4DCF
                                                                      • CoTaskMemFree.OLE32(?), ref: 005A4DDA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                      • String ID: NULL Pointer assignment
                                                                      • API String ID: 614568839-2785691316
                                                                      • Opcode ID: f7a2249d91edfd11de6f30fd0e7ac0b8e53472d8c2384f6edc1b94ae4d75cf8a
                                                                      • Instruction ID: 88dbdb0bba9bf7fe4d3ca3477c30f560e9e241c1514f140c9703dc52b30a704c
                                                                      • Opcode Fuzzy Hash: f7a2249d91edfd11de6f30fd0e7ac0b8e53472d8c2384f6edc1b94ae4d75cf8a
                                                                      • Instruction Fuzzy Hash: 28913771D0022DAFDF14DFE4D895AEEBBB8BF89310F104569E915A7281EB709A44CF60
                                                                      APIs
                                                                      • GetMenu.USER32(?), ref: 005B2183
                                                                      • GetMenuItemCount.USER32(00000000), ref: 005B21B5
                                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 005B21DD
                                                                      • _wcslen.LIBCMT ref: 005B2213
                                                                      • GetMenuItemID.USER32(?,?), ref: 005B224D
                                                                      • GetSubMenu.USER32(?,?), ref: 005B225B
                                                                        • Part of subcall function 00583A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00583A57
                                                                        • Part of subcall function 00583A3D: GetCurrentThreadId.KERNEL32 ref: 00583A5E
                                                                        • Part of subcall function 00583A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005825B3), ref: 00583A65
                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005B22E3
                                                                        • Part of subcall function 0058E97B: Sleep.KERNEL32 ref: 0058E9F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                      • String ID:
                                                                      • API String ID: 4196846111-0
                                                                      • Opcode ID: ede1ed47265b25fe895373aca4f0302ba18d2718b98c166411c06892085520d2
                                                                      • Instruction ID: de558c69b5863119943a65cd6472418e0f8fb83b13f4c83958067931c92eaef2
                                                                      • Opcode Fuzzy Hash: ede1ed47265b25fe895373aca4f0302ba18d2718b98c166411c06892085520d2
                                                                      • Instruction Fuzzy Hash: BC714D75A00215AFCB14DF68C845AEEBFF5FF89310F148859E916EB351D734B9418BA0
                                                                      APIs
                                                                      • GetParent.USER32(?), ref: 0058AEF9
                                                                      • GetKeyboardState.USER32(?), ref: 0058AF0E
                                                                      • SetKeyboardState.USER32(?), ref: 0058AF6F
                                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 0058AF9D
                                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0058AFBC
                                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 0058AFFD
                                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0058B020
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                      • String ID:
                                                                      • API String ID: 87235514-0
                                                                      • Opcode ID: 202acfd4800427c3d12b2b9e0438a6f9c18f8b5a1aa08e43f127b31d5f9d4fab
                                                                      • Instruction ID: 48b274b9a6f05fff526cdf9c64552325ad1a6a2c1de9f71908afb883b594c7cf
                                                                      • Opcode Fuzzy Hash: 202acfd4800427c3d12b2b9e0438a6f9c18f8b5a1aa08e43f127b31d5f9d4fab
                                                                      • Instruction Fuzzy Hash: 4C5106A06043D13DFB3662348C49BBABFE97B06304F08858AEAD5654C3D3D8ACC8D751
                                                                      APIs
                                                                      • GetParent.USER32(00000000), ref: 0058AD19
                                                                      • GetKeyboardState.USER32(?), ref: 0058AD2E
                                                                      • SetKeyboardState.USER32(?), ref: 0058AD8F
                                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0058ADBB
                                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0058ADD8
                                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0058AE17
                                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0058AE38
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                      • String ID:
                                                                      • API String ID: 87235514-0
                                                                      • Opcode ID: de79d2b1f96b618a64a44c4d52af285d3c3e678b9da6c475a6123d1839ee0b45
                                                                      • Instruction ID: c71a333ed8ca3870be8d278f630f571ce0ce25b0d5c6e9b2f979b97e651facbe
                                                                      • Opcode Fuzzy Hash: de79d2b1f96b618a64a44c4d52af285d3c3e678b9da6c475a6123d1839ee0b45
                                                                      • Instruction Fuzzy Hash: E15118A15047D53DFB33A3348C45B7ABE9C7B45301F08898AE9D5A68C2D394EC88D752
                                                                      APIs
                                                                      • GetConsoleCP.KERNEL32(00563CD6,?,?,?,?,?,?,?,?,00555BA3,?,?,00563CD6,?,?), ref: 00555470
                                                                      • __fassign.LIBCMT ref: 005554EB
                                                                      • __fassign.LIBCMT ref: 00555506
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00563CD6,00000005,00000000,00000000), ref: 0055552C
                                                                      • WriteFile.KERNEL32(?,00563CD6,00000000,00555BA3,00000000,?,?,?,?,?,?,?,?,?,00555BA3,?), ref: 0055554B
                                                                      • WriteFile.KERNEL32(?,?,00000001,00555BA3,00000000,?,?,?,?,?,?,?,?,?,00555BA3,?), ref: 00555584
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                      • String ID:
                                                                      • API String ID: 1324828854-0
                                                                      • Opcode ID: 15d18f0e252f8c2f06b2477bd986378414cfb380bc654f7abe4a10d6c4815b5a
                                                                      • Instruction ID: 3a52cbf05fc0df4c7054e81c179037051cacf3e7b2c2eff28cfd89f48adb6b68
                                                                      • Opcode Fuzzy Hash: 15d18f0e252f8c2f06b2477bd986378414cfb380bc654f7abe4a10d6c4815b5a
                                                                      • Instruction Fuzzy Hash: 3A51C2709006499FDB10CFA8D865AEEBFF9FF09301F14451BF955E7292E630AA49CB60
                                                                      APIs
                                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 005B6C33
                                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 005B6C4A
                                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 005B6C73
                                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0059AB79,00000000,00000000), ref: 005B6C98
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 005B6CC7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$MessageSendShow
                                                                      • String ID: @U=u
                                                                      • API String ID: 3688381893-2594219639
                                                                      • Opcode ID: 7d2790eebb934caeb00984c96562b0b6d6d91ac9d9341343c1be6b9ac15b1f79
                                                                      • Instruction ID: fc70ba754df253b1cdf725e5b8b0e80050413dbd33124c1c93fa552def57e54a
                                                                      • Opcode Fuzzy Hash: 7d2790eebb934caeb00984c96562b0b6d6d91ac9d9341343c1be6b9ac15b1f79
                                                                      • Instruction Fuzzy Hash: BB41AD35A04104AFDB24CF28CD58FE97FA5FB09360F140668E999AB2E0C379FD41DA90
                                                                      APIs
                                                                        • Part of subcall function 005A304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 005A307A
                                                                        • Part of subcall function 005A304E: _wcslen.LIBCMT ref: 005A309B
                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 005A1112
                                                                      • WSAGetLastError.WSOCK32 ref: 005A1121
                                                                      • WSAGetLastError.WSOCK32 ref: 005A11C9
                                                                      • closesocket.WSOCK32(00000000), ref: 005A11F9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                      • String ID:
                                                                      • API String ID: 2675159561-0
                                                                      • Opcode ID: 6747597b76bb266c38213ac35289e2fb7d4c3954039cbed296e4348f1958b23a
                                                                      • Instruction ID: dc46b1156e4587e573ee0c8642a4a219a66d4bf29a462903b849c18a1350b465
                                                                      • Opcode Fuzzy Hash: 6747597b76bb266c38213ac35289e2fb7d4c3954039cbed296e4348f1958b23a
                                                                      • Instruction Fuzzy Hash: 02411431600615AFDB109F14C888BADBFE9FF86324F148159F9069B292D770ED45CBE4
                                                                      APIs
                                                                        • Part of subcall function 0058DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0058CF22,?), ref: 0058DDFD
                                                                        • Part of subcall function 0058DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0058CF22,?), ref: 0058DE16
                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0058CF45
                                                                      • MoveFileW.KERNEL32(?,?), ref: 0058CF7F
                                                                      • _wcslen.LIBCMT ref: 0058D005
                                                                      • _wcslen.LIBCMT ref: 0058D01B
                                                                      • SHFileOperationW.SHELL32(?), ref: 0058D061
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                      • String ID: \*.*
                                                                      • API String ID: 3164238972-1173974218
                                                                      • Opcode ID: aedf6976aba37d44648267995292cfd3c4367fb61c19b9e78a48142dc8872bfe
                                                                      • Instruction ID: e8f84fc9935612b2ca3926b427b3e49cf600aea81ef0098124c1a4aaf624aa80
                                                                      • Opcode Fuzzy Hash: aedf6976aba37d44648267995292cfd3c4367fb61c19b9e78a48142dc8872bfe
                                                                      • Instruction Fuzzy Hash: C04144719452195EDF12FBA4D985ADEBFB8BF54380F0000A6A645FB141EA34A648CF60
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00587769
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0058778F
                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00587792
                                                                      • SysAllocString.OLEAUT32(?), ref: 005877B0
                                                                      • SysFreeString.OLEAUT32(?), ref: 005877B9
                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 005877DE
                                                                      • SysAllocString.OLEAUT32(?), ref: 005877EC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                      • String ID:
                                                                      • API String ID: 3761583154-0
                                                                      • Opcode ID: 1c63a73785e534332ddfd9d14f358bcc146505b9d1777a4ad9173e88cd32d10e
                                                                      • Instruction ID: 6c87a612b4e385c2462340dc1a2f16279107d8805f18ea96755529f8e1b69af3
                                                                      • Opcode Fuzzy Hash: 1c63a73785e534332ddfd9d14f358bcc146505b9d1777a4ad9173e88cd32d10e
                                                                      • Instruction Fuzzy Hash: 1C21BC36608209AFDF00EFA8CC88CBA7BACFB08364B108525BE14EB250D670ED45C764
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00587842
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00587868
                                                                      • SysAllocString.OLEAUT32(00000000), ref: 0058786B
                                                                      • SysAllocString.OLEAUT32 ref: 0058788C
                                                                      • SysFreeString.OLEAUT32 ref: 00587895
                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 005878AF
                                                                      • SysAllocString.OLEAUT32(?), ref: 005878BD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                      • String ID:
                                                                      • API String ID: 3761583154-0
                                                                      • Opcode ID: 254bea1bc265427e3bbc655a4aa89126d1633d5c1d1a3bde3e3d9f1b62481cbd
                                                                      • Instruction ID: 30334fe37c149904596df1050ff7c76efd836946e517a403e9cc19a201809ac6
                                                                      • Opcode Fuzzy Hash: 254bea1bc265427e3bbc655a4aa89126d1633d5c1d1a3bde3e3d9f1b62481cbd
                                                                      • Instruction Fuzzy Hash: 32218331608108AF9F50ABA8DC88DAA7BACFB5C3607108125B915DB2A1D670EC45DF64
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 005B5745
                                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 005B579D
                                                                      • _wcslen.LIBCMT ref: 005B57AF
                                                                      • _wcslen.LIBCMT ref: 005B57BA
                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 005B5816
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$_wcslen
                                                                      • String ID: @U=u
                                                                      • API String ID: 763830540-2594219639
                                                                      • Opcode ID: eb298b1d412883f406c124e79d12785b1d1eab32d099494e14e128b99e798f4c
                                                                      • Instruction ID: 25620522a1285fbde66eef9d3b03ba70434b2ad870ff7c21f770f42df0c5e10c
                                                                      • Opcode Fuzzy Hash: eb298b1d412883f406c124e79d12785b1d1eab32d099494e14e128b99e798f4c
                                                                      • Instruction Fuzzy Hash: 38217171904618EADB209FA4CC85BEE7FB8FF54764F108616F929EB180E770A985CF50
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(0000000C), ref: 005904F2
                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0059052E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateHandlePipe
                                                                      • String ID: nul
                                                                      • API String ID: 1424370930-2873401336
                                                                      • Opcode ID: 8b26e3e3b6465ef67aaeb7b950791993a0f1f6e01b7822fa4b43ca7ce6d8a530
                                                                      • Instruction ID: 6f5f5229c62ec905858a159b327b64dd53428f72133d861f4dcb89f0d21e8c20
                                                                      • Opcode Fuzzy Hash: 8b26e3e3b6465ef67aaeb7b950791993a0f1f6e01b7822fa4b43ca7ce6d8a530
                                                                      • Instruction Fuzzy Hash: 5F215A75500305AFDF209F29D844AAABFE8BF54764F614E29E8A1E62E0E7709944DF20
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 005905C6
                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00590601
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateHandlePipe
                                                                      • String ID: nul
                                                                      • API String ID: 1424370930-2873401336
                                                                      • Opcode ID: aa74a45d8b119d789e87ece3397ec37f4c5911ac150372ae201a3237990aea44
                                                                      • Instruction ID: 62f8d6a58c60cae8da616bb4ecbada92df5628c0a6a985f7ab0efc8c7f6cd4f1
                                                                      • Opcode Fuzzy Hash: aa74a45d8b119d789e87ece3397ec37f4c5911ac150372ae201a3237990aea44
                                                                      • Instruction Fuzzy Hash: AE214F755003059FDF209F69DC04AAABFE8BF95724F241F19E8A1E72E0D7709960DB24
                                                                      APIs
                                                                        • Part of subcall function 0052600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0052604C
                                                                        • Part of subcall function 0052600E: GetStockObject.GDI32(00000011), ref: 00526060
                                                                        • Part of subcall function 0052600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0052606A
                                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 005B4112
                                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 005B411F
                                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 005B412A
                                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 005B4139
                                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 005B4145
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                                      • String ID: Msctls_Progress32
                                                                      • API String ID: 1025951953-3636473452
                                                                      • Opcode ID: f582b8574c5f7f5342cdd6c735728cb8f9312b9201be0178517b7f5c9ed70366
                                                                      • Instruction ID: 692bdb5f060accfd4feee7f335f7273adeba016f81e850251eb2a435992fb356
                                                                      • Opcode Fuzzy Hash: f582b8574c5f7f5342cdd6c735728cb8f9312b9201be0178517b7f5c9ed70366
                                                                      • Instruction Fuzzy Hash: DB11B2B215021EBEEF219F64CC85EE77F5DFF18798F004111BA18A6090C672AC21DBA4
                                                                      APIs
                                                                        • Part of subcall function 0055D7A3: _free.LIBCMT ref: 0055D7CC
                                                                      • _free.LIBCMT ref: 0055D82D
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      • _free.LIBCMT ref: 0055D838
                                                                      • _free.LIBCMT ref: 0055D843
                                                                      • _free.LIBCMT ref: 0055D897
                                                                      • _free.LIBCMT ref: 0055D8A2
                                                                      • _free.LIBCMT ref: 0055D8AD
                                                                      • _free.LIBCMT ref: 0055D8B8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                                      • Instruction ID: 3f12218ecf0da2bf3af5e083e6926c24b9b39d3037272608de4ce07e7c0bc6b0
                                                                      • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                                      • Instruction Fuzzy Hash: B9115E72550705AAD531BFB0CC1AFCB7FBCFF85702F400816BA9DA6992D628A5494760
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0058DA74
                                                                      • LoadStringW.USER32(00000000), ref: 0058DA7B
                                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0058DA91
                                                                      • LoadStringW.USER32(00000000), ref: 0058DA98
                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0058DADC
                                                                      Strings
                                                                      • %s (%d) : ==> %s: %s %s, xrefs: 0058DAB9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadModuleString$Message
                                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                                      • API String ID: 4072794657-3128320259
                                                                      • Opcode ID: 01f3a9fb0e78abac9501652c6309bdda2ae898081f0b771645a38142fb01a063
                                                                      • Instruction ID: d6ae9fb98d9a605b244df617f9c938f8326788342d4a4c0be4fda9e307429a25
                                                                      • Opcode Fuzzy Hash: 01f3a9fb0e78abac9501652c6309bdda2ae898081f0b771645a38142fb01a063
                                                                      • Instruction Fuzzy Hash: E4018BF29002087FEB51ABA49D89EF73B6CE718301F500595B745F2041E674AD848F78
                                                                      APIs
                                                                      • InterlockedExchange.KERNEL32(011AD1C8,011AD1C8), ref: 0059097B
                                                                      • EnterCriticalSection.KERNEL32(011AD1A8,00000000), ref: 0059098D
                                                                      • TerminateThread.KERNEL32(011A9B60,000001F6), ref: 0059099B
                                                                      • WaitForSingleObject.KERNEL32(011A9B60,000003E8), ref: 005909A9
                                                                      • CloseHandle.KERNEL32(011A9B60), ref: 005909B8
                                                                      • InterlockedExchange.KERNEL32(011AD1C8,000001F6), ref: 005909C8
                                                                      • LeaveCriticalSection.KERNEL32(011AD1A8), ref: 005909CF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                      • String ID:
                                                                      • API String ID: 3495660284-0
                                                                      • Opcode ID: eca15c047069eb4b5d69ab4e75fd2df975a9e65fbdf76ecc77c8f5bf47dfb378
                                                                      • Instruction ID: dff8c8c0a9e70edfa215b49e0e8a455113895c8a06db494a7a38eb2bbc15b251
                                                                      • Opcode Fuzzy Hash: eca15c047069eb4b5d69ab4e75fd2df975a9e65fbdf76ecc77c8f5bf47dfb378
                                                                      • Instruction Fuzzy Hash: 51F03131442512BFDB855F94EE8CBD6BF35FF11702F402526F141518A0C774A869DF94
                                                                      APIs
