Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New Order-090125.exe

Overview

General Information

Sample name:New Order-090125.exe
Analysis ID:1587654
MD5:6e385520e9eea19e8d04aafa9ca65141
SHA1:d28d1da48e5b54d524b58b087ac233bf20ef667c
SHA256:303a9101194ca11bc42d20bb65f44b28252727315be094a09d724443564636e6
Tags:exeRedLineStealeruser-James_inthe_box
Infos:

Detection

MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • New Order-090125.exe (PID: 5764 cmdline: "C:\Users\user\Desktop\New Order-090125.exe" MD5: 6E385520E9EEA19E8D04AAFA9CA65141)
    • RegSvcs.exe (PID: 5196 cmdline: "C:\Users\user\Desktop\New Order-090125.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • New Order-090125.exe (PID: 2996 cmdline: "C:\Users\user\Desktop\New Order-090125.exe" MD5: 6E385520E9EEA19E8D04AAFA9CA65141)
      • RegSvcs.exe (PID: 2064 cmdline: "C:\Users\user\Desktop\New Order-090125.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "admin@bouttases.fr", "Password": "NiconPay$", "Server": "mail.bouttases.fr", "To": "collect@bouttases.fr", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2187844911.0000000000BE0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 D3 88 44 24 2B 88 44 24 2F B0 3A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x5eff4:$a1: get_encryptedPassword
        • 0x5efc8:$a2: get_encryptedUsername
        • 0x5f08c:$a3: get_timePasswordChanged
        • 0x5efa4:$a4: get_passwordField
        • 0x5f00a:$a5: set_encryptedPassword
        • 0x5edd7:$a7: get_logins
        • 0x5e36a:$a8: GetOutlookPasswords
        • 0x5d893:$a9: StartKeylogger
        • 0x5c29d:$a10: KeyLoggerEventArgs
        • 0x5c26c:$a11: KeyLoggerEventArgsEventHandler
        • 0x5eeab:$a13: _encryptedPassword
        Click to see the 20 entries
        SourceRuleDescriptionAuthorStrings
        0.2.New Order-090125.exe.be0000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 D3 88 44 24 2B 88 44 24 2F B0 3A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        4.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 D3 88 44 24 2B 88 44 24 2F B0 3A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        4.2.RegSvcs.exe.2811cb6.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          4.2.RegSvcs.exe.2811cb6.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            4.2.RegSvcs.exe.2811cb6.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Click to see the 79 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T16:25:17.079743+010028032742Potentially Bad Traffic192.168.2.649716132.226.247.7380TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: New Order-090125.exeAvira: detected
              Source: 4.2.RegSvcs.exe.3d46458.8.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "admin@bouttases.fr", "Password": "NiconPay$", "Server": "mail.bouttases.fr", "To": "collect@bouttases.fr", "Port": 587}
              Source: New Order-090125.exeReversingLabs: Detection: 52%
              Source: New Order-090125.exeVirustotal: Detection: 31%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: New Order-090125.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: New Order-090125.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49775 version: TLS 1.0
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: New Order-090125.exe, 00000000.00000003.2185150823.0000000003970000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000000.00000003.2185414433.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2208251740.00000000042B0000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2206792170.0000000004110000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: New Order-090125.exe, 00000000.00000003.2185150823.0000000003970000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000000.00000003.2185414433.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2208251740.00000000042B0000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2206792170.0000000004110000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D0C2A2 FindFirstFileExW,0_2_00D0C2A2
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D468EE FindFirstFileW,FindClose,0_2_00D468EE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00D4698F
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D3D076
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D3D3A9
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D49642
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D4979D
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D3DBBE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00D49B2B
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00D45C97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_02A7E458
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611CD32h4_2_0611CA88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06110C2Dh4_2_061108F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611DFC8h4_2_0611DD20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061194B8h4_2_06119210
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611C8D8h4_2_0611C630
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611ECD0h4_2_0611EA28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06119910h4_2_06119668
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611F128h4_2_0611EE80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611F580h4_2_0611F2D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06119D68h4_2_06119AC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06111772h4_2_061116C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06111772h4_2_061116C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06112190h4_2_06111EE8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611A1C0h4_2_06119F18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611F9D8h4_2_0611F730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061125E8h4_2_06112340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611A618h4_2_0611A370
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06112A40h4_2_06112798
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611AA70h4_2_0611A7C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06112E98h4_2_06112BF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611D2C0h4_2_0611D018
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611AEC8h4_2_0611AC20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061102E9h4_2_06110040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061132F0h4_2_06113048
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611D718h4_2_0611D470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611B320h4_2_0611B078
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06110741h4_2_06110498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06113748h4_2_061134A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611B778h4_2_0611B4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611DB70h4_2_0611D8C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611BBD0h4_2_0611B928
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611E420h4_2_0611E178
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611C028h4_2_0611BD80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611E878h4_2_0611E5D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0611C480h4_2_0611C1D8
              Source: global trafficTCP traffic: 192.168.2.6:63991 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.6:49797 -> 162.159.36.2:53
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
              Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
              Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49716 -> 132.226.247.73:80
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49775 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00D4CE44
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002DA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002DA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
              Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D4EAFF
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00D4ED6A
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D4EAFF
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00D3AA57
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D69576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00D69576