                                                                      • __allrem.LIBCMT ref: 005500BA
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005500D6
                                                                      • __allrem.LIBCMT ref: 005500ED
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0055010B
                                                                      • __allrem.LIBCMT ref: 00550122
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00550140
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                      • String ID:
                                                                      • API String ID: 1992179935-0
                                                                      • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                      • Instruction ID: 90d44d1fc03783f429a0cf382165cb5dcb71cf7ee453a8cc1e7b8cc513e35bd0
                                                                      • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                      • Instruction Fuzzy Hash: 2981F772A00B06ABE7249F28CC59BAB7BE8BF81325F24453BF811D76C1E770D9088751
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005482D9,005482D9,?,?,?,0055644F,00000001,00000001,8BE85006), ref: 00556258
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0055644F,00000001,00000001,8BE85006,?,?,?), ref: 005562DE
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005563D8
                                                                      • __freea.LIBCMT ref: 005563E5
                                                                        • Part of subcall function 00553820: RtlAllocateHeap.NTDLL(00000000,?,005F1444,?,0053FDF5,?,?,0052A976,00000010,005F1440,005213FC,?,005213C6,?,00521129), ref: 00553852
                                                                      • __freea.LIBCMT ref: 005563EE
                                                                      • __freea.LIBCMT ref: 00556413
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1414292761-0
                                                                      • Opcode ID: 38abecfe43b874bb87817a917a463badf655ae9f7379b664e57f76972b4668c2
                                                                      • Instruction ID: fe5d813e252220dfd51fba797107032cd88f4ddf262dfa2fe56fb977323dd26f
                                                                      • Opcode Fuzzy Hash: 38abecfe43b874bb87817a917a463badf655ae9f7379b664e57f76972b4668c2
                                                                      • Instruction Fuzzy Hash: FB510172600246ABEB258F64CCA5EAF7FA9FB84751F564A2AFC05D7140EB34DC48C660
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                        • Part of subcall function 005AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,005AB6AE,?,?), ref: 005AC9B5
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005AC9F1
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005ACA68
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005ACA9E
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005ABCCA
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 005ABD25
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 005ABD6A
                                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 005ABD99
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 005ABDF3
                                                                      • RegCloseKey.ADVAPI32(?), ref: 005ABDFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                      • String ID:
                                                                      • API String ID: 1120388591-0
                                                                      • Opcode ID: d5cd10b76658c05b53825450d8d42a310108ed3b1d174dc1dce735c691a1f858
                                                                      • Instruction ID: c23463314fa766a41c36a031a5c72ef339e5d66cc60cba3010c4b554bf714d3c
                                                                      • Opcode Fuzzy Hash: d5cd10b76658c05b53825450d8d42a310108ed3b1d174dc1dce735c691a1f858
                                                                      • Instruction Fuzzy Hash: FE818F70208242AFD714DF24C895E6ABFE5FF86308F14895CF4554B2A2DB31ED45CB92
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(00000035), ref: 0057F7B9
                                                                      • SysAllocString.OLEAUT32(00000001), ref: 0057F860
                                                                      • VariantCopy.OLEAUT32(0057FA64,00000000), ref: 0057F889
                                                                      • VariantClear.OLEAUT32(0057FA64), ref: 0057F8AD
                                                                      • VariantCopy.OLEAUT32(0057FA64,00000000), ref: 0057F8B1
                                                                      • VariantClear.OLEAUT32(?), ref: 0057F8BB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                                      • String ID:
                                                                      • API String ID: 3859894641-0
                                                                      • Opcode ID: 40bd826c446280103ec8b3f660e8b39686132a70bf1183b3b85f4fb0e0da6946
                                                                      • Instruction ID: 339837e371e0f204d1dfeb43f3e76fad67a45db00d536ff5b73d823e6e42d5fc
                                                                      • Opcode Fuzzy Hash: 40bd826c446280103ec8b3f660e8b39686132a70bf1183b3b85f4fb0e0da6946
                                                                      • Instruction Fuzzy Hash: 3E51D831500311BACF10EB65F899B69BBA8FF95310F24D866F909EF291DB709C40E766
                                                                      APIs
                                                                        • Part of subcall function 00527620: _wcslen.LIBCMT ref: 00527625
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 005994E5
                                                                      • _wcslen.LIBCMT ref: 00599506
                                                                      • _wcslen.LIBCMT ref: 0059952D
                                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00599585
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$FileName$OpenSave
                                                                      • String ID: X
                                                                      • API String ID: 83654149-3081909835
                                                                      • Opcode ID: 580924cb930a2c6146f67ca9ba877da1afd29020ce2e0e4ec8fd1ebb8e40d6e4
                                                                      • Instruction ID: d588a2c74e7afcba920a1dbf1d6663a057cc05898b988c7a02bc04c4f325244e
                                                                      • Opcode Fuzzy Hash: 580924cb930a2c6146f67ca9ba877da1afd29020ce2e0e4ec8fd1ebb8e40d6e4
                                                                      • Instruction Fuzzy Hash: F6E1C3316043518FDB24DF28D485A6ABBE4BFC5314F04896CF8899B2A2EB31DD05CB92
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • BeginPaint.USER32(?,?,?), ref: 00539241
                                                                      • GetWindowRect.USER32(?,?), ref: 005392A5
                                                                      • ScreenToClient.USER32(?,?), ref: 005392C2
                                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005392D3
                                                                      • EndPaint.USER32(?,?,?,?,?), ref: 00539321
                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 005771EA
                                                                        • Part of subcall function 00539339: BeginPath.GDI32(00000000), ref: 00539357
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                      • String ID:
                                                                      • API String ID: 3050599898-0
                                                                      • Opcode ID: ec27c95d0c4bf5239ef87194e2fd336aa1fc90dd4a9cf9dfc6d5056531cfb605
                                                                      • Instruction ID: a70d723743df2cef06786199bedf2cd8d249be5c727fe86ca6155e8c126d5ece
                                                                      • Opcode Fuzzy Hash: ec27c95d0c4bf5239ef87194e2fd336aa1fc90dd4a9cf9dfc6d5056531cfb605
                                                                      • Instruction Fuzzy Hash: DB41AEB0104601AFD711DF28D884FBA7FA8FB99320F140669F995D72A1C7B1A849EB61
                                                                      APIs
                                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0059080C
                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00590847
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00590863
                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 005908DC
                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 005908F3
                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00590921
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                      • String ID:
                                                                      • API String ID: 3368777196-0
                                                                      • Opcode ID: 50de32bd647208e3a4bca8193274e82f24595a4826c264601eef7a61a704fb14
                                                                      • Instruction ID: 18289d33714260a21b1f48c4bae703f0f3a7bc956bcfa847efe4d3401cc2ad29
                                                                      • Opcode Fuzzy Hash: 50de32bd647208e3a4bca8193274e82f24595a4826c264601eef7a61a704fb14
                                                                      • Instruction Fuzzy Hash: DE415971A00206AFDF149F54DC85AAABB78FF44314F1444A9ED00AA296D730EE64EBA4
                                                                      APIs
                                                                        • Part of subcall function 00523AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00523A97,?,?,00522E7F,?,?,?,00000000), ref: 00523AC2
                                                                      • _wcslen.LIBCMT ref: 0059587B
                                                                      • CoInitialize.OLE32(00000000), ref: 00595995
                                                                      • CoCreateInstance.OLE32(005BFCF8,00000000,00000001,005BFB68,?), ref: 005959AE
                                                                      • CoUninitialize.OLE32 ref: 005959CC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                      • String ID: .lnk
                                                                      • API String ID: 3172280962-24824748
                                                                      • Opcode ID: 3b50badbb25745b40c61b37dd51a20ef0c55fa6830df480fab16e06b3990d968
                                                                      • Instruction ID: 0584bb36d8d77a450fb01dc387ebc26c48922bdaf639e7646d658081a7806e4c
                                                                      • Opcode Fuzzy Hash: 3b50badbb25745b40c61b37dd51a20ef0c55fa6830df480fab16e06b3990d968
                                                                      • Instruction Fuzzy Hash: 3ED175716047119FCB05DF24C484A2ABBE6FF89714F14485DF88A9B3A1EB31EC05CB92
                                                                      APIs
                                                                        • Part of subcall function 00580FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00580FCA
                                                                        • Part of subcall function 00580FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00580FD6
                                                                        • Part of subcall function 00580FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00580FE5
                                                                        • Part of subcall function 00580FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00580FEC
                                                                        • Part of subcall function 00580FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00581002
                                                                      • GetLengthSid.ADVAPI32(?,00000000,00581335), ref: 005817AE
                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005817BA
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 005817C1
                                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 005817DA
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00581335), ref: 005817EE
                                                                      • HeapFree.KERNEL32(00000000), ref: 005817F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                      • String ID:
                                                                      • API String ID: 3008561057-0
                                                                      • Opcode ID: c6a3459b4cf3c6a80353bf667bacdd1d8f36bbf1dd4df81ac3de839058022517
                                                                      • Instruction ID: a73f7efd8c3dea4e2594fdf3f2cac9545ad60a7b1fd00a2a13196822ad6f3a95
                                                                      • Opcode Fuzzy Hash: c6a3459b4cf3c6a80353bf667bacdd1d8f36bbf1dd4df81ac3de839058022517
                                                                      • Instruction Fuzzy Hash: CE119A72600605EBDB14AFA8DC49BAE7FADFB41355F104119F881F7210C735A949DB68
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005814FF
                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00581506
                                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00581515
                                                                      • CloseHandle.KERNEL32(00000004), ref: 00581520
                                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0058154F
                                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00581563
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                      • String ID:
                                                                      • API String ID: 1413079979-0
                                                                      • Opcode ID: 5ccdd155bf9956b2afc1cf4fbce782cd73e75ca461216826e93d6ad9b23ef96b
                                                                      • Instruction ID: 94bc9c7088693934c177abe84add4134b1585661ea37ee4a1d9ddb8a95f43197
                                                                      • Opcode Fuzzy Hash: 5ccdd155bf9956b2afc1cf4fbce782cd73e75ca461216826e93d6ad9b23ef96b
                                                                      • Instruction Fuzzy Hash: 5911447250420DABDF119FA8ED49FDE7FADFB48704F044128FE05A2060C3719E65AB68
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,00543379,00542FE5), ref: 00543390
                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0054339E
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005433B7
                                                                      • SetLastError.KERNEL32(00000000,?,00543379,00542FE5), ref: 00543409
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastValue___vcrt_
                                                                      • String ID:
                                                                      • API String ID: 3852720340-0
                                                                      • Opcode ID: 4ed3196521e057a80b0784772c8963212e6ab25802f89052b79af75a33e7bb74
                                                                      • Instruction ID: 1e42f2413ae754b9ef87eea5820330eba87fbce4915cf6f7373568ba25f8d18a
                                                                      • Opcode Fuzzy Hash: 4ed3196521e057a80b0784772c8963212e6ab25802f89052b79af75a33e7bb74
                                                                      • Instruction Fuzzy Hash: 2201D833609313BEAB1D2B747CCD5DB2EA4FB6577D7200629F421851F1EF119E0AA544
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,00555686,00563CD6,?,00000000,?,00555B6A,?,?,?,?,?,0054E6D1,?,005E8A48), ref: 00552D78
                                                                      • _free.LIBCMT ref: 00552DAB
                                                                      • _free.LIBCMT ref: 00552DD3
                                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0054E6D1,?,005E8A48,00000010,00524F4A,?,?,00000000,00563CD6), ref: 00552DE0
                                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0054E6D1,?,005E8A48,00000010,00524F4A,?,?,00000000,00563CD6), ref: 00552DEC
                                                                      • _abort.LIBCMT ref: 00552DF2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$_abort
                                                                      • String ID:
                                                                      • API String ID: 3160817290-0
                                                                      • Opcode ID: b21147a3eede90382dd6899fb1a00a11b413731e3f79adc9401a76740868eade
                                                                      • Instruction ID: 864f3cf40d1bc2b1eb4bc63ea831c2b4e1f29a26819b9d9e2a925165ff3bf6fb
                                                                      • Opcode Fuzzy Hash: b21147a3eede90382dd6899fb1a00a11b413731e3f79adc9401a76740868eade
                                                                      • Instruction Fuzzy Hash: D0F08636504A0167C35627246C2AE5A2E757BD37A3F24451BFC2992192DE24984F5360
                                                                      APIs
                                                                        • Part of subcall function 00539639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00539693
                                                                        • Part of subcall function 00539639: SelectObject.GDI32(?,00000000), ref: 005396A2
                                                                        • Part of subcall function 00539639: BeginPath.GDI32(?), ref: 005396B9
                                                                        • Part of subcall function 00539639: SelectObject.GDI32(?,00000000), ref: 005396E2
                                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 005B8A4E
                                                                      • LineTo.GDI32(?,00000003,00000000), ref: 005B8A62
                                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 005B8A70
                                                                      • LineTo.GDI32(?,00000000,00000003), ref: 005B8A80
                                                                      • EndPath.GDI32(?), ref: 005B8A90
                                                                      • StrokePath.GDI32(?), ref: 005B8AA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                      • String ID:
                                                                      • API String ID: 43455801-0
                                                                      • Opcode ID: fe788013630029c0481fb851b2a9a991f21c7b65a7082156d62d175186edfe25
                                                                      • Instruction ID: 8411b70163eedc0b04371913744567bf69f19a835fea9c5899d2531e9f1f4e6a
                                                                      • Opcode Fuzzy Hash: fe788013630029c0481fb851b2a9a991f21c7b65a7082156d62d175186edfe25
                                                                      • Instruction Fuzzy Hash: 9711097640010DFFDB129F94DC88EAA7F6CEB18350F008152BA199A1A1C771AD59EFA4
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 00585218
                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00585229
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00585230
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00585238
                                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0058524F
                                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00585261
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDevice$Release
                                                                      • String ID:
                                                                      • API String ID: 1035833867-0
                                                                      • Opcode ID: 3d3bc3c76d8ad4fae09acb0cf60fc811326164e26ec2658b606753398e6c57ee
                                                                      • Instruction ID: fdefd06ffa27982b2cd8658f81c18eda1ea0d795320d0fb4526ba3ae866a9d32
                                                                      • Opcode Fuzzy Hash: 3d3bc3c76d8ad4fae09acb0cf60fc811326164e26ec2658b606753398e6c57ee
                                                                      • Instruction Fuzzy Hash: EB01A275E00708BBEB10AFA99C49E5EBFB8FF58351F044165FA05A7280DA709C04DFA4
                                                                      APIs
                                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0058EB30
                                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0058EB46
                                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0058EB55
                                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0058EB64
                                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0058EB6E
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0058EB75
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                      • String ID:
                                                                      • API String ID: 839392675-0
                                                                      • Opcode ID: 92c769172a684d6a47b0a829d0cb4aee8744cfa8f2870dac1c285e35811ed1d5
                                                                      • Instruction ID: 4644303925b1551b6a649f18666a6b5693e8aa88e4cbe4c0085367221f08af52
                                                                      • Opcode Fuzzy Hash: 92c769172a684d6a47b0a829d0cb4aee8744cfa8f2870dac1c285e35811ed1d5
                                                                      • Instruction Fuzzy Hash: 83F05472140158BBE7615B569C0EEEF3F7CEFDBB11F000259FA01E5091E7A06A05D6B9
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0058187F
                                                                      • UnloadUserProfile.USERENV(?,?), ref: 0058188B
                                                                      • CloseHandle.KERNEL32(?), ref: 00581894
                                                                      • CloseHandle.KERNEL32(?), ref: 0058189C
                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005818A5
                                                                      • HeapFree.KERNEL32(00000000), ref: 005818AC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                      • String ID:
                                                                      • API String ID: 146765662-0
                                                                      • Opcode ID: d5f59e63690fff0f947412f9fc1f9f236a32d51af231c8bf79f4180fd58da4fc
                                                                      • Instruction ID: 47ac40039174e12b3e83dba1a7fdc89dd196940b44b88f4016afd0d9dc15f996
                                                                      • Opcode Fuzzy Hash: d5f59e63690fff0f947412f9fc1f9f236a32d51af231c8bf79f4180fd58da4fc
                                                                      • Instruction Fuzzy Hash: 6EE0E576004101BBDB815FA5ED0C90ABF79FF69B22B508725F22591070CB32A424EF68
                                                                      APIs
                                                                        • Part of subcall function 00540242: EnterCriticalSection.KERNEL32(005F070C,005F1884,?,?,0053198B,005F2518,?,?,?,005212F9,00000000), ref: 0054024D
                                                                        • Part of subcall function 00540242: LeaveCriticalSection.KERNEL32(005F070C,?,0053198B,005F2518,?,?,?,005212F9,00000000), ref: 0054028A
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                        • Part of subcall function 005400A3: __onexit.LIBCMT ref: 005400A9
                                                                      • __Init_thread_footer.LIBCMT ref: 005A7BFB
                                                                        • Part of subcall function 005401F8: EnterCriticalSection.KERNEL32(005F070C,?,?,00538747,005F2514), ref: 00540202
                                                                        • Part of subcall function 005401F8: LeaveCriticalSection.KERNEL32(005F070C,?,00538747,005F2514), ref: 00540235
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                      • String ID: +TW$5$G$Variable must be of type 'Object'.
                                                                      • API String ID: 535116098-2763875210
                                                                      • Opcode ID: 2b7a9087d7fa02fd75886998e869c2325393eb5f21124b493f7ee73b559c0efc
                                                                      • Instruction ID: 24978a0a1fe812fb697f7b221103668c3ab6f137581debe77b8432cba300daf5
                                                                      • Opcode Fuzzy Hash: 2b7a9087d7fa02fd75886998e869c2325393eb5f21124b493f7ee73b559c0efc
                                                                      • Instruction Fuzzy Hash: 60918A70A0420AEFCB04EF54D8959BDBFB5BF8A300F108459F806AB292DB71AE45CB50
                                                                      APIs
                                                                        • Part of subcall function 00527620: _wcslen.LIBCMT ref: 00527625
                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0058C6EE
                                                                      • _wcslen.LIBCMT ref: 0058C735
                                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0058C79C
                                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0058C7CA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                                      • String ID: 0
                                                                      • API String ID: 1227352736-4108050209
                                                                      • Opcode ID: 951ce911b346208d742e77f19ef76d72426b60b3f5b0267ba7bc91881d499ff3
                                                                      • Instruction ID: 996b78382c161752440cc2c09acadde52c0f31451a097468fada14ef2956647d
                                                                      • Opcode Fuzzy Hash: 951ce911b346208d742e77f19ef76d72426b60b3f5b0267ba7bc91881d499ff3
                                                                      • Instruction Fuzzy Hash: 2A51CE716143019BD754AF28C889A7A7FE8FF89314F040A2DFD95E31E0EB74D9049BA6
                                                                      APIs
                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 005AAEA3
                                                                        • Part of subcall function 00527620: _wcslen.LIBCMT ref: 00527625
                                                                      • GetProcessId.KERNEL32(00000000), ref: 005AAF38
                                                                      • CloseHandle.KERNEL32(00000000), ref: 005AAF67
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                      • String ID: <$@
                                                                      • API String ID: 146682121-1426351568
                                                                      • Opcode ID: 5792f83e361ea03c2637d509f8fb572f043102534606b10548dd642455e65234
                                                                      • Instruction ID: 8fee640a7de249e7fa69f3150908993935be42d36c38773916c8a2ee982adbe4
                                                                      • Opcode Fuzzy Hash: 5792f83e361ea03c2637d509f8fb572f043102534606b10548dd642455e65234
                                                                      • Instruction Fuzzy Hash: 1F717775A0022ADFCB14DF54D488A9EBFF4BF4A300F048499E856AB392D730ED45CB91
                                                                      APIs
                                                                      • GetWindowRect.USER32(011BD970,?), ref: 005B62E2
                                                                      • ScreenToClient.USER32(?,?), ref: 005B6315
                                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 005B6382
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ClientMoveRectScreen
                                                                      • String ID: @U=u
                                                                      • API String ID: 3880355969-2594219639
                                                                      • Opcode ID: a9d4c70b4faa8ccc045a6de70e39e0b5fef3f825e2b02edd8feeceb4bbc5b66d
                                                                      • Instruction ID: 0e52781348d57314a283f9fbdaafb56aadf7419c1c1b1faebd277c632d5cf861
                                                                      • Opcode Fuzzy Hash: a9d4c70b4faa8ccc045a6de70e39e0b5fef3f825e2b02edd8feeceb4bbc5b66d
                                                                      • Instruction Fuzzy Hash: 81514774A00609EFDB10CF68D880AEE7BB5FB95360F108669F9159B2A0D734ED81CB90
                                                                      APIs
                                                                        • Part of subcall function 0058B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005821D0,?,?,00000034,00000800,?,00000034), ref: 0058B42D
                                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00582760
                                                                        • Part of subcall function 0058B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0058B3F8
                                                                        • Part of subcall function 0058B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0058B355
                                                                        • Part of subcall function 0058B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00582194,00000034,?,?,00001004,00000000,00000000), ref: 0058B365
                                                                        • Part of subcall function 0058B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00582194,00000034,?,?,00001004,00000000,00000000), ref: 0058B37B
                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005827CD
                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0058281A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                      • String ID: @$@U=u
                                                                      • API String ID: 4150878124-826235744
                                                                      • Opcode ID: aad66e85ad57fa11f682e7316b9b14510e22eeb6f7d8b95836d0398720b0dbc6
                                                                      • Instruction ID: ffd9cecbbe1859d1e3e636f3f177346c15b60894b9b82cd9e53bd59d8eaf74a3
                                                                      • Opcode Fuzzy Hash: aad66e85ad57fa11f682e7316b9b14510e22eeb6f7d8b95836d0398720b0dbc6
                                                                      • Instruction Fuzzy Hash: 22412A72900219AFDB10EFA4C956AEEBBB8FF49300F104059EA55B7191DA706E45CBA0
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00587206
                                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0058723C
                                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0058724D
                                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 005872CF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                                      • String ID: DllGetClassObject
                                                                      • API String ID: 753597075-1075368562
                                                                      • Opcode ID: 559a923d6c017c93809e4d0e6568749c39fe035af05318284e74831bbd672a1d
                                                                      • Instruction ID: 18621d0e355e6d26faee7582ee88bfb1732ac71c4fe81b2dd15d6998668bc44a
                                                                      • Opcode Fuzzy Hash: 559a923d6c017c93809e4d0e6568749c39fe035af05318284e74831bbd672a1d
                                                                      • Instruction Fuzzy Hash: D1418275604208DFDB15DF54C884A9A7FA9FF88310F2484A9BD06AF21AD7B0DA44DBA0
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                      • API String ID: 176396367-4004644295
                                                                      • Opcode ID: 4fce76f203cf4ea1e358c6383da2c982cdd3d03cd46439517ef8a4d60c57df92
                                                                      • Instruction ID: 432ca7dd26d1a49fe723a719b403bcfc16ea58753c8fe9bab09ee2ffd4e03a98
                                                                      • Opcode Fuzzy Hash: 4fce76f203cf4ea1e358c6383da2c982cdd3d03cd46439517ef8a4d60c57df92
                                                                      • Instruction Fuzzy Hash: B631FB7360056E4BCB20DF6D98401BE3F917BA3754F154029E855AB345EA71CE45D7A0
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 005B2F8D
                                                                      • LoadLibraryW.KERNEL32(?), ref: 005B2F94
                                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 005B2FA9
                                                                      • DestroyWindow.USER32(?), ref: 005B2FB1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                      • String ID: SysAnimate32
                                                                      • API String ID: 3529120543-1011021900
                                                                      • Opcode ID: 0a48356a758a0cbb6efa8940e4807d654f7b111ef51eb04e64e415b569b1cb70
                                                                      • Instruction ID: 11febc03718f3efa59e81ff0b71da3b308a8720d1d007271ba9065eed5db3e3e
                                                                      • Opcode Fuzzy Hash: 0a48356a758a0cbb6efa8940e4807d654f7b111ef51eb04e64e415b569b1cb70
                                                                      • Instruction Fuzzy Hash: 0C219A71210209ABEF104F64DC8AEFB7BB9FB59364F100618F950D6190D771EC51AB70
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 005B56BB
                                                                      • _wcslen.LIBCMT ref: 005B56CD
                                                                      • _wcslen.LIBCMT ref: 005B56D8
                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 005B5816
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend_wcslen
                                                                      • String ID: @U=u
                                                                      • API String ID: 455545452-2594219639
                                                                      • Opcode ID: 65f3da220eec0082f8ad3110bc535f7674b21cd0373642890e7bbf2dc4041ce9
                                                                      • Instruction ID: 7866920e8b3f5b6ea17e027210c6ac435304353a35b465caf6b18d935ef7ac2d
                                                                      • Opcode Fuzzy Hash: 65f3da220eec0082f8ad3110bc535f7674b21cd0373642890e7bbf2dc4041ce9
                                                                      • Instruction Fuzzy Hash: D911E131A00609AADF249F658C85BEE3FACFF50764F104426F905D6081FB70AA84CB64
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0052604C
                                                                      • GetStockObject.GDI32(00000011), ref: 00526060
                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0052606A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateMessageObjectSendStockWindow
                                                                      • String ID: @U=u
                                                                      • API String ID: 3970641297-2594219639
                                                                      • Opcode ID: 21e1d1ad9c3706c2d040196288146568817f9489683c6cf35620b12da1f6162c
                                                                      • Instruction ID: b051cdd79701e89a64fb784602e5b39a41042ca31ed4c0075fc08850820bc686
                                                                      • Opcode Fuzzy Hash: 21e1d1ad9c3706c2d040196288146568817f9489683c6cf35620b12da1f6162c
                                                                      • Instruction Fuzzy Hash: 0E118B72501518BFEF124FA4AC48EEABF69FF1A3A4F000205FA0556150C732AC60EBA1
                                                                      APIs
                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00544D1E,005528E9,?,00544CBE,005528E9,005E88B8,0000000C,00544E15,005528E9,00000002), ref: 00544D8D
                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00544DA0
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00544D1E,005528E9,?,00544CBE,005528E9,005E88B8,0000000C,00544E15,005528E9,00000002,00000000), ref: 00544DC3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: a362d90ce26e4fdfdae099efa1f9fa05145b71f903f0dbdd4f5a8d2f2280c067
                                                                      • Instruction ID: d5d6c67841c1e5d500fb4c4f34fda5363472a6c50ae47cc77a062b9d596957d5
                                                                      • Opcode Fuzzy Hash: a362d90ce26e4fdfdae099efa1f9fa05145b71f903f0dbdd4f5a8d2f2280c067
                                                                      • Instruction Fuzzy Hash: 59F0AF34A40208BBDB149F94DC49BEDBFF8FF54715F0001A8F809A62A0CB70A945DF94
                                                                      APIs
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00524EDD,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524E9C
                                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00524EAE
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00524EDD,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524EC0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc
                                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                      • API String ID: 145871493-3689287502
                                                                      • Opcode ID: a55a89c0291d3face66b0093214304e8eff2c21decf66561332f4a148312c23a
                                                                      • Instruction ID: 5c0d92b3c0823a24a9cde40cc7e29a98b99df46f9e4a96540feb2968b0613a96
                                                                      • Opcode Fuzzy Hash: a55a89c0291d3face66b0093214304e8eff2c21decf66561332f4a148312c23a
                                                                      • Instruction Fuzzy Hash: C9E08636A016325BE2711729BC18A5F6E5CBF93F627060215FC00E2240DBA0DD0694A5
                                                                      APIs
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00563CDE,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524E62
                                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00524E74
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00563CDE,?,005F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00524E87
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc
                                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                      • API String ID: 145871493-1355242751
                                                                      • Opcode ID: 6d08b9620f01d0fb15a2a86c9ef6d8528c18039483bb8856064aff0e58e5948e
                                                                      • Instruction ID: dafec29e41676dd36853013663d7dc7f962c972c436fe341ae9f41ff5b918cbf
                                                                      • Opcode Fuzzy Hash: 6d08b9620f01d0fb15a2a86c9ef6d8528c18039483bb8856064aff0e58e5948e
                                                                      • Instruction Fuzzy Hash: 64D0C23150263257AA221B297C0CD8F2E1CBF82B113060611F800B6260CF60DD02D9E9
                                                                      APIs
                                                                      • GetCurrentProcessId.KERNEL32 ref: 005AA427
                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 005AA435
                                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 005AA468
                                                                      • CloseHandle.KERNEL32(?), ref: 005AA63D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                                      • String ID:
                                                                      • API String ID: 3488606520-0
                                                                      • Opcode ID: 5f571daaee9ae377e2f822f4b4ec0c24ccdcbd8beaec07be65db8dd25c9afbba
                                                                      • Instruction ID: c7767dc5406385d92ec213379eb40dbf9b7cc422fa9702a07ace5cfe6ab88e49
                                                                      • Opcode Fuzzy Hash: 5f571daaee9ae377e2f822f4b4ec0c24ccdcbd8beaec07be65db8dd25c9afbba
                                                                      • Instruction Fuzzy Hash: 7BA18D716043019FDB20DF24D886B2ABBE5BF89714F14881DF55A9B2D2D7B0ED41CB92
                                                                      APIs
                                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,005C3700), ref: 0055BB91
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,005F121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0055BC09
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,005F1270,000000FF,?,0000003F,00000000,?), ref: 0055BC36
                                                                      • _free.LIBCMT ref: 0055BB7F
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      • _free.LIBCMT ref: 0055BD4B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                      • String ID:
                                                                      • API String ID: 1286116820-0
                                                                      • Opcode ID: 6038e2c70fce2b73b5f13d9eab78508b1d816edcc2852362f78c0610538b8b65
                                                                      • Instruction ID: 9fb41806f2b0cc6c304fca5d41d4b97ed6fa7688d8c6f2782c748bfb760418fc
                                                                      • Opcode Fuzzy Hash: 6038e2c70fce2b73b5f13d9eab78508b1d816edcc2852362f78c0610538b8b65
                                                                      • Instruction Fuzzy Hash: 76512B7180020ADFEB10DFA58C999BEBFB8FF80321B10066BE850E7191EB709E48D754
                                                                      APIs
                                                                        • Part of subcall function 0058DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0058CF22,?), ref: 0058DDFD
                                                                        • Part of subcall function 0058DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0058CF22,?), ref: 0058DE16
                                                                        • Part of subcall function 0058E199: GetFileAttributesW.KERNEL32(?,0058CF95), ref: 0058E19A
                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0058E473
                                                                      • MoveFileW.KERNEL32(?,?), ref: 0058E4AC
                                                                      • _wcslen.LIBCMT ref: 0058E5EB
                                                                      • _wcslen.LIBCMT ref: 0058E603
                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0058E650
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 3183298772-0
                                                                      • Opcode ID: a54b9571d313fefd132ab0e9835860fe8989724d5c2e05322e97450f418d4787
                                                                      • Instruction ID: 77a2e215aa7a4fa3fa08b6db0be289889d0a73ff7cafd232a14846425f8d770b
                                                                      • Opcode Fuzzy Hash: a54b9571d313fefd132ab0e9835860fe8989724d5c2e05322e97450f418d4787
                                                                      • Instruction Fuzzy Hash: 775194B24083455BD724EB90D8869DFBBECBFC5344F00092EF989E3191EF75A5888766
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                        • Part of subcall function 005AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,005AB6AE,?,?), ref: 005AC9B5
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005AC9F1
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005ACA68
                                                                        • Part of subcall function 005AC998: _wcslen.LIBCMT ref: 005ACA9E
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005ABAA5
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 005ABB00
                                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 005ABB63
                                                                      • RegCloseKey.ADVAPI32(?,?), ref: 005ABBA6
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 005ABBB3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                      • String ID:
                                                                      • API String ID: 826366716-0
                                                                      • Opcode ID: 65647e9285f1d710664d47db9ce818fbf8be69e901018deee040f83205264b27
                                                                      • Instruction ID: 374a91f98a519e5a2b01b11d1629191f5cd54a51b8b3a5ebb1d1cd1beb00b438
                                                                      • Opcode Fuzzy Hash: 65647e9285f1d710664d47db9ce818fbf8be69e901018deee040f83205264b27
                                                                      • Instruction Fuzzy Hash: 7461A231208245AFD714DF14C494E2ABFE5FF86308F14895CF4998B2A2DB31ED45CBA2
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(?), ref: 00588BCD
                                                                      • VariantClear.OLEAUT32 ref: 00588C3E
                                                                      • VariantClear.OLEAUT32 ref: 00588C9D
                                                                      • VariantClear.OLEAUT32(?), ref: 00588D10
                                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00588D3B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$Clear$ChangeInitType
                                                                      • String ID:
                                                                      • API String ID: 4136290138-0
                                                                      • Opcode ID: 8058ac2d7265c30a92503b199e84e4b71c67ebe218d93dc1cb599219141c94d3
                                                                      • Instruction ID: d181e8deed7f8186bdefd306a39c25b74326e71b8558c9de7009156a1902793f
                                                                      • Opcode Fuzzy Hash: 8058ac2d7265c30a92503b199e84e4b71c67ebe218d93dc1cb599219141c94d3
                                                                      • Instruction Fuzzy Hash: F85169B5A01219EFCB14DF68C894AAABBF8FF89310B158559ED05EB354E730E911CF90
                                                                      APIs
                                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00598BAE
                                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00598BDA
                                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00598C32
                                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00598C57
                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00598C5F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfile$SectionWrite$String
                                                                      • String ID:
                                                                      • API String ID: 2832842796-0
                                                                      • Opcode ID: 3748efb18871fa3ed9e8c61fa8500a5b0ab31f2faf58f30bc031877a9148d1e8
                                                                      • Instruction ID: 76a7e9d7725fe861352df056d29411af3c28bd007cd0948bec61cc79718d6633
                                                                      • Opcode Fuzzy Hash: 3748efb18871fa3ed9e8c61fa8500a5b0ab31f2faf58f30bc031877a9148d1e8
                                                                      • Instruction Fuzzy Hash: 2E513835A002199FCB05DF64C885A69BBF5FF89314F088458E849AB3A2DB35ED51DB90
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 005A8F40
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 005A8FD0
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 005A8FEC
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 005A9032
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 005A9052
                                                                        • Part of subcall function 0053F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00591043,?,75B8E610), ref: 0053F6E6
                                                                        • Part of subcall function 0053F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0057FA64,00000000,00000000,?,?,00591043,?,75B8E610,?,0057FA64), ref: 0053F70D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                      • String ID:
                                                                      • API String ID: 666041331-0
                                                                      • Opcode ID: f5bc57558b8b90a9dfd35b7dc908e1cf6052ae0ed5964cfb73534c5e365b02ce
                                                                      • Instruction ID: 2327bbf0230121725cd9d25604984c03c2550a0f4da7c0831842b731047de43a
                                                                      • Opcode Fuzzy Hash: f5bc57558b8b90a9dfd35b7dc908e1cf6052ae0ed5964cfb73534c5e365b02ce
                                                                      • Instruction Fuzzy Hash: 66511935604216DFC715DF58C4988ADBFB1FF8A314F0881A9E816AB362DB31ED85CB90
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: a6d3e0ec123f4a15a19d8b4c7f069d62f89d13a615c1fa5ef7ae5f7200db56e4
                                                                      • Instruction ID: 6660d7b20255ad0e2e77255ef05003e2613651b1c5fccc8721ac94554bb3e2e2
                                                                      • Opcode Fuzzy Hash: a6d3e0ec123f4a15a19d8b4c7f069d62f89d13a615c1fa5ef7ae5f7200db56e4
                                                                      • Instruction Fuzzy Hash: 6741D232A002009FCB24DF78C995A5EBBB5FF8A314F15456AE915EB3A1D731ED05DB80
                                                                      APIs
                                                                      • GetCursorPos.USER32(?), ref: 00539141
                                                                      • ScreenToClient.USER32(00000000,?), ref: 0053915E
                                                                      • GetAsyncKeyState.USER32(00000001), ref: 00539183
                                                                      • GetAsyncKeyState.USER32(00000002), ref: 0053919D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AsyncState$ClientCursorScreen
                                                                      • String ID:
                                                                      • API String ID: 4210589936-0
                                                                      • Opcode ID: 332512103cae5ad2b1ae150693f490b3a4a35227cbace9fa9d7096e0c486874c
                                                                      • Instruction ID: 3e2232b8b08684002578e5e8e2c0e4b71c23f226704c290178a9d1d7ef64302d
                                                                      • Opcode Fuzzy Hash: 332512103cae5ad2b1ae150693f490b3a4a35227cbace9fa9d7096e0c486874c
                                                                      • Instruction Fuzzy Hash: ED415E71A0850BBBDF159F64D848BEEBB74FB49320F208219E429A2290C7706954DFA1
                                                                      APIs
                                                                      • GetInputState.USER32 ref: 005938CB
                                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00593922
                                                                      • TranslateMessage.USER32(?), ref: 0059394B
                                                                      • DispatchMessageW.USER32(?), ref: 00593955
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00593966
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                      • String ID:
                                                                      • API String ID: 2256411358-0
                                                                      • Opcode ID: cd8ad67ac7fa226325017e3fd0267d4b1b7e479907640bbdc30029e90ad5ec75
                                                                      • Instruction ID: a27855e6102014b3c9977e957fc296af2367682c83a06018b4aac20120476877
                                                                      • Opcode Fuzzy Hash: cd8ad67ac7fa226325017e3fd0267d4b1b7e479907640bbdc30029e90ad5ec75
                                                                      • Instruction Fuzzy Hash: 2C31A270904642DEEF35CF249848BB63FA8FB25344F04096DE466C61E0E7A8AA89DB15
                                                                      APIs
                                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0059C21E,00000000), ref: 0059CF38
                                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 0059CF6F
                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,0059C21E,00000000), ref: 0059CFB4
                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0059C21E,00000000), ref: 0059CFC8
                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0059C21E,00000000), ref: 0059CFF2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                      • String ID:
                                                                      • API String ID: 3191363074-0
                                                                      • Opcode ID: 7e3be282f831d546f21bbdf7722315726a858e69981d9d2d5a0d377744fde669
                                                                      • Instruction ID: 22ad52cf27ff762079aafeedc7baf63d2c0b9b5bc9cd26337e53814d2f8e7765
                                                                      • Opcode Fuzzy Hash: 7e3be282f831d546f21bbdf7722315726a858e69981d9d2d5a0d377744fde669
                                                                      • Instruction Fuzzy Hash: E2315971A00206EFDF20DFA5C888AABBFF9FB54354B10442EF506D2241EB30AE44DB60
                                                                      APIs
                                                                      • GetWindowRect.USER32(?,?), ref: 00581915
                                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 005819C1
                                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 005819C9
                                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 005819DA
                                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 005819E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePostSleep$RectWindow
                                                                      • String ID:
                                                                      • API String ID: 3382505437-0
                                                                      • Opcode ID: 5d39cfbcd0157e1378332716c296ad2b57eb0b549a3ba1d4b835281dd88e5102
                                                                      • Instruction ID: 36a57f4aafb68e11eba5f1d76942dd8ccb27bd707a27f19d1fd1f94ef7338621
                                                                      • Opcode Fuzzy Hash: 5d39cfbcd0157e1378332716c296ad2b57eb0b549a3ba1d4b835281dd88e5102
                                                                      • Instruction Fuzzy Hash: 5D31BE71A00219EFCB00DFACC999AAE3FB9FB04314F104225FD61AB2D0C770A945DB94
                                                                      APIs
                                                                      • IsWindow.USER32(00000000), ref: 005A0951
                                                                      • GetForegroundWindow.USER32 ref: 005A0968
                                                                      • GetDC.USER32(00000000), ref: 005A09A4
                                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 005A09B0
                                                                      • ReleaseDC.USER32(00000000,00000003), ref: 005A09E8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ForegroundPixelRelease
                                                                      • String ID:
                                                                      • API String ID: 4156661090-0
                                                                      • Opcode ID: e83ae86ae193bffe878daa2d6d7658563261eea7667f72ed53ae1575e2bdd25e
                                                                      • Instruction ID: d6aa29661abe00e4492aa8dd87894fa44e74fc5e70aa6bf6c8ef2c86cdd071c2
                                                                      • Opcode Fuzzy Hash: e83ae86ae193bffe878daa2d6d7658563261eea7667f72ed53ae1575e2bdd25e
                                                                      • Instruction Fuzzy Hash: F7216235600214AFDB44EF69D949A5EBFE9FF85700F048568E84A97792DB30AC04DB50
                                                                      APIs
                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0055CDC6
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0055CDE9
                                                                        • Part of subcall function 00553820: RtlAllocateHeap.NTDLL(00000000,?,005F1444,?,0053FDF5,?,?,0052A976,00000010,005F1440,005213FC,?,005213C6,?,00521129), ref: 00553852
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0055CE0F
                                                                      • _free.LIBCMT ref: 0055CE22
                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0055CE31
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                      • String ID:
                                                                      • API String ID: 336800556-0
                                                                      • Opcode ID: 123e23ffeec0ae9e497cf56905e36f1bbb75fe8b228e62686718ed3488f4fbb9
                                                                      • Instruction ID: ed66ebb59d7383905ac402f9b42650d98064af381dbcecc8b2a338f74ff4a443
                                                                      • Opcode Fuzzy Hash: 123e23ffeec0ae9e497cf56905e36f1bbb75fe8b228e62686718ed3488f4fbb9
                                                                      • Instruction Fuzzy Hash: 0D01FC726013157F232216BA6C5EC7F7D6DFEC7BA2315022BFD05D7200DA619D0991B4
                                                                      APIs
                                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00539693
                                                                      • SelectObject.GDI32(?,00000000), ref: 005396A2
                                                                      • BeginPath.GDI32(?), ref: 005396B9
                                                                      • SelectObject.GDI32(?,00000000), ref: 005396E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                      • String ID:
                                                                      • API String ID: 3225163088-0
                                                                      • Opcode ID: e7f99f4d4f8b5d34093a73da8ea2b0a4fbde4337ba6e9ac5b0873cd9d83b0368
                                                                      • Instruction ID: 97a9d93d791892336cf30f5931193b7792d6e4c23eab83a4a9cec6c905423b0e
                                                                      • Opcode Fuzzy Hash: e7f99f4d4f8b5d34093a73da8ea2b0a4fbde4337ba6e9ac5b0873cd9d83b0368
                                                                      • Instruction Fuzzy Hash: 94217FB0802709EBDB119F69EE197B93FA8BB60315F104616F410E61A0D3F45899EFD8
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _memcmp
                                                                      • String ID:
                                                                      • API String ID: 2931989736-0
                                                                      • Opcode ID: 78e7d8d841ee572913f3f8f3f355d4829d85a90800476f83d49baac30a6fe80f
                                                                      • Instruction ID: 5822570213de437c4b8494430ab3721cfe4ecb1a6cd4eb617b2c939b48d7ba26
                                                                      • Opcode Fuzzy Hash: 78e7d8d841ee572913f3f8f3f355d4829d85a90800476f83d49baac30a6fe80f
                                                                      • Instruction Fuzzy Hash: AA019275645A0ABBE20865109D82EFA7F5CFB613D8F408420FE05EA241F660FD5083A8
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,0054F2DE,00553863,005F1444,?,0053FDF5,?,?,0052A976,00000010,005F1440,005213FC,?,005213C6), ref: 00552DFD
                                                                      • _free.LIBCMT ref: 00552E32
                                                                      • _free.LIBCMT ref: 00552E59
                                                                      • SetLastError.KERNEL32(00000000,00521129), ref: 00552E66
                                                                      • SetLastError.KERNEL32(00000000,00521129), ref: 00552E6F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: 3e108e0aaee90d095f72e2d94afe3fc06a763c2ea921a08281b225d86d95617a
                                                                      • Instruction ID: e659e877062dd24f6b21f29154ddd0b99110218f9b07dea88b8d19a58330dd99
                                                                      • Opcode Fuzzy Hash: 3e108e0aaee90d095f72e2d94afe3fc06a763c2ea921a08281b225d86d95617a
                                                                      • Instruction Fuzzy Hash: 7501D636105A0167871227746C6BD3B2E6DBBE33B7F24452BFC65A2292EA249C0D5320
                                                                      APIs
                                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?,?,0058035E), ref: 0058002B
                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?), ref: 00580046
                                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?), ref: 00580054
                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?), ref: 00580064
                                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0057FF41,80070057,?,?), ref: 00580070
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 3897988419-0
                                                                      • Opcode ID: b802ef10df720e4d9570330194703c4a5b7b1aac472c55bef251aac918a49edc
                                                                      • Instruction ID: 0769abdc5c3671f8d877f02854e479d43b4131c32ea4435a7019775f0a99409b
                                                                      • Opcode Fuzzy Hash: b802ef10df720e4d9570330194703c4a5b7b1aac472c55bef251aac918a49edc
                                                                      • Instruction Fuzzy Hash: E701B872600204EFDB906F69DC08BAA7EADEF44392F145224FC05E2250E771ED08ABA0
                                                                      APIs
                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0058E997
                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 0058E9A5
                                                                      • Sleep.KERNEL32(00000000), ref: 0058E9AD
                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0058E9B7
                                                                      • Sleep.KERNEL32 ref: 0058E9F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                      • String ID:
                                                                      • API String ID: 2833360925-0
                                                                      • Opcode ID: a09aaf47f958f957ecc4e425f7fec4bdcdd82b31e0af35e49f1dc358ec85b016
                                                                      • Instruction ID: 4a6fb057b2ce1c51ac7d3069e6628ffd4f1b98518c34545cd4d1a925f6cef4db
                                                                      • Opcode Fuzzy Hash: a09aaf47f958f957ecc4e425f7fec4bdcdd82b31e0af35e49f1dc358ec85b016
                                                                      • Instruction Fuzzy Hash: C0016931D01629DBCF40AFE8DC4AAEDBF78FF18301F000646E942B2241CB70A558DBA5
                                                                      APIs
                                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00581114
                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 00581120
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 0058112F
                                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00580B9B,?,?,?), ref: 00581136
                                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0058114D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 842720411-0
                                                                      • Opcode ID: 7c310b46b6e230df729d1dfd898d6bb39c81c82c1256d5904fb23839181cd6eb
                                                                      • Instruction ID: a139880ca4bc3f5c1bdc18dc6405b4069b0fab20c48842c78a3a17d4dd9e7c1a
                                                                      • Opcode Fuzzy Hash: 7c310b46b6e230df729d1dfd898d6bb39c81c82c1256d5904fb23839181cd6eb
                                                                      • Instruction Fuzzy Hash: A5016975200605BFDB515FA8DC4DAAA3F6EFF893A0B200419FA41E3360DA31EC00EB64
                                                                      APIs
                                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00580FCA
                                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00580FD6
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00580FE5
                                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00580FEC
                                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00581002
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 44706859-0
                                                                      • Opcode ID: 4b0e7bc37e75927c5ef03d6697f2a2a3718ef4841bd5082f0e9b56632dbb1376
                                                                      • Instruction ID: da963179230029e13e34fd478b1ad875425a892868b1dca0054f08ece0d61abc
                                                                      • Opcode Fuzzy Hash: 4b0e7bc37e75927c5ef03d6697f2a2a3718ef4841bd5082f0e9b56632dbb1376
                                                                      • Instruction Fuzzy Hash: 03F0A975200305EBDB212FA99C4DF5A3FADFF99762F100425FA05E6250DA30EC409B64
                                                                      APIs
                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0058102A
                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00581036
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00581045
                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0058104C
                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00581062
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 44706859-0
                                                                      • Opcode ID: 7f3a7d843088baa22b60ca5ce8bae7f78181197eba5b6ea5aa78649664fb72c8
                                                                      • Instruction ID: 5cade6e077317f393348236281f314b0e0217e74ef410b7a66b74c2c9d865dc5
                                                                      • Opcode Fuzzy Hash: 7f3a7d843088baa22b60ca5ce8bae7f78181197eba5b6ea5aa78649664fb72c8
                                                                      • Instruction Fuzzy Hash: 12F0A975200305EBDB212FAAEC4CF5B3FADFF99761F100425FA05E6250CA30E8409B64
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(?,?,?,?,0059017D,?,005932FC,?,00000001,00562592,?), ref: 00590324
                                                                      • CloseHandle.KERNEL32(?,?,?,?,0059017D,?,005932FC,?,00000001,00562592,?), ref: 00590331
                                                                      • CloseHandle.KERNEL32(?,?,?,?,0059017D,?,005932FC,?,00000001,00562592,?), ref: 0059033E
                                                                      • CloseHandle.KERNEL32(?,?,?,?,0059017D,?,005932FC,?,00000001,00562592,?), ref: 0059034B
                                                                      • CloseHandle.KERNEL32(?,?,?,?,0059017D,?,005932FC,?,00000001,00562592,?), ref: 00590358
                                                                      • CloseHandle.KERNEL32(?,?,?,?,0059017D,?,005932FC,?,00000001,00562592,?), ref: 00590365
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 2b6ff41047de206ad0009c099dcaadd02568b4de654a7c89a0688541bc8a34ef
                                                                      • Instruction ID: 24475d4993225d98dc47e6dc83d6f5f8e811944f360101244c4717e83edcea55
                                                                      • Opcode Fuzzy Hash: 2b6ff41047de206ad0009c099dcaadd02568b4de654a7c89a0688541bc8a34ef
                                                                      • Instruction Fuzzy Hash: AA019C72800B159FCB30AF6AD880816FBF9BF602153159E3ED19652971C3B1A958DE80
                                                                      APIs
                                                                      • _free.LIBCMT ref: 0055D752
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      • _free.LIBCMT ref: 0055D764
                                                                      • _free.LIBCMT ref: 0055D776
                                                                      • _free.LIBCMT ref: 0055D788
                                                                      • _free.LIBCMT ref: 0055D79A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 2f268cdac8bd7fdc0922fb7aa8ea04e53c2b56563c7ab7114156f35e58918913
                                                                      • Instruction ID: d00f5848e50bc9f4742c1f08a80fd5bd95588d0cdcb4a81b0eb9b4d6dc476a52
                                                                      • Opcode Fuzzy Hash: 2f268cdac8bd7fdc0922fb7aa8ea04e53c2b56563c7ab7114156f35e58918913
                                                                      • Instruction Fuzzy Hash: 76F03C33514259AB8629EB64F9D5D567FFDFB49312BA40806F889EB602C720FC888670
                                                                      APIs
                                                                      • _free.LIBCMT ref: 005522BE
                                                                        • Part of subcall function 005529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000), ref: 005529DE
                                                                        • Part of subcall function 005529C8: GetLastError.KERNEL32(00000000,?,0055D7D1,00000000,00000000,00000000,00000000,?,0055D7F8,00000000,00000007,00000000,?,0055DBF5,00000000,00000000), ref: 005529F0
                                                                      • _free.LIBCMT ref: 005522D0
                                                                      • _free.LIBCMT ref: 005522E3
                                                                      • _free.LIBCMT ref: 005522F4
                                                                      • _free.LIBCMT ref: 00552305
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 67200c7125518f004cc6930927bd756ede134c2be2f567fa4b5c945ad9a05250
                                                                      • Instruction ID: e089f807f6cd22eee2c7701099f45155f839f998c40b1d80b8af1bdf89f60daa
                                                                      • Opcode Fuzzy Hash: 67200c7125518f004cc6930927bd756ede134c2be2f567fa4b5c945ad9a05250
                                                                      • Instruction Fuzzy Hash: 11F054784005119B8616AF99BC558683F74F73A752F041507F818E63B2C739445EFFE8
                                                                      APIs
                                                                      • EndPath.GDI32(?), ref: 005395D4
                                                                      • StrokeAndFillPath.GDI32(?,?,005771F7,00000000,?,?,?), ref: 005395F0
                                                                      • SelectObject.GDI32(?,00000000), ref: 00539603
                                                                      • DeleteObject.GDI32 ref: 00539616
                                                                      • StrokePath.GDI32(?), ref: 00539631
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                      • String ID:
                                                                      • API String ID: 2625713937-0
                                                                      • Opcode ID: 3d71965261e74c30db9a070ee4f40aac361a7921d29908255e3407ad5bf23d09
                                                                      • Instruction ID: 8f6a08509bb903b5a1fbd163d8fceedd2e755b9ae02f395265644a3bd4f7b350
                                                                      • Opcode Fuzzy Hash: 3d71965261e74c30db9a070ee4f40aac361a7921d29908255e3407ad5bf23d09
                                                                      • Instruction Fuzzy Hash: CFF03C30006A08EBDB126F69EE1D7793F65BB20322F048314F465950F0C7B89999EFA8
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: __freea$_free
                                                                      • String ID: a/p$am/pm
                                                                      • API String ID: 3432400110-3206640213
                                                                      • Opcode ID: 29e3b6562fc4174c8fa929cc52f202f8922dfcff4c03af7b0ac6812b9ede15f4
                                                                      • Instruction ID: 618f01121c051bdf72503e69896e72d8dbf16e2623c5c1cc83ae28511100031d
                                                                      • Opcode Fuzzy Hash: 29e3b6562fc4174c8fa929cc52f202f8922dfcff4c03af7b0ac6812b9ede15f4
                                                                      • Instruction Fuzzy Hash: 1CD1F235900A069BCB249F68C879BFABFB1FF05702F25095BED019B690D3359D88CB59
                                                                      APIs
                                                                        • Part of subcall function 00540242: EnterCriticalSection.KERNEL32(005F070C,005F1884,?,?,0053198B,005F2518,?,?,?,005212F9,00000000), ref: 0054024D
                                                                        • Part of subcall function 00540242: LeaveCriticalSection.KERNEL32(005F070C,?,0053198B,005F2518,?,?,?,005212F9,00000000), ref: 0054028A
                                                                        • Part of subcall function 005400A3: __onexit.LIBCMT ref: 005400A9
                                                                      • __Init_thread_footer.LIBCMT ref: 005A6238
                                                                        • Part of subcall function 005401F8: EnterCriticalSection.KERNEL32(005F070C,?,?,00538747,005F2514), ref: 00540202
                                                                        • Part of subcall function 005401F8: LeaveCriticalSection.KERNEL32(005F070C,?,00538747,005F2514), ref: 00540235
                                                                        • Part of subcall function 0059359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005935E4
                                                                        • Part of subcall function 0059359C: LoadStringW.USER32(005F2390,?,00000FFF,?), ref: 0059360A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                      • String ID: x#_$x#_$x#_
                                                                      • API String ID: 1072379062-2414400457
                                                                      • Opcode ID: a95d84909f73f176906d081db387acc854b0b62e6d61af88632f906656ba5921
                                                                      • Instruction ID: 028cbd30f5e2c77cf5346aade1e02ac02d0cea0926d57165afb95cc39eb22dad
                                                                      • Opcode Fuzzy Hash: a95d84909f73f176906d081db387acc854b0b62e6d61af88632f906656ba5921
                                                                      • Instruction Fuzzy Hash: BAC17E71A0010AAFDB14DF58C895EBEBBB9FF49300F148469F915AB291DB70ED45CB90
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00558B6E
                                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00558B7A
                                                                      • __dosmaperr.LIBCMT ref: 00558B81
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                      • String ID: .T
                                                                      • API String ID: 2434981716-3315649315
                                                                      • Opcode ID: a6c820e536357aee38b6f87eca5d64f98a0bcf8e348fa7260941365041440e0a
                                                                      • Instruction ID: 7475f496775c9e825a4e31826cf9631a7de26a31489083b8ffa0cf5ecad58009
                                                                      • Opcode Fuzzy Hash: a6c820e536357aee38b6f87eca5d64f98a0bcf8e348fa7260941365041440e0a
                                                                      • Instruction Fuzzy Hash: 3A418EB0604045AFDB249F28CCA0A797FA9FB85325F2C459BFC85A7652DE31CC0AD750
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe,00000104), ref: 00551769
                                                                      • _free.LIBCMT ref: 00551834
                                                                      • _free.LIBCMT ref: 0055183E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free$FileModuleName
                                                                      • String ID: C:\Users\user\Desktop\Statement_3029_from_Cross_Traders_and_Logistics_ltd.exe
                                                                      • API String ID: 2506810119-1727351614
                                                                      • Opcode ID: 40aafb9cb7c3c9bcebb2a8fe241dfef4165cfec34038c380dd3192f10f5ed46e
                                                                      • Instruction ID: 3043bd8cac982817de41c42e8f505c6531a17bc5a86ab23c1516f4bdc699473f
                                                                      • Opcode Fuzzy Hash: 40aafb9cb7c3c9bcebb2a8fe241dfef4165cfec34038c380dd3192f10f5ed46e
                                                                      • Instruction Fuzzy Hash: E4319F75A00618EBCB21DB999C95EAEBFFCFB99311B104167F804D7211D6B08E48DB98
                                                                      APIs
                                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0058C306
                                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 0058C34C
                                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005F1990,011B5638), ref: 0058C395
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Delete$InfoItem
                                                                      • String ID: 0
                                                                      • API String ID: 135850232-4108050209
                                                                      • Opcode ID: 310b289d9dfd567eac1b85a612b50e4953bcf28dbca4905d98a0d8ad5111a9e3
                                                                      • Instruction ID: a7b27b68d9d91a6a7d6c544f1102605770e27377bd0e09095c4e1ece059627a6
                                                                      • Opcode Fuzzy Hash: 310b289d9dfd567eac1b85a612b50e4953bcf28dbca4905d98a0d8ad5111a9e3
                                                                      • Instruction Fuzzy Hash: 0A418F312043029FD720EF25D845B5ABFE8BF85310F148A1DFDA5A72D1DB30A905CB62
                                                                      APIs
                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,005BCC08,00000000,?,?,?,?), ref: 005B44AA
                                                                      • GetWindowLongW.USER32 ref: 005B44C7
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005B44D7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long
                                                                      • String ID: SysTreeView32
                                                                      • API String ID: 847901565-1698111956
                                                                      • Opcode ID: d5d14f95c47c194657df6d01027c1ca4b13ac5cf37bc5b3820255df8c92b054a
                                                                      • Instruction ID: 74573e9a9a7cb5b115c41c603f827b2c120d60eb7b115f6dd479b26181aa1372
                                                                      • Opcode Fuzzy Hash: d5d14f95c47c194657df6d01027c1ca4b13ac5cf37bc5b3820255df8c92b054a
                                                                      • Instruction Fuzzy Hash: 33317A71210606AFDF208E38DC49BEA7FA9FB49324F204725F975921E1D770AC619B60
                                                                      APIs
                                                                      • SysReAllocString.OLEAUT32(?,?), ref: 00586EED
                                                                      • VariantCopyInd.OLEAUT32(?,?), ref: 00586F08
                                                                      • VariantClear.OLEAUT32(?), ref: 00586F12
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$AllocClearCopyString
                                                                      • String ID: *jX
                                                                      • API String ID: 2173805711-809058511
                                                                      • Opcode ID: 2b38ec2c5e8f458df7ae7c3ea1b86c9d4a0966f9425bc34001fcec0260b89cc6
                                                                      • Instruction ID: 99972bd93cc172b1ad5aca2db5d99937f208944fba8ae47b5ba89bf7f068b758
                                                                      • Opcode Fuzzy Hash: 2b38ec2c5e8f458df7ae7c3ea1b86c9d4a0966f9425bc34001fcec0260b89cc6
                                                                      • Instruction Fuzzy Hash: DF31B371604256DFDB05BF64E8569BE7F75FF89300B1008A8FE025B2A1C730D951DBA4
                                                                      APIs
                                                                        • Part of subcall function 005A335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,005A3077,?,?), ref: 005A3378
                                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 005A307A
                                                                      • _wcslen.LIBCMT ref: 005A309B
                                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 005A3106
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                      • String ID: 255.255.255.255
                                                                      • API String ID: 946324512-2422070025
                                                                      • Opcode ID: b6fd134728f32749b88d46a98537ef8a67cc89ea23c42e50777aa4aa3f1b8a1a
                                                                      • Instruction ID: d4e8735db7c085390d51cfde0142a94496dbb609c3c74f87436e718a0d5b4247
                                                                      • Opcode Fuzzy Hash: b6fd134728f32749b88d46a98537ef8a67cc89ea23c42e50777aa4aa3f1b8a1a
                                                                      • Instruction Fuzzy Hash: 72318F396042059FCB10CF68C58AAAE7FE0FF56318F248559F9158B3A2DB72EE45C760
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 005B4705
                                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 005B4713
                                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 005B471A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$DestroyWindow
                                                                      • String ID: msctls_updown32
                                                                      • API String ID: 4014797782-2298589950
                                                                      • Opcode ID: 5d38a2fafd6450b2e12b86a9401480a9b255a4d3e3f676fe148f19564aab2da3
                                                                      • Instruction ID: 85978dd5f08c2afb0a180bb0317e9abb773f97ca0223def0ff77db838fb0ae47
                                                                      • Opcode Fuzzy Hash: 5d38a2fafd6450b2e12b86a9401480a9b255a4d3e3f676fe148f19564aab2da3
                                                                      • Instruction Fuzzy Hash: 5A215EB5600209AFDB10DF68DC85DB73BADFF9A3A4B140059FA019B291CB71FC12DA60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                      • API String ID: 176396367-2734436370
                                                                      • Opcode ID: ae9f6023d8c8954f80ee732a4b2a023e5478aad7ab2dea08ab6f7a23dc89c41e
                                                                      • Instruction ID: e8a5d9d0d80daecf73e600237c7b1126abec24a5dcbf5a2438f7dbcf29b129dd
                                                                      • Opcode Fuzzy Hash: ae9f6023d8c8954f80ee732a4b2a023e5478aad7ab2dea08ab6f7a23dc89c41e
                                                                      • Instruction Fuzzy Hash: B3212332204622A6C331BA259C06FBB7F98BF96304F184426FD49A7081EB51AD51C395
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 005B3840
                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 005B3850
                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 005B3876
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MoveWindow
                                                                      • String ID: Listbox
                                                                      • API String ID: 3315199576-2633736733
                                                                      • Opcode ID: ec9bdb8f83e6cd98825b9ae28238a5d75a364b8f2e98ec269ad762d7cf3413ab
                                                                      • Instruction ID: 2efaf42bd55e61df675239373040aae3f94044fb50de5ec31778a14abb19542a
                                                                      • Opcode Fuzzy Hash: ec9bdb8f83e6cd98825b9ae28238a5d75a364b8f2e98ec269ad762d7cf3413ab
                                                                      • Instruction Fuzzy Hash: 9821BE72610218BBEB218F64DC85EFB3B6EFF99750F108124F900AB190CA71ED5287A0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00582258
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0058228A
                                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005822CA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$_wcslen
                                                                      • String ID: @U=u
                                                                      • API String ID: 763830540-2594219639
                                                                      • Opcode ID: c9a625bdc0e9ec567350cf1733a44677cd0ab97e18b40992c1c522cddf70b03b
                                                                      • Instruction ID: 5a60776d5a1a09ffa087663f401fc3dd7dbfe97081b0d94ab429214405f82ce4
                                                                      • Opcode Fuzzy Hash: c9a625bdc0e9ec567350cf1733a44677cd0ab97e18b40992c1c522cddf70b03b
                                                                      • Instruction Fuzzy Hash: D621C531700205ABDB20AA549D49EEE3FA9FF99710F044424FE06EB181DBB49945D7A2
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00594A08
                                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00594A5C
                                                                      • SetErrorMode.KERNEL32(00000000,?,?,005BCC08), ref: 00594AD0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$InformationVolume
                                                                      • String ID: %lu
                                                                      • API String ID: 2507767853-685833217
                                                                      • Opcode ID: 031086dc0b099d896534f5fc51502325ac5c95506e226ee122cdd984ee41b761
                                                                      • Instruction ID: f25530382a525a6354efa320b75154fb76d8581eee4e3af7a2772cd463596d0b
                                                                      • Opcode Fuzzy Hash: 031086dc0b099d896534f5fc51502325ac5c95506e226ee122cdd984ee41b761
                                                                      • Instruction Fuzzy Hash: 1C314D75A00109AFDB10DF54C885EAABBF9FF49308F1440A5E905EB352D771ED46CB61
                                                                      APIs
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00581B4F
                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00581B61
                                                                      • SendMessageW.USER32(?,0000000D,?,00000000), ref: 00581B99
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 8972c19db28c145a6da13dfed6a3fe07dfdb9f5d556b01efda23289c3e0d50b0
                                                                      • Instruction ID: 16bdaef7ffd4aeca92ce90ca341b00a509e600dbc90a4b7d13cdb5aea697e83b
                                                                      • Opcode Fuzzy Hash: 8972c19db28c145a6da13dfed6a3fe07dfdb9f5d556b01efda23289c3e0d50b0
                                                                      • Instruction Fuzzy Hash: 7921D532600519BFDF11EB98C841DAEBBFDFF44340F10046AE505E7290DA71AE419B98
                                                                      APIs
                                                                      • SendMessageW.USER32(00000402,00000000,00000000), ref: 005A0D24
                                                                      • SendMessageW.USER32(0000000C,00000000,?), ref: 005A0D65
                                                                      • SendMessageW.USER32(0000000C,00000000,?), ref: 005A0D8D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: e6789139b4e3af337c5d82a2130a27af73b6bb523637b3a9407475439d343e3b
                                                                      • Instruction ID: 7e09ce4c4e5eb49f3f5608b7a2793003d7d6908b2028fd632525ccc62fbc2c98
                                                                      • Opcode Fuzzy Hash: e6789139b4e3af337c5d82a2130a27af73b6bb523637b3a9407475439d343e3b
                                                                      • Instruction Fuzzy Hash: 15215836300911EFD700EB68E985D2ABBE6FF5A310B008914F809DBAB1D760FC10DB94
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 005B424F
                                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 005B4264
                                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 005B4271
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: msctls_trackbar32
                                                                      • API String ID: 3850602802-1010561917
                                                                      • Opcode ID: 4fab09b95316d38486fadf12ef5318be25da1edd7263f0cbdc0498021ce5c810
                                                                      • Instruction ID: a7f201112d67f3b434a955df2e8cb81cfa1b3c50795e315bf864751d56a7ce85
                                                                      • Opcode Fuzzy Hash: 4fab09b95316d38486fadf12ef5318be25da1edd7263f0cbdc0498021ce5c810
                                                                      • Instruction Fuzzy Hash: DC11C131240248BEEF205E29CC06FFB7BACFF95B54F010514FA55E6091D271E811EB50
                                                                      APIs
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                        • Part of subcall function 00582DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00582DC5
                                                                        • Part of subcall function 00582DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00582DD6
                                                                        • Part of subcall function 00582DA7: GetCurrentThreadId.KERNEL32 ref: 00582DDD
                                                                        • Part of subcall function 00582DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00582DE4
                                                                      • GetFocus.USER32 ref: 00582F78
                                                                        • Part of subcall function 00582DEE: GetParent.USER32(00000000), ref: 00582DF9
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00582FC3
                                                                      • EnumChildWindows.USER32(?,0058303B), ref: 00582FEB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                      • String ID: %s%d
                                                                      • API String ID: 1272988791-1110647743
                                                                      • Opcode ID: 38b5382421b70536994c7d58549e0e30fa8c34906494f435b4ab3e5c82207ca3
                                                                      • Instruction ID: 51d6f969ad89f55520775923976c3914fd6f345639f462526e0070ba9284aab0
                                                                      • Opcode Fuzzy Hash: 38b5382421b70536994c7d58549e0e30fa8c34906494f435b4ab3e5c82207ca3
                                                                      • Instruction Fuzzy Hash: C5119075600206ABCF55BF649C99EED3F6ABFD4304F044075BD09AB192DE30A94A9B70
                                                                      APIs
                                                                      • GetWindowTextLengthW.USER32(00000000), ref: 005B34AB
                                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005B34BA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LengthMessageSendTextWindow
                                                                      • String ID: @U=u$edit
                                                                      • API String ID: 2978978980-590756393
                                                                      • Opcode ID: 88914cc8d160de719ee3b1181f90c3e8281cb1d9b6062318618ba461749fc229
                                                                      • Instruction ID: ce79d942d23a15f59e0565ac3bf8c79f544617b29de5836f3a2eea194695a2ff
                                                                      • Opcode Fuzzy Hash: 88914cc8d160de719ee3b1181f90c3e8281cb1d9b6062318618ba461749fc229
                                                                      • Instruction Fuzzy Hash: 44115871100208AAEF228E689C48AEA3F6AFB55374F504724F961A71E0C671EC55AB64
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                        • Part of subcall function 00583CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00583CCA
                                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00581C46
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                      • String ID: @U=u$ComboBox$ListBox
                                                                      • API String ID: 624084870-2258501812
                                                                      • Opcode ID: 8e4acb010ac2a82de608e8b24fc2441d4cadca574510a0cd8f11c0e4ac93a62c
                                                                      • Instruction ID: ab23cf887edc7a717ce43e6570cd360883d267ae3189e47a39cefab7a4f41357
                                                                      • Opcode Fuzzy Hash: 8e4acb010ac2a82de608e8b24fc2441d4cadca574510a0cd8f11c0e4ac93a62c
                                                                      • Instruction Fuzzy Hash: 2301A775B8111967CB08FB90D959DFF7FACBF56340F140029AC06772C1EA209E0987B5
                                                                      APIs
                                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005B58C1
                                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005B58EE
                                                                      • DrawMenuBar.USER32(?), ref: 005B58FD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$InfoItem$Draw
                                                                      • String ID: 0
                                                                      • API String ID: 3227129158-4108050209
                                                                      • Opcode ID: 43a2e42aac345d96b1c59639e0950e0178a8ddd7a799c57c168613f89453eb21
                                                                      • Instruction ID: ec1c1ae0ea4500a18599864f896d0f320bfe3fbc85b525d464186219644615c6
                                                                      • Opcode Fuzzy Hash: 43a2e42aac345d96b1c59639e0950e0178a8ddd7a799c57c168613f89453eb21
                                                                      • Instruction Fuzzy Hash: 24016131500219EFDB619F11DC44BEEBFB8FB45360F148499F849D6151EB30AA84EF21
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(?,005F18B0,005BA364,000000FC,?,00000000,00000000,?,?,?,005776CF,?,?,?,?,?), ref: 005B7805
                                                                      • GetFocus.USER32 ref: 005B780D
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                        • Part of subcall function 00539944: GetWindowLongW.USER32(?,000000EB), ref: 00539952
                                                                      • SendMessageW.USER32(011BD970,000000B0,000001BC,000001C0), ref: 005B787A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$FocusForegroundMessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3601265619-2594219639
                                                                      • Opcode ID: 4b0ce425f2218f70067275217d6f91af63ad0e2d9b709d2c2a6ccced53c40e2e
                                                                      • Instruction ID: 6ecea363432fe8ab2b4b6b0003e09ca83a792ea81437b351afc7f7968fc5d3f4
                                                                      • Opcode Fuzzy Hash: 4b0ce425f2218f70067275217d6f91af63ad0e2d9b709d2c2a6ccced53c40e2e
                                                                      • Instruction Fuzzy Hash: 59012C31605510CFD725DB28D958AB63BE6BFDA320F18026DE5158B2A1DB717C0ACB94
                                                                      APIs
                                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0057D3BF
                                                                      • FreeLibrary.KERNEL32 ref: 0057D3E5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeLibraryProc
                                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                                      • API String ID: 3013587201-2590602151
                                                                      • Opcode ID: c233b043cf56a252d9ffcb20d758d1c6061a71c2cae1ee89389d682a33b2d647
                                                                      • Instruction ID: 7d1fde2588675a6c958237cdb0a849e23bdb94e1c45e4296cf814136b2b33c4f
                                                                      • Opcode Fuzzy Hash: c233b043cf56a252d9ffcb20d758d1c6061a71c2cae1ee89389d682a33b2d647
                                                                      • Instruction Fuzzy Hash: 3BF05525801A248BC7B102106C58AA93F74BF10B01FA5CE15F80EF5146EB64DC46B2BA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d7277baca274e27b7904d62a4ce1f1f8a823a4bdb480cdc483fa11da05dff266
                                                                      • Instruction ID: e15fc1e4d22cf6e15a14a26df9ff24fd4a4ddce3c9a1e3e2c59b65ccb9351d8d
                                                                      • Opcode Fuzzy Hash: d7277baca274e27b7904d62a4ce1f1f8a823a4bdb480cdc483fa11da05dff266
                                                                      • Instruction Fuzzy Hash: 69C18075A00206EFDB54DF94C888EAEBBB5FF48314F209598E805EB291D770ED45DB50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                                      • String ID:
                                                                      • API String ID: 1998397398-0
                                                                      • Opcode ID: 614dab8562c9ee4cb9e4a1957bef53d06ebd2d09b5b93953bb576ccfb678441e
                                                                      • Instruction ID: 9da74b9bf2387f3d81726c8dbcf60beeec3803b0226a1e6f3b825d212fa8b29b
                                                                      • Opcode Fuzzy Hash: 614dab8562c9ee4cb9e4a1957bef53d06ebd2d09b5b93953bb576ccfb678441e
                                                                      • Instruction Fuzzy Hash: FCA13B756042119FC700DF28D589A2EBBE5FF8E714F048859F98A9B3A2DB30EE05CB51
                                                                      APIs
                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,005BFC08,?), ref: 005805F0
                                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,005BFC08,?), ref: 00580608
                                                                      • CLSIDFromProgID.OLE32(?,?,00000000,005BCC40,000000FF,?,00000000,00000800,00000000,?,005BFC08,?), ref: 0058062D
                                                                      • _memcmp.LIBVCRUNTIME ref: 0058064E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FromProg$FreeTask_memcmp
                                                                      • String ID:
                                                                      • API String ID: 314563124-0
                                                                      • Opcode ID: 168297fce97d42b34c13a6c9affc818f824d923026fcd3460e3cb0b64b7b068d
                                                                      • Instruction ID: c84c84d10f55c45eefc8ed08fbe7349719af32ed95d721fb4557b7baa718c264
                                                                      • Opcode Fuzzy Hash: 168297fce97d42b34c13a6c9affc818f824d923026fcd3460e3cb0b64b7b068d
                                                                      • Instruction Fuzzy Hash: C981FC71A00109EFCB44DF94C984DEEBBB9FF89315F104558E516BB290DB71AE0ACB60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 0c7c67feb0d4d30f5a76d939cd1f824628f43558c08a78a1c964fff46a274910
                                                                      • Instruction ID: 842835827242d800170ae844a9cd57cc4fe89e35031ae02c224668c7c79abec0
                                                                      • Opcode Fuzzy Hash: 0c7c67feb0d4d30f5a76d939cd1f824628f43558c08a78a1c964fff46a274910
                                                                      • Instruction Fuzzy Hash: 1A414B35A00912ABDF216BFC8C4A6BE3EA4FF81371F1C4626F819D7292EE7488415765
                                                                      APIs
                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 005A1AFD
                                                                      • WSAGetLastError.WSOCK32 ref: 005A1B0B
                                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 005A1B8A
                                                                      • WSAGetLastError.WSOCK32 ref: 005A1B94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$socket
                                                                      • String ID:
                                                                      • API String ID: 1881357543-0
                                                                      • Opcode ID: ebf4d95c9768b2224ecc0734a19c4ac0189935de6598e7dab447a2660d7bd10b
                                                                      • Instruction ID: 1bb176938f51b1275e457555cf1c1f9f4ff36793959ecc0d48439ff1ed6fcddb
                                                                      • Opcode Fuzzy Hash: ebf4d95c9768b2224ecc0734a19c4ac0189935de6598e7dab447a2660d7bd10b
                                                                      • Instruction Fuzzy Hash: 9E41B434600611AFE720AF24D88AF297BE5BF89718F548448F51A9F7D3D772ED418BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8aedc1fb6267103ee4a2b0cf39aa3224d4a781b1e2efc7cff03198c528e1fe11
                                                                      • Instruction ID: 9db650caca72d0cdaf99e4e3813a33cff9ba9315d2a53d256fde26a8ac868e92
                                                                      • Opcode Fuzzy Hash: 8aedc1fb6267103ee4a2b0cf39aa3224d4a781b1e2efc7cff03198c528e1fe11
                                                                      • Instruction Fuzzy Hash: ED410775A00704AFE7249F78CC59BAA7FAAFBC8711F10452BF901DB281E77199058780
                                                                      APIs
                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00595783
                                                                      • GetLastError.KERNEL32(?,00000000), ref: 005957A9
                                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 005957CE
                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 005957FA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 3321077145-0
                                                                      • Opcode ID: b9baac6a3ba3d4eb0dc934191f4e72b725402c91d0798119a4240c97db25431f
                                                                      • Instruction ID: 5f14a3cbc2852f20eca892a7d25bdc3e008f203e343622aee919c954481680fa
                                                                      • Opcode Fuzzy Hash: b9baac6a3ba3d4eb0dc934191f4e72b725402c91d0798119a4240c97db25431f
                                                                      • Instruction Fuzzy Hash: AF411C39600611DFCB11EF55D548A1EBFE1FF89320B188488E84A6B3A2DB30FD00CB91
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00546D71,00000000,00000000,005482D9,?,005482D9,?,00000001,00546D71,?,00000001,005482D9,005482D9), ref: 0055D910
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0055D999
                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0055D9AB
                                                                      • __freea.LIBCMT ref: 0055D9B4
                                                                        • Part of subcall function 00553820: RtlAllocateHeap.NTDLL(00000000,?,005F1444,?,0053FDF5,?,?,0052A976,00000010,005F1440,005213FC,?,005213C6,?,00521129), ref: 00553852
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                      • String ID:
                                                                      • API String ID: 2652629310-0
                                                                      • Opcode ID: 0308b67b35c096d27d8ba1cce6a7f5bf52c648071c79f1977c7daaacaf1bb45e
                                                                      • Instruction ID: f26527fd1a588a6769a88cd88403c89d82fbe441c389b8c10b8baf62d6d1515a
                                                                      • Opcode Fuzzy Hash: 0308b67b35c096d27d8ba1cce6a7f5bf52c648071c79f1977c7daaacaf1bb45e
                                                                      • Instruction Fuzzy Hash: DF31BC72A0020AABDB24DF64DC95EAE7FB5FB41351B05026AFC04A6251EB35DD58CBA0
                                                                      APIs
                                                                      • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 0058ABF1
                                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 0058AC0D
                                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 0058AC74
                                                                      • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 0058ACC6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                      • String ID:
                                                                      • API String ID: 432972143-0
                                                                      • Opcode ID: f46ba1a21ced70dfa44a91e48f51e295efb3dcd51fd1478e59d9951bc326cf5c
                                                                      • Instruction ID: 470d18eda989b9db7ccfc0e3223e1844d0a8f85374503d997c6741129e971b54
                                                                      • Opcode Fuzzy Hash: f46ba1a21ced70dfa44a91e48f51e295efb3dcd51fd1478e59d9951bc326cf5c
                                                                      • Instruction Fuzzy Hash: 63311470A00618AFFF35AB698809BFA7FA5BB89310F08471BF881B61D0C3759D859752
                                                                      APIs
                                                                      • ClientToScreen.USER32(?,?), ref: 005B769A
                                                                      • GetWindowRect.USER32(?,?), ref: 005B7710
                                                                      • PtInRect.USER32(?,?,005B8B89), ref: 005B7720
                                                                      • MessageBeep.USER32(00000000), ref: 005B778C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                      • String ID:
                                                                      • API String ID: 1352109105-0
                                                                      • Opcode ID: 31d36dfc95ae0c86085fef0b5ebcacf70908744fdace559e1df080857c4b3a48
                                                                      • Instruction ID: 5fd5f3eb6f63385a4966ee72d9b45d07d483d42796a88ecfdba7ea1087ac76e7
                                                                      • Opcode Fuzzy Hash: 31d36dfc95ae0c86085fef0b5ebcacf70908744fdace559e1df080857c4b3a48
                                                                      • Instruction Fuzzy Hash: 34418734A09219EFCB11CF58C894EE9BBF4FB98300F1941A8E815DB261CB70B946DB90
                                                                      APIs
                                                                      • GetForegroundWindow.USER32 ref: 005B16EB
                                                                        • Part of subcall function 00583A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00583A57
                                                                        • Part of subcall function 00583A3D: GetCurrentThreadId.KERNEL32 ref: 00583A5E
                                                                        • Part of subcall function 00583A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005825B3), ref: 00583A65
                                                                      • GetCaretPos.USER32(?), ref: 005B16FF
                                                                      • ClientToScreen.USER32(00000000,?), ref: 005B174C
                                                                      • GetForegroundWindow.USER32 ref: 005B1752
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                      • String ID:
                                                                      • API String ID: 2759813231-0
                                                                      • Opcode ID: ff5cbc3bdcda0fa86abbe1d8eeb84543a67a58835900633c50bfad29b036f802
                                                                      • Instruction ID: ebdf57608f9a03d11fe48db87f89cea7eda7fa886c570599d32f01c18ff3a543
                                                                      • Opcode Fuzzy Hash: ff5cbc3bdcda0fa86abbe1d8eeb84543a67a58835900633c50bfad29b036f802
                                                                      • Instruction Fuzzy Hash: 8C315071D00159AFCB00EFA5D885CAEBBF9FF89304B504069E415E7251DA31AE45CBA0
                                                                      APIs
                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0058D501
                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0058D50F
                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0058D52F
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0058D5DC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                      • String ID:
                                                                      • API String ID: 420147892-0
                                                                      • Opcode ID: ae862899818306372fda17607e8ac9143af8c47d2cce45b0d8fcfaa3f720edfc
                                                                      • Instruction ID: 07342de9e84458bec6e20c4bcd814e19ccd2caa847fcf0d57b5d859a98a22342
                                                                      • Opcode Fuzzy Hash: ae862899818306372fda17607e8ac9143af8c47d2cce45b0d8fcfaa3f720edfc
                                                                      • Instruction Fuzzy Hash: 07316D711082019FD301EF54D885AAABFF8BFDA354F14092DF581961E1EB71A948CBA2
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • GetCursorPos.USER32(?), ref: 005B9001
                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00577711,?,?,?,?,?), ref: 005B9016
                                                                      • GetCursorPos.USER32(?), ref: 005B905E
                                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00577711,?,?,?), ref: 005B9094
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                      • String ID:
                                                                      • API String ID: 2864067406-0
                                                                      • Opcode ID: 8912b9829978bdeeb6effdcd7a2c7c4ee46c3b6ed03f6e744085bbcde17f7169
                                                                      • Instruction ID: bf334b42a4958d5d532667669d7f174deb9f371802c0cb91b4c6d0eb770f51a0
                                                                      • Opcode Fuzzy Hash: 8912b9829978bdeeb6effdcd7a2c7c4ee46c3b6ed03f6e744085bbcde17f7169
                                                                      • Instruction Fuzzy Hash: 06219F35600018EFCB259F94C898EFA7FB9FB8A350F144155FA058B2A1C375A950EB60
                                                                      APIs
                                                                      • GetFileAttributesW.KERNEL32(?,005BCB68), ref: 0058D2FB
                                                                      • GetLastError.KERNEL32 ref: 0058D30A
                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0058D319
                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,005BCB68), ref: 0058D376
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 2267087916-0
                                                                      • Opcode ID: 69cc2ea6c869c30918328498896cdb11f46a1e8289e89329c4dd89878e3b9613
                                                                      • Instruction ID: 6051af092c556d9854742542dbbf1017005d9a15e92af127aa98045a879f996f
                                                                      • Opcode Fuzzy Hash: 69cc2ea6c869c30918328498896cdb11f46a1e8289e89329c4dd89878e3b9613
                                                                      • Instruction Fuzzy Hash: 01217E745042029F8700EF28D8854AABFE4BE9A324F504E19F899D72E1DB309949CBA3
                                                                      APIs
                                                                        • Part of subcall function 00581014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0058102A
                                                                        • Part of subcall function 00581014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00581036
                                                                        • Part of subcall function 00581014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00581045
                                                                        • Part of subcall function 00581014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0058104C
                                                                        • Part of subcall function 00581014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00581062
                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005815BE
                                                                      • _memcmp.LIBVCRUNTIME ref: 005815E1
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00581617
                                                                      • HeapFree.KERNEL32(00000000), ref: 0058161E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                      • String ID:
                                                                      • API String ID: 1592001646-0
                                                                      • Opcode ID: 076b1eba76998cbd55829fb83bc9f46ea7c14b697ae485cb31c0b73a2f6f3339
                                                                      • Instruction ID: bc689f087440cba1358579d4e96600f147953f2d9d2c4fbc8a5b512fcbd3a4e8
                                                                      • Opcode Fuzzy Hash: 076b1eba76998cbd55829fb83bc9f46ea7c14b697ae485cb31c0b73a2f6f3339
                                                                      • Instruction Fuzzy Hash: 52215A71E00509AFDF10EFA5C949BEEBBB8FF84344F084459E841BB241E730AA06DB64
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 005B280A
                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005B2824
                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005B2832
                                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 005B2840
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$AttributesLayered
                                                                      • String ID:
                                                                      • API String ID: 2169480361-0
                                                                      • Opcode ID: b04bd9c357d8c4d73d6b8ce16f923419c3d38c4004c4e78595a00bd20738f520
                                                                      • Instruction ID: e21558e735d3bcc97bfb2e9fbed19d3c85c59e43aa18e9cbddb9e5b6e6f85844
                                                                      • Opcode Fuzzy Hash: b04bd9c357d8c4d73d6b8ce16f923419c3d38c4004c4e78595a00bd20738f520
                                                                      • Instruction Fuzzy Hash: 3421A131204611AFD7149B24C845FAA7F99FF85324F148258F4268B6E2CB71FC42CBE4
                                                                      APIs
                                                                        • Part of subcall function 00588D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0058790A,?,000000FF,?,00588754,00000000,?,0000001C,?,?), ref: 00588D8C
                                                                        • Part of subcall function 00588D7D: lstrcpyW.KERNEL32(00000000,?,?,0058790A,?,000000FF,?,00588754,00000000,?,0000001C,?,?,00000000), ref: 00588DB2
                                                                        • Part of subcall function 00588D7D: lstrcmpiW.KERNEL32(00000000,?,0058790A,?,000000FF,?,00588754,00000000,?,0000001C,?,?), ref: 00588DE3
                                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00588754,00000000,?,0000001C,?,?,00000000), ref: 00587923
                                                                      • lstrcpyW.KERNEL32(00000000,?,?,00588754,00000000,?,0000001C,?,?,00000000), ref: 00587949
                                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00588754,00000000,?,0000001C,?,?,00000000), ref: 00587984
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmpilstrcpylstrlen
                                                                      • String ID: cdecl
                                                                      • API String ID: 4031866154-3896280584
                                                                      • Opcode ID: 48cc11cf670fd9f4d962673058bc02d9c62a2bb9b8a4f7316b23a2a76915a3f9
                                                                      • Instruction ID: b94bb042359ae1b5a094ce235567cbba2bd362be11a5fe3fec1ea4627e5627dc
                                                                      • Opcode Fuzzy Hash: 48cc11cf670fd9f4d962673058bc02d9c62a2bb9b8a4f7316b23a2a76915a3f9
                                                                      • Instruction Fuzzy Hash: C011293A200306ABCB15AF39C848D7A7BA9FF99390B50402AFC42DB264EF31D801D791
                                                                      APIs
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00581A47
                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00581A59
                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00581A6F
                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00581A8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: 130140a0510f1ddb25adc30f22dff8df5712c7c6cf0b6af43b3812ebad0ea197
                                                                      • Instruction ID: b19d8209b31d60ae6d1f527d556fdb29f188cd118d2614df905d58e164c695a6
                                                                      • Opcode Fuzzy Hash: 130140a0510f1ddb25adc30f22dff8df5712c7c6cf0b6af43b3812ebad0ea197
                                                                      • Instruction Fuzzy Hash: CF11393AD01219FFEB10EBA4CD85FADBB78FB08750F200091EA11B7290D6716E51DB98
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0058E1FD
                                                                      • MessageBoxW.USER32(?,?,?,?), ref: 0058E230
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0058E246
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0058E24D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                      • String ID:
                                                                      • API String ID: 2880819207-0
                                                                      • Opcode ID: ba80f16a2ca0ce1d1871058abba3593567a3975f8eb0ffea47436b0fe6b4c81d
                                                                      • Instruction ID: d3b42e438fb06b96eef11cf64634fcd15e76dd6b6c1101a02648ff236758ac94
                                                                      • Opcode Fuzzy Hash: ba80f16a2ca0ce1d1871058abba3593567a3975f8eb0ffea47436b0fe6b4c81d
                                                                      • Instruction Fuzzy Hash: C7110876904214BBC701AFA89C0AAAE7FBEAB55310F004725F816F3290D6B49908D7A4
                                                                      APIs
                                                                      • CreateThread.KERNEL32(00000000,?,0054CFF9,00000000,00000004,00000000), ref: 0054D218
                                                                      • GetLastError.KERNEL32 ref: 0054D224
                                                                      • __dosmaperr.LIBCMT ref: 0054D22B
                                                                      • ResumeThread.KERNEL32(00000000), ref: 0054D249
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                      • String ID:
                                                                      • API String ID: 173952441-0
                                                                      • Opcode ID: 000ae0307212258ca09213c1286c3369ad5b09fedc2d69e506940121202ab1a0
                                                                      • Instruction ID: d8496ad14d21c4e9e2362f662e95f36150928e5f761267834371805b07735394
                                                                      • Opcode Fuzzy Hash: 000ae0307212258ca09213c1286c3369ad5b09fedc2d69e506940121202ab1a0
                                                                      • Instruction Fuzzy Hash: F201C03A809215BBCB115BA9DC09AEA7EB9FFC1339F100219F925921D0DBB08905D7B0
                                                                      APIs
                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00543B56
                                                                        • Part of subcall function 00543AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00543AD2
                                                                        • Part of subcall function 00543AA3: ___AdjustPointer.LIBCMT ref: 00543AED
                                                                      • _UnwindNestedFrames.LIBCMT ref: 00543B6B
                                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00543B7C
                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00543BA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                      • String ID:
                                                                      • API String ID: 737400349-0
                                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                      • Instruction ID: 144a6efec006dc977908915cb384831e0df3a871bf6049d6420352e5f0614b88
                                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                      • Instruction Fuzzy Hash: 8401E932100149BBDF126E95CC4AEEB7F69FF98758F044114FE4896121C732E961DBA0
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,005213C6,00000000,00000000,?,0055301A,005213C6,00000000,00000000,00000000,?,0055328B,00000006,FlsSetValue), ref: 005530A5
                                                                      • GetLastError.KERNEL32(?,0055301A,005213C6,00000000,00000000,00000000,?,0055328B,00000006,FlsSetValue,005C2290,FlsSetValue,00000000,00000364,?,00552E46), ref: 005530B1
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0055301A,005213C6,00000000,00000000,00000000,?,0055328B,00000006,FlsSetValue,005C2290,FlsSetValue,00000000), ref: 005530BF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3177248105-0
                                                                      • Opcode ID: ad1bf4b7453b17e06f9db8837bcba93ef45b301b2525eee0228a3fbe381f5fff
                                                                      • Instruction ID: e5ea390ef52b07a91882f6ac11ae3067e0a6bb0893e80da2cc4cae45db6faacd
                                                                      • Opcode Fuzzy Hash: ad1bf4b7453b17e06f9db8837bcba93ef45b301b2525eee0228a3fbe381f5fff
                                                                      • Instruction Fuzzy Hash: 3301D436301722ABCB614A789C58967BF98BF55BE2B100B22FD09E71E0D721DD0DD6E0
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0058747F
                                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00587497
                                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 005874AC
                                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 005874CA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                                      • String ID:
                                                                      • API String ID: 1352324309-0
                                                                      • Opcode ID: 1b458f63056bca7a7658d6ad036bc5aae7622abb6d7d0108e27357f4ee20b15f
                                                                      • Instruction ID: 62158eb802d6041c249a4d24ad2be8e67ddeb9436dc3660173a6b240c76f4111
                                                                      • Opcode Fuzzy Hash: 1b458f63056bca7a7658d6ad036bc5aae7622abb6d7d0108e27357f4ee20b15f
                                                                      • Instruction Fuzzy Hash: AB11C4B12053189FEB209F54DC08F927FFCFB04B10F208569AA66E6161D770F908EB60
                                                                      APIs
                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0058ACD3,?,00008000), ref: 0058B0C4
                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0058ACD3,?,00008000), ref: 0058B0E9
                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0058ACD3,?,00008000), ref: 0058B0F3
                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0058ACD3,?,00008000), ref: 0058B126
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CounterPerformanceQuerySleep
                                                                      • String ID:
                                                                      • API String ID: 2875609808-0
                                                                      • Opcode ID: cd636a8ddde70ac58897f80c4d0fd0c98bc0b9868dab65ae63da1c39e79af204
                                                                      • Instruction ID: c8c858d5b26735f86971c0b9f9550e49f3ff11900707d86896db8b34f190d49f
                                                                      • Opcode Fuzzy Hash: cd636a8ddde70ac58897f80c4d0fd0c98bc0b9868dab65ae63da1c39e79af204
                                                                      • Instruction Fuzzy Hash: CF117930C00528E7EF04EFA8E99C6EEBF78FF59311F004586D981B6181CB306654DB55
                                                                      APIs
                                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00582DC5
                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00582DD6
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00582DDD
                                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00582DE4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                      • String ID:
                                                                      • API String ID: 2710830443-0
                                                                      • Opcode ID: 610e9d5bd1a8415c6ae9c10e92a864978c0bbe6b90b0792d0757c6482233f763
                                                                      • Instruction ID: a1b1eae75bc9a6820b0dde737c7432729bf4f077eea18ac5af7a848c73ea8a6a
                                                                      • Opcode Fuzzy Hash: 610e9d5bd1a8415c6ae9c10e92a864978c0bbe6b90b0792d0757c6482233f763
                                                                      • Instruction Fuzzy Hash: 17E092B25022247BD7602B769C0DFFB3F6CFF62BA1F000215F905E10809AA0D845D7B0
                                                                      APIs
                                                                        • Part of subcall function 00539639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00539693
                                                                        • Part of subcall function 00539639: SelectObject.GDI32(?,00000000), ref: 005396A2
                                                                        • Part of subcall function 00539639: BeginPath.GDI32(?), ref: 005396B9
                                                                        • Part of subcall function 00539639: SelectObject.GDI32(?,00000000), ref: 005396E2
                                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 005B8887
                                                                      • LineTo.GDI32(?,?,?), ref: 005B8894
                                                                      • EndPath.GDI32(?), ref: 005B88A4
                                                                      • StrokePath.GDI32(?), ref: 005B88B2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                      • String ID:
                                                                      • API String ID: 1539411459-0
                                                                      • Opcode ID: bf65a21970f94adeb192a469679c77a873eb5183740af14b2cfb4debeb6df119
                                                                      • Instruction ID: 019d2ca44cb0ce25c9f3cddfcea904e3572c484d54d6a4ff7b1d88d9a1a74301
                                                                      • Opcode Fuzzy Hash: bf65a21970f94adeb192a469679c77a873eb5183740af14b2cfb4debeb6df119
                                                                      • Instruction Fuzzy Hash: 9BF05E36041659FBDB126F94AC0EFDE3F59AF26310F048100FA11650E1C7B96515EFE9
                                                                      APIs
                                                                      • GetSysColor.USER32(00000008), ref: 005398CC
                                                                      • SetTextColor.GDI32(?,?), ref: 005398D6
                                                                      • SetBkMode.GDI32(?,00000001), ref: 005398E9
                                                                      • GetStockObject.GDI32(00000005), ref: 005398F1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Color$ModeObjectStockText
                                                                      • String ID:
                                                                      • API String ID: 4037423528-0
                                                                      • Opcode ID: 6e5124c13ffcdcdd9519c6832becdd6f7153cb1274dd66ff4ddb50f14ea51bf3
                                                                      • Instruction ID: 725bcd7eb6a4aea79264f85c1017a278e9001ba3cfcb805535b0583c98321d59
                                                                      • Opcode Fuzzy Hash: 6e5124c13ffcdcdd9519c6832becdd6f7153cb1274dd66ff4ddb50f14ea51bf3
                                                                      • Instruction Fuzzy Hash: B9E06D32244284AADB615B78BC09BE83F21BB26336F14C319F6FA680E1C3715644EB20
                                                                      APIs
                                                                      • GetCurrentThread.KERNEL32 ref: 00581634
                                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,005811D9), ref: 0058163B
                                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005811D9), ref: 00581648
                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,005811D9), ref: 0058164F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentOpenProcessThreadToken
                                                                      • String ID:
                                                                      • API String ID: 3974789173-0
                                                                      • Opcode ID: 07cb4b4ce0d961970178a18c136d2a2997902aec4e608d759b204404ca934286
                                                                      • Instruction ID: a96d2d985290ab13dac3ce03779af06bbe16ea99589f3d9874ea157b91aacbc9
                                                                      • Opcode Fuzzy Hash: 07cb4b4ce0d961970178a18c136d2a2997902aec4e608d759b204404ca934286
                                                                      • Instruction Fuzzy Hash: 7AE08631601211DBD7602FA19D0DB8A3F7CBF64791F184918F685D9080E6345449D768
                                                                      APIs
                                                                      • GetDesktopWindow.USER32 ref: 0057D858
                                                                      • GetDC.USER32(00000000), ref: 0057D862
                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0057D882
                                                                      • ReleaseDC.USER32(?), ref: 0057D8A3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                      • String ID:
                                                                      • API String ID: 2889604237-0
                                                                      • Opcode ID: c3ed26e31567f38d26f030438bb7094e5ca8833dac8e735c485d53b3d0de21e7
                                                                      • Instruction ID: f1cece627e1137ffc9dd21bc447471fbd1ecc79bad5080da5150b9f2770668e3
                                                                      • Opcode Fuzzy Hash: c3ed26e31567f38d26f030438bb7094e5ca8833dac8e735c485d53b3d0de21e7
                                                                      • Instruction Fuzzy Hash: 06E0E5B4800205DFCB81AFA8A90CA6DBFB1BB58310F108509E806A7250C7386905AF54
                                                                      APIs
                                                                      • GetDesktopWindow.USER32 ref: 0057D86C
                                                                      • GetDC.USER32(00000000), ref: 0057D876
                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0057D882
                                                                      • ReleaseDC.USER32(?), ref: 0057D8A3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                      • String ID:
                                                                      • API String ID: 2889604237-0
                                                                      • Opcode ID: 6b6083eac51c024476abebf490c959af5c9a83a1d7545aab6ebf752fe544bc69
                                                                      • Instruction ID: d4a553bf5db32505d08a5b7a894a3161a38df3ec06df7d7b6d95bf7b7980ca9f
                                                                      • Opcode Fuzzy Hash: 6b6083eac51c024476abebf490c959af5c9a83a1d7545aab6ebf752fe544bc69
                                                                      • Instruction Fuzzy Hash: FBE012B4C00204EFCB80AFA8E80CA6DBFB1BB58310F108508E80AE7350CB386909AF54
                                                                      APIs
                                                                        • Part of subcall function 00527620: _wcslen.LIBCMT ref: 00527625
                                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00594ED4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Connection_wcslen
                                                                      • String ID: *$LPT
                                                                      • API String ID: 1725874428-3443410124
                                                                      • Opcode ID: 0e01270faa238ade47e7ebd00b6da66d8f9d9b9fa85d465c5658602aa85a9f53
                                                                      • Instruction ID: e7f007e1b34ab0d47a999e6771b073b6305dfd6e9f13fc4f953be0c84551bb10
                                                                      • Opcode Fuzzy Hash: 0e01270faa238ade47e7ebd00b6da66d8f9d9b9fa85d465c5658602aa85a9f53
                                                                      • Instruction Fuzzy Hash: DE913A75A002559FCB14DF58C484EAABFB5BF49304F188099E80A9B7A2D731ED86CF91
                                                                      APIs
                                                                      • __startOneArgErrorHandling.LIBCMT ref: 0054E30D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorHandling__start
                                                                      • String ID: pow
                                                                      • API String ID: 3213639722-2276729525
                                                                      • Opcode ID: 41a82f6a45ccfe17bad25137d2180688b4e472ad21aae3bad3d4aa856d614592
                                                                      • Instruction ID: 15e620081deae9aa5e965fdaf6f6959bc1d9f9870143b325bde95126f8e7cc2d
                                                                      • Opcode Fuzzy Hash: 41a82f6a45ccfe17bad25137d2180688b4e472ad21aae3bad3d4aa856d614592
                                                                      • Instruction Fuzzy Hash: 1651C47190C60A96CB127B24ED277F93FA8FB54746F304D59E8D1432E9DB304C8D9645
                                                                      APIs
                                                                      • CharUpperBuffW.USER32(0057569E,00000000,?,005BCC08,?,00000000,00000000), ref: 005A78DD
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      • CharUpperBuffW.USER32(0057569E,00000000,?,005BCC08,00000000,?,00000000,00000000), ref: 005A783B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: BuffCharUpper$_wcslen
                                                                      • String ID: <s^
                                                                      • API String ID: 3544283678-1525781280
                                                                      • Opcode ID: 7c8868e7b5462cc5d88113b4edd0460cfc9b956fb12c5b64178debacdee6cb10
                                                                      • Instruction ID: 88cfcfca66ab7513ad47475624646857fe2dbf55692d3d2dc8afd3c821f63875
                                                                      • Opcode Fuzzy Hash: 7c8868e7b5462cc5d88113b4edd0460cfc9b956fb12c5b64178debacdee6cb10
                                                                      • Instruction Fuzzy Hash: 79615E3291412EABCF04EBA4DC95DFEBF78BF6A700F544526E542A3091EB345A45CBA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #
                                                                      • API String ID: 0-1885708031
                                                                      • Opcode ID: 4bf42be0511bd574e66aadc9766744e51fa677a5432df03a78b8e52011fac46b
                                                                      • Instruction ID: 154474c76fb8d1bf52efd4a826985ef1a659455035508c4d57acc315b7ad8aa5
                                                                      • Opcode Fuzzy Hash: 4bf42be0511bd574e66aadc9766744e51fa677a5432df03a78b8e52011fac46b
                                                                      • Instruction Fuzzy Hash: F2514339500386DFDB19DF68E086ABA7FA8FF5A310F248095F8959B2C0D7309D42DB90
                                                                      APIs
                                                                      • Sleep.KERNEL32(00000000), ref: 0053F2A2
                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0053F2BB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemorySleepStatus
                                                                      • String ID: @
                                                                      • API String ID: 2783356886-2766056989
                                                                      • Opcode ID: 2be13205d51a1ee20f3cd48184dfd5aaf8b74a0f9600fddd80f9d29686bd4202
                                                                      • Instruction ID: 9228831db9e5efbd82276a628bdd708e4b2251f70994de16d09f9179e041f780
                                                                      • Opcode Fuzzy Hash: 2be13205d51a1ee20f3cd48184dfd5aaf8b74a0f9600fddd80f9d29686bd4202
                                                                      • Instruction Fuzzy Hash: 795127714087499BD320AF50E88ABAFBBF8FFD9300F81885DF1D941195EB709529CB66
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 005829EB
                                                                      • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00582A8D
                                                                        • Part of subcall function 00582C75: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00582CE0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 09ef81d418e3227a6f21c915afb13010a5759dd75c9079d3649e74b2e98c1c3a
                                                                      • Instruction ID: 8d8ccb971adbade2895cc9c7d55371ce4b4b879bca9abdfff1362b78db50d275
                                                                      • Opcode Fuzzy Hash: 09ef81d418e3227a6f21c915afb13010a5759dd75c9079d3649e74b2e98c1c3a
                                                                      • Instruction Fuzzy Hash: 8B418031A00219ABDF25EF54C849BEE7FB5BF85710F040429FD06B3291DBB09A44CB92
                                                                      APIs
                                                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 005A57E0
                                                                      • _wcslen.LIBCMT ref: 005A57EC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: BuffCharUpper_wcslen
                                                                      • String ID: CALLARGARRAY
                                                                      • API String ID: 157775604-1150593374
                                                                      • Opcode ID: b26495da2b11b5910b07ac284c57371a1379a277ff793a4a9f3f0aff51392725
                                                                      • Instruction ID: 6065a33508039df996becd1df711bb9d0006f58798f194ec356a6846e10bd908
                                                                      • Opcode Fuzzy Hash: b26495da2b11b5910b07ac284c57371a1379a277ff793a4a9f3f0aff51392725
                                                                      • Instruction Fuzzy Hash: 9F418F31E0020A9FCB14DFA9C885DAEBFF5FF9A314F244069E505A7291E7349D81CBA0
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 0059D130
                                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0059D13A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CrackInternet_wcslen
                                                                      • String ID: |
                                                                      • API String ID: 596671847-2343686810
                                                                      • Opcode ID: c6e1474492a25c25eb089f117d993fe5a46d2b3d055cf45bc53106d0f5566b07
                                                                      • Instruction ID: 8c424b6503b2e890045bb87b9dff96a8161a0a638267a0ec9286642470217192
                                                                      • Opcode Fuzzy Hash: c6e1474492a25c25eb089f117d993fe5a46d2b3d055cf45bc53106d0f5566b07
                                                                      • Instruction Fuzzy Hash: 13313071D0111AABCF15EFA4DC89AEFBFB9FF45300F100019F815A6161D731A946DB60
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,?,?,?), ref: 005B3621
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 005B365C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$DestroyMove
                                                                      • String ID: static
                                                                      • API String ID: 2139405536-2160076837
                                                                      • Opcode ID: be653611c7019004b98b853d20189b2d4f0a7c37cdc8ec01d0d1daf7f2562c7f
                                                                      • Instruction ID: 0d90e2092b92e6278159e2ee684700da5233db9403619a4d61d58ccd94a9b8e1
                                                                      • Opcode Fuzzy Hash: be653611c7019004b98b853d20189b2d4f0a7c37cdc8ec01d0d1daf7f2562c7f
                                                                      • Instruction Fuzzy Hash: CD319E71110604AEDB24DF28DC84EFB7BA9FF98720F009619F8A5D7280DA30AD81D764
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 005B461F
                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005B4634
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: '
                                                                      • API String ID: 3850602802-1997036262
                                                                      • Opcode ID: ae5c4076304c7f56155dc3bf4d3f0521d5e3ff0ca87f884e36c63e3fff3f69a7
                                                                      • Instruction ID: 2f0be6ea90e1e15b68c283d8603530e92647ae4dcb75b0c70072123901a6e5e6
                                                                      • Opcode Fuzzy Hash: ae5c4076304c7f56155dc3bf4d3f0521d5e3ff0ca87f884e36c63e3fff3f69a7
                                                                      • Instruction Fuzzy Hash: 46313874A0061A9FDB24CFA9C980BEA7BB5FF49300F10406AE905EB382D770A941DF90
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00582884
                                                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 005828B6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 29028035c5531d42a341a617dca0533c8d57f4cba78c17b6073602dc738055be
                                                                      • Instruction ID: 216bfd126c48d421f114d6a8cd2547bbf85299e6fa62cc286b4cd9bb19a38475
                                                                      • Opcode Fuzzy Hash: 29028035c5531d42a341a617dca0533c8d57f4cba78c17b6073602dc738055be
                                                                      • Instruction Fuzzy Hash: E721D032E00215ABCB15AF949884DBEBFB9FFD9710F044129ED15B7290EA749D81CBA0
                                                                      APIs
                                                                        • Part of subcall function 0058ED19: GetLocalTime.KERNEL32 ref: 0058ED2A
                                                                        • Part of subcall function 0058ED19: _wcslen.LIBCMT ref: 0058ED3B
                                                                        • Part of subcall function 0058ED19: _wcslen.LIBCMT ref: 0058ED79
                                                                        • Part of subcall function 0058ED19: _wcslen.LIBCMT ref: 0058EDAF
                                                                        • Part of subcall function 0058ED19: _wcslen.LIBCMT ref: 0058EDDF
                                                                        • Part of subcall function 0058ED19: _wcslen.LIBCMT ref: 0058EDEF
                                                                        • Part of subcall function 0058ED19: _wcslen.LIBCMT ref: 0058EE2B
                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 005B340A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$LocalMessageSendTime
                                                                      • String ID: @U=u$SysDateTimePick32
                                                                      • API String ID: 2216836867-2530228043
                                                                      • Opcode ID: e1020c22b62e12a3b6c320d98aca46af873c89f1f78e7d1299534f8f1c336e29
                                                                      • Instruction ID: 3c016d1fce50c1e2c55f8e74b91c4f63a8576337d8fdee34fc974ba40fddfc74
                                                                      • Opcode Fuzzy Hash: e1020c22b62e12a3b6c320d98aca46af873c89f1f78e7d1299534f8f1c336e29
                                                                      • Instruction Fuzzy Hash: 0821D2312502096BEF219E54DC86FFF3BAAFB94754F100919F940BA1D0DAB1EC449760
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00582178
                                                                        • Part of subcall function 0058B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0058B355
                                                                        • Part of subcall function 0058B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00582194,00000034,?,?,00001004,00000000,00000000), ref: 0058B365
                                                                        • Part of subcall function 0058B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00582194,00000034,?,?,00001004,00000000,00000000), ref: 0058B37B
                                                                        • Part of subcall function 0058B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005821D0,?,?,00000034,00000800,?,00000034), ref: 0058B42D
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 005821DF
                                                                        • Part of subcall function 0058B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0058B3F8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                                                                      • String ID: @U=u
                                                                      • API String ID: 1045663743-2594219639
                                                                      • Opcode ID: a8ac477dcd33ddc34ca6a153df0ab302e6943fb05dd54149361c2ab60b529485
                                                                      • Instruction ID: 4caa86db4ddfe0a643830194a7bcc26aa76eb35a9ad7686e419797ec0d41515e
                                                                      • Opcode Fuzzy Hash: a8ac477dcd33ddc34ca6a153df0ab302e6943fb05dd54149361c2ab60b529485
                                                                      • Instruction Fuzzy Hash: 91215C31901129ABEF15AFA8DC85FDDBFB8FF58350F1001A5E949B7190EA705A44CF54
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 005B327C
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005B3287
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: Combobox
                                                                      • API String ID: 3850602802-2096851135
                                                                      • Opcode ID: e62ee4ed5d0ad3b5da12d19f82cc53b23a5276f87de78c6ed6132caf6137420e
                                                                      • Instruction ID: 2d5915303156733efeb15e920e8f55f0a5e8f8404e45220c363254bf11d5099a
                                                                      • Opcode Fuzzy Hash: e62ee4ed5d0ad3b5da12d19f82cc53b23a5276f87de78c6ed6132caf6137420e
                                                                      • Instruction Fuzzy Hash: 6711E2753002087FEF219E94DC85EFB7F6AFB983A4F100228F918AB290D631AD519760
                                                                      APIs
                                                                        • Part of subcall function 0052600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0052604C
                                                                        • Part of subcall function 0052600E: GetStockObject.GDI32(00000011), ref: 00526060
                                                                        • Part of subcall function 0052600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0052606A
                                                                      • GetWindowRect.USER32(00000000,?), ref: 005B377A
                                                                      • GetSysColor.USER32(00000012), ref: 005B3794
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                      • String ID: static
                                                                      • API String ID: 1983116058-2160076837
                                                                      • Opcode ID: 9324667d1328e325dceba7aae4ee5e5e32b1e87f70847460d9a87c1da0b61632
                                                                      • Instruction ID: 9bcd14b39550345c335969b16ed5629bc5fe05b010a2754f1096ef2b3bec5035
                                                                      • Opcode Fuzzy Hash: 9324667d1328e325dceba7aae4ee5e5e32b1e87f70847460d9a87c1da0b61632
                                                                      • Instruction Fuzzy Hash: BF1129B261020AAFDB00DFA8CC45EFA7BB8FB08354F004A14F955E2250EB35E955DB60
                                                                      APIs
                                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 005B61FC
                                                                      • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 005B6225
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 7e7a4096dd0a5e9bc7ba657d99412002fc5585d088d99f71702767893a230482
                                                                      • Instruction ID: 4af1d345205be4e057ce79d6e9676aa7fbb6d9ea441fd2615d922aacd3520cdd
                                                                      • Opcode Fuzzy Hash: 7e7a4096dd0a5e9bc7ba657d99412002fc5585d088d99f71702767893a230482
                                                                      • Instruction Fuzzy Hash: 06118E3A140214BEFF158F68DD19FF97FA4FB09310F004115FA169A1D1D2B8FA00EA50
                                                                      APIs
                                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0059CD7D
                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0059CDA6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$OpenOption
                                                                      • String ID: <local>
                                                                      • API String ID: 942729171-4266983199
                                                                      • Opcode ID: fd349addbef8db6bc16e02884009c2f20530c78bbee0eb44006ce49e2cca10da
                                                                      • Instruction ID: 79cfb422a44a564fe47d8178e5d599375828c72f9b5010a24dc0895b4cbbb9cb
                                                                      • Opcode Fuzzy Hash: fd349addbef8db6bc16e02884009c2f20530c78bbee0eb44006ce49e2cca10da
                                                                      • Instruction Fuzzy Hash: 5311C2B1205771BADB384B668C49EE7BEACFF227A4F00462AB10983180D7749844D6F0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,?,?,?), ref: 005B4FCC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: a02d0224556ee858a7e1a6cb3fc485bfe4ac79c73a492fa0bb2ba541c1fda6b3
                                                                      • Instruction ID: 065c8e4512e07d5ebb003c3da22d6cf47fb3f0ad2c13ac01975e3f6baa045879
                                                                      • Opcode Fuzzy Hash: a02d0224556ee858a7e1a6cb3fc485bfe4ac79c73a492fa0bb2ba541c1fda6b3
                                                                      • Instruction Fuzzy Hash: CE21D07AA0011AEFCB15DFA8C9449EA7BBAFB4D340B104554FA05A7320D631E921EBA0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000401,?,00000000), ref: 005B3147
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u$button
                                                                      • API String ID: 3850602802-1762282863
                                                                      • Opcode ID: 0370ba64d2cfc15a0c41eb6f97ca65b4d50ddef9d66885ee5a42c69735beebb0
                                                                      • Instruction ID: b60bd1925a3eef59bf399627efc000bcf5867d597ae9ea0ea971dcf5f4238431
                                                                      • Opcode Fuzzy Hash: 0370ba64d2cfc15a0c41eb6f97ca65b4d50ddef9d66885ee5a42c69735beebb0
                                                                      • Instruction Fuzzy Hash: 0B11AD32250209ABDF119FA8DC45FEA3FAAFF58354F100224FA54A7190C776F961EB60
                                                                      APIs
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00586CB6
                                                                      • _wcslen.LIBCMT ref: 00586CC2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: STOP
                                                                      • API String ID: 1256254125-2411985666
                                                                      • Opcode ID: e6e81ae56fbac6ad8665dffefaeb747b13750f56cd96dcd03b16cc27eb4ea6de
                                                                      • Instruction ID: 1d1caa929ce9ce40949144d2057b8b9e8af671611f330bffe211b486afdb6121
                                                                      • Opcode Fuzzy Hash: e6e81ae56fbac6ad8665dffefaeb747b13750f56cd96dcd03b16cc27eb4ea6de
                                                                      • Instruction Fuzzy Hash: BE01AD32A105278B8B21BEBDDC859BF7FA5BFA1714B500928EC62A6290EA31DD008750
                                                                      APIs
                                                                        • Part of subcall function 0058B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005821D0,?,?,00000034,00000800,?,00000034), ref: 0058B42D
                                                                      • SendMessageW.USER32(?,0000102B,?,00000000), ref: 0058243B
                                                                      • SendMessageW.USER32(?,0000102B,?,00000000), ref: 0058245E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MemoryProcessWrite
                                                                      • String ID: @U=u
                                                                      • API String ID: 1195347164-2594219639
                                                                      • Opcode ID: 53e452fe408bde43009eeea424c80bc9eb603474196c5f966764225d59474f5e
                                                                      • Instruction ID: fa6d97753bd07d5cd27dc997d27d931e04a3a3b1e3ae990146a64ea38332e053
                                                                      • Opcode Fuzzy Hash: 53e452fe408bde43009eeea424c80bc9eb603474196c5f966764225d59474f5e
                                                                      • Instruction Fuzzy Hash: D5018832900115ABEB117F64DC4AFEEBF79EB18310F104166F915BA0D1DBB06D45CB60
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000133E,00000000,?), ref: 005B43AF
                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?), ref: 005B4408
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: InvalidateMessageRectSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 909852535-2594219639
                                                                      • Opcode ID: 268aa33fa52c8cd690ef559f453d3a8e18414631fb265ada23b4eea17771b61f
                                                                      • Instruction ID: bb7939516af5f2667cea8268340931ed4f0943b4862662f9f34d124aead5ad11
                                                                      • Opcode Fuzzy Hash: 268aa33fa52c8cd690ef559f453d3a8e18414631fb265ada23b4eea17771b61f
                                                                      • Instruction Fuzzy Hash: 9211BF30500744AFEB21CF28C891BE7BBE4BF15310F10891CE8AB9B282C7707955DB50
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 00582531
                                                                      • SendMessageW.USER32(?,0000040D,?,00000000), ref: 00582564
                                                                        • Part of subcall function 0058B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0058B3F8
                                                                        • Part of subcall function 00526B57: _wcslen.LIBCMT ref: 00526B6A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MemoryProcessRead_wcslen
                                                                      • String ID: @U=u
                                                                      • API String ID: 1083363909-2594219639
                                                                      • Opcode ID: 9de9b65b114ee4ab4ea662b26bc8b0527fe276c65c4749527a3080ff993399c7
                                                                      • Instruction ID: 11b4ca162191d48747a48b4c2333c187668f5fb1e89c79c3427196ec0ba4a70c
                                                                      • Opcode Fuzzy Hash: 9de9b65b114ee4ab4ea662b26bc8b0527fe276c65c4749527a3080ff993399c7
                                                                      • Instruction Fuzzy Hash: 00016171900129AFDB50AF54DC95DEE7B7CFF64340F40C065B549A7190DE705E88CB90
                                                                      APIs
                                                                      • __Init_thread_footer.LIBCMT ref: 0053A529
                                                                        • Part of subcall function 00529CB3: _wcslen.LIBCMT ref: 00529CBD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Init_thread_footer_wcslen
                                                                      • String ID: ,%_$3yW
                                                                      • API String ID: 2551934079-2061247809
                                                                      • Opcode ID: 8f59172dedee50b6f0a5fdb0482be6844d75160909b677f7c8139c8d1967aa88
                                                                      • Instruction ID: 6dda7cc49a81c58f4136a2ee5e631a0345f0d6d3118cacc3de3fab8a82d17a3e
                                                                      • Opcode Fuzzy Hash: 8f59172dedee50b6f0a5fdb0482be6844d75160909b677f7c8139c8d1967aa88
                                                                      • Instruction Fuzzy Hash: 2C0126717016268BCE04F768EC1FAAD3F64BB86710F501428F6425B2C2EE64AD01CAA7
                                                                      APIs
                                                                        • Part of subcall function 00539BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00539BB2
                                                                      • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0057769C,?,?,?), ref: 005B9111
                                                                        • Part of subcall function 00539944: GetWindowLongW.USER32(?,000000EB), ref: 00539952
                                                                      • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 005B90F7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow$MessageProcSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 982171247-2594219639
                                                                      • Opcode ID: 7136be1a0d5509041fd10f50e73ca4381c726ddbcc6485bfb865885ce2a71cd3
                                                                      • Instruction ID: 04623f6e2a8053df69057e326cdb03944833740289ea493e2fbf9e3e4a874240
                                                                      • Opcode Fuzzy Hash: 7136be1a0d5509041fd10f50e73ca4381c726ddbcc6485bfb865885ce2a71cd3
                                                                      • Instruction Fuzzy Hash: 5001BC31100219EBDB21AF18DC49FA63FA6FB95365F200528FA511A2E1CBB27815EB64
                                                                      APIs
                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005F3018,005F305C), ref: 005B81BF
                                                                      • CloseHandle.KERNEL32 ref: 005B81D1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateHandleProcess
                                                                      • String ID: \0_
                                                                      • API String ID: 3712363035-3195368528
                                                                      • Opcode ID: 418e41443227a4b94de5ecd05e17b5d79694f01af60294271120cc37fffc4e59
                                                                      • Instruction ID: 48cdf59b6bea4366bd94ee0f176bf841c0d92124c1e3126d11aff4ec31a7749e
                                                                      • Opcode Fuzzy Hash: 418e41443227a4b94de5ecd05e17b5d79694f01af60294271120cc37fffc4e59
                                                                      • Instruction Fuzzy Hash: C7F054B1640314BAF3506B65AC4DFB73E9CEB14754F400422BB08D51A2DA799A04E3B8
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00582480
                                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00582497
                                                                        • Part of subcall function 005823DB: SendMessageW.USER32(?,0000102B,?,00000000), ref: 0058243B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 53a1a69495c12f7525d9ed52eace80c7510ac8c5245996c4d65539ecdf307f60
                                                                      • Instruction ID: 87c3b31c030806330191c419985da17ed8766ab6261bcfd16fc61195ec15d04f
                                                                      • Opcode Fuzzy Hash: 53a1a69495c12f7525d9ed52eace80c7510ac8c5245996c4d65539ecdf307f60
                                                                      • Instruction Fuzzy Hash: D2F0E230601121BBEB202B5ACC0FCDFBF6DEF96760F100114B805B6161CAE16D41D7B0
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: 3, 3, 16, 1
                                                                      • API String ID: 176396367-3042988571
                                                                      • Opcode ID: 17225793d47d5d5b5329e1ba97591e5d66bb53cceb0d0f55a6bcddc271d9814c
                                                                      • Instruction ID: cb2c3c93fa2ae0a3cbd3e1a43447d0380d510b7b4f71a5d81d1039204fe2ce3d
                                                                      • Opcode Fuzzy Hash: 17225793d47d5d5b5329e1ba97591e5d66bb53cceb0d0f55a6bcddc271d9814c
                                                                      • Instruction Fuzzy Hash: 0DE02B12254321109731127A9CC5ABF5F8DFFCE750710182BF981C2266EE948D92A3A0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00582BFA
                                                                      • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00582C2A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 3786e8717c8bf9f42e389b3bd1fcd576397a4f9a8336c0b814408b0995844a96
                                                                      • Instruction ID: 2beb203c6a5add504cb31905e67f2a08c4b99b5a8979b68b5bcb11d66c444a0f
                                                                      • Opcode Fuzzy Hash: 3786e8717c8bf9f42e389b3bd1fcd576397a4f9a8336c0b814408b0995844a96
                                                                      • Instruction Fuzzy Hash: DAF08C75240304BBFA116E84AC4AFAA3F58BB28761F000014FB056E0D0C9E26C0097A4
                                                                      APIs
                                                                        • Part of subcall function 0058286B: SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00582884
                                                                        • Part of subcall function 0058286B: SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 005828B6
                                                                      • SendMessageW.USER32(?,0000110B,00000005,00000000), ref: 00582D80
                                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00582D90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 73c39c96e68545a81d448da2d1d99978d02213cb7f82a361688f5e17d720b4db
                                                                      • Instruction ID: 2f16c03ba1c0c7c3362c1f73138d70883aaf9e0be1d74998fb888dc88d7f38d3
                                                                      • Opcode Fuzzy Hash: 73c39c96e68545a81d448da2d1d99978d02213cb7f82a361688f5e17d720b4db
                                                                      • Instruction Fuzzy Hash: 09E0D8753443057FFA212A519C4AEA33F9CE758751F100026FB057D091DEE2DC216724
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 005B5855
                                                                      • InvalidateRect.USER32(?,?,00000001), ref: 005B5877
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: InvalidateMessageRectSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 909852535-2594219639
                                                                      • Opcode ID: a1be87370b01bd742bfe952717f678cd4d034561d9a0c4751621da245e7251d9
                                                                      • Instruction ID: db6df84913c6846949a7578349a1f709e39897eed8207007f919a37ed87dfd64
                                                                      • Opcode Fuzzy Hash: a1be87370b01bd742bfe952717f678cd4d034561d9a0c4751621da245e7251d9
                                                                      • Instruction Fuzzy Hash: 70F08232604140AFDB259F69DC44FEEBFF8EB95321F0445B2E55AD9051E6309A85DB20
                                                                      APIs
                                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00580B23
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: AutoIt$Error allocating memory.
                                                                      • API String ID: 2030045667-4017498283
                                                                      • Opcode ID: ba9f9f46da9a0c9071329fa6825336795d18e6b943254991d3553ac2294c6f76
                                                                      • Instruction ID: f1926225109bd97344892daa991b88e52e09ad574608d8a6000cd1b77d57c30c
                                                                      • Opcode Fuzzy Hash: ba9f9f46da9a0c9071329fa6825336795d18e6b943254991d3553ac2294c6f76
                                                                      • Instruction Fuzzy Hash: 99E0483228435927D25436957C0BFC97F88FF45B55F10042AFB98995C38AE1745057AD
                                                                      APIs
                                                                        • Part of subcall function 0053F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00540D71,?,?,?,0052100A), ref: 0053F7CE
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,0052100A), ref: 00540D75
                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0052100A), ref: 00540D84
                                                                      Strings
                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00540D7F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                      • API String ID: 55579361-631824599
                                                                      • Opcode ID: ac6ef73ddda01a73652725faa3ba0154fab2bc0a849f2040c595e974e85d1e93
                                                                      • Instruction ID: 679c36e6e8f91874d72358bf22f4fd340180e6762c31833e3bc18dc923d09813
                                                                      • Opcode Fuzzy Hash: ac6ef73ddda01a73652725faa3ba0154fab2bc0a849f2040c595e974e85d1e93
                                                                      • Instruction Fuzzy Hash: 44E06D746007118BD7A09FB8E808796BFE4BF14748F104A2DE582C6691DBB5F4489BA1
                                                                      APIs
                                                                      • __Init_thread_footer.LIBCMT ref: 0053E3D5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: Init_thread_footer
                                                                      • String ID: 0%_$8%_
                                                                      • API String ID: 1385522511-3458377328
                                                                      • Opcode ID: 006f57e015d23491d89a4b62df1aa25ee71b929a6ce0a75b87b3f1d67f24e18f
                                                                      • Instruction ID: 1cdb38b1b73f3a195c889a237753dc1d8925e3ae9075f95b66e5a1d710ea649d
                                                                      • Opcode Fuzzy Hash: 006f57e015d23491d89a4b62df1aa25ee71b929a6ce0a75b87b3f1d67f24e18f
                                                                      • Instruction Fuzzy Hash: A1E026B1484915CBC6049718F85AAA83BD3BB44320F202964E202CF1D19B383C49E644
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: LocalTime
                                                                      • String ID: %.3d$X64
                                                                      • API String ID: 481472006-1077770165
                                                                      • Opcode ID: fe2db2b5e1d5c35ef5aa2cbb9cd2ae82612decc52b44b1b3ae1815f883ab20b6
                                                                      • Instruction ID: de1d134c241f4339fc0bf225f37b094ed8452967ead0160a2d4cbfb7055e8351
                                                                      • Opcode Fuzzy Hash: fe2db2b5e1d5c35ef5aa2cbb9cd2ae82612decc52b44b1b3ae1815f883ab20b6
                                                                      • Instruction Fuzzy Hash: 42D012A9C08109EACBD096D0EC498BDBF7CBF58301F50CC52FD4AA1041E624D5097771
                                                                      APIs
                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005B236C
                                                                      • PostMessageW.USER32(00000000), ref: 005B2373
                                                                        • Part of subcall function 0058E97B: Sleep.KERNEL32 ref: 0058E9F3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FindMessagePostSleepWindow
                                                                      • String ID: Shell_TrayWnd
                                                                      • API String ID: 529655941-2988720461
                                                                      • Opcode ID: 0b48a04fb5a15ff5f7fe0ddb899c3a7549f6839c1c8c2c0c271048f678e33235
                                                                      • Instruction ID: efc477f8e8a6d7f46556470ed25a778c12681965aff194e059f7a09690596006
                                                                      • Opcode Fuzzy Hash: 0b48a04fb5a15ff5f7fe0ddb899c3a7549f6839c1c8c2c0c271048f678e33235
                                                                      • Instruction Fuzzy Hash: B9D0C9323C13517AE6B8BB719C0FFD66E14AB65B50F004A16B685AA1D0D9E0B8458A58
                                                                      APIs
                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005B232C
                                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 005B233F
                                                                        • Part of subcall function 0058E97B: Sleep.KERNEL32 ref: 0058E9F3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: FindMessagePostSleepWindow
                                                                      • String ID: Shell_TrayWnd
                                                                      • API String ID: 529655941-2988720461
                                                                      • Opcode ID: ae0ad5d0488dc846aad3eb3e40847098a44b7b82c509f7ce6dec2c3bf556e97e
                                                                      • Instruction ID: b7763acd550721bbfd867b6e4aa37ebe7d81d87742558aaa297a89a4a2046ecf
                                                                      • Opcode Fuzzy Hash: ae0ad5d0488dc846aad3eb3e40847098a44b7b82c509f7ce6dec2c3bf556e97e
                                                                      • Instruction Fuzzy Hash: A4D0A932380300B6E2B8BB309C0FFD66E14AB20B00F000A02B685AA0D0C8E0B8048A08
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 0058231F
                                                                      • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 0058232D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1440698445.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                                                      • Associated: 00000000.00000002.1440680475.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440746309.00000000005E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440792855.00000000005EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1440807827.00000000005F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_520000_Statement_3029_from_Cross_Traders_and_Logistics_ltd.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: @U=u
                                                                      • API String ID: 3850602802-2594219639
                                                                      • Opcode ID: 99e582f1b787f23b6492426720e2e964a9c938f4fbac2a2bd90d4c7127894ecd
                                                                      • Instruction ID: 888a898ce9e3f99ccc9705c3ef319fa5d6092cc5932ceeffeb7ef3f9ede092a6
                                                                      • Opcode Fuzzy Hash: 99e582f1b787f23b6492426720e2e964a9c938f4fbac2a2bd90d4c7127894ecd
                                                                      • Instruction Fuzzy Hash: CAC00231140180BBE6611B6BAD0DD573E3DE7EAF517101258B2159D0A586A51059E628