              System Summary

              barindex
              Source: 0.2.New Order-090125.exe.be0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 3.2.New Order-090125.exe.ef0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.2187844911.0000000000BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000003.00000002.2208907705.0000000000EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000002.3433191418.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: New Order-090125.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: New Order-090125.exe, 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b977f50f-2
              Source: New Order-090125.exe, 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7d40aa26-c
              Source: New Order-090125.exe, 00000003.00000000.2186133252.0000000000D92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_917464dc-7
              Source: New Order-090125.exe, 00000003.00000000.2186133252.0000000000D92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0a02e3fd-2
              Source: New Order-090125.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_88235825-5
              Source: New Order-090125.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4a8f94af-8
              Source: initial sampleStatic PE information: Filename: New Order-090125.exe
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00D3D5EB
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D31201
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00D3E8F6
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D420460_2_00D42046
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD80600_2_00CD8060
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D382980_2_00D38298
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D0E4FF0_2_00D0E4FF
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D0676B0_2_00D0676B
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D648730_2_00D64873
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CDCAF00_2_00CDCAF0
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CFCAA00_2_00CFCAA0
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CECC390_2_00CECC39
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D06DD90_2_00D06DD9
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD91C00_2_00CD91C0
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CEB1190_2_00CEB119
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF13940_2_00CF1394
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF781B0_2_00CF781B
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CE997D0_2_00CE997D
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD79200_2_00CD7920
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF7A4A0_2_00CF7A4A
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF7CA70_2_00CF7CA7
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D09EEE0_2_00D09EEE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D5BE440_2_00D5BE44
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00EA49880_2_00EA4988
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_0178815C3_2_0178815C
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_0178C2383_2_0178C238
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_017882343_2_01788234
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00408C604_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040DC114_2_0040DC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00407C3F4_2_00407C3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00418CCC4_2_00418CCC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00406CA04_2_00406CA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004028B04_2_004028B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041A4BE4_2_0041A4BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004182444_2_00418244
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004016504_2_00401650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F204_2_00402F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004193C44_2_004193C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004187884_2_00418788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F894_2_00402F89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402B904_2_00402B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004073A04_2_004073A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02A714484_2_02A71448
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02A711A84_2_02A711A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02A711994_2_02A71199
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611CA884_2_0611CA88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06110F504_2_06110F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06116B684_2_06116B68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061108F04_2_061108F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061138F84_2_061138F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611DD204_2_0611DD20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06115D904_2_06115D90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061192104_2_06119210
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611EA184_2_0611EA18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611C6304_2_0611C630
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611C6204_2_0611C620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611EA284_2_0611EA28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061196584_2_06119658
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611EE714_2_0611EE71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611CA784_2_0611CA78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061196684_2_06119668
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611EE804_2_0611EE80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06119AB04_2_06119AB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611F2D84_2_0611F2D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06111ED84_2_06111ED8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06119AC04_2_06119AC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611F2C84_2_0611F2C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06111EE84_2_06111EE8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06119F184_2_06119F18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06119F0B4_2_06119F0B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611F7304_2_0611F730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061123304_2_06112330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611F7204_2_0611F720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061123404_2_06112340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611A3704_2_0611A370
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611A3604_2_0611A360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061127984_2_06112798
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061127884_2_06112788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611A7B94_2_0611A7B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611A7C84_2_0611A7C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06112BF04_2_06112BF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06112BE04_2_06112BE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611AC104_2_0611AC10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611D0184_2_0611D018
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061100074_2_06110007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611D0074_2_0611D007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061130384_2_06113038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611AC204_2_0611AC20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061100404_2_06110040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061130484_2_06113048
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611D4704_2_0611D470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611B0784_2_0611B078
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611D4604_2_0611D460
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611B0694_2_0611B069
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061134914_2_06113491
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061104984_2_06110498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061104884_2_06110488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611908B4_2_0611908B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611D8B94_2_0611D8B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061134A04_2_061134A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611B4D04_2_0611B4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611B4C04_2_0611B4C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611D8C84_2_0611D8C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_061108E14_2_061108E1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611DD114_2_0611DD11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611B9184_2_0611B918
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611B9284_2_0611B928
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611BD714_2_0611BD71
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611E1784_2_0611E178
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611E16B4_2_0611E16B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611BD804_2_0611BD80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611E5D04_2_0611E5D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611C1D84_2_0611C1D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611E5C14_2_0611E5C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0611C1C84_2_0611C1C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: String function: 00CF0A30 appears 46 times
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: String function: 00CD9CB3 appears 31 times
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: String function: 00CEF9F2 appears 40 times
              Source: New Order-090125.exe, 00000000.00000003.2184176316.0000000003A93000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New Order-090125.exe
              Source: New Order-090125.exe, 00000000.00000002.2187844911.0000000000BE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs New Order-090125.exe
              Source: New Order-090125.exe, 00000000.00000003.2184316939.0000000003C3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New Order-090125.exe
              Source: New Order-090125.exe, 00000003.00000003.2206473881.00000000043DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New Order-090125.exe
              Source: New Order-090125.exe, 00000003.00000003.2205753396.0000000004233000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New Order-090125.exe
              Source: New Order-090125.exe, 00000003.00000002.2208907705.0000000000EF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs New Order-090125.exe
              Source: New Order-090125.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.New Order-090125.exe.be0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 3.2.New Order-090125.exe.ef0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.2187844911.0000000000BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000003.00000002.2208907705.0000000000EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.3433191418.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/1@3/2
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D437B5 GetLastError,FormatMessageW,0_2_00D437B5
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D310BF AdjustTokenPrivileges,CloseHandle,0_2_00D310BF
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00D316C3
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00D451CD
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D5A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00D5A67C
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00D4648E
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00CD42A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\New Order-090125.exeFile created: C:\Users\user\AppData\Local\Temp\GehmanJump to behavior
              Source: New Order-090125.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\New Order-090125.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000004.00000002.3434505996.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002EAA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002EBE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003DBF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002E8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: New Order-090125.exeReversingLabs: Detection: 52%
              Source: New Order-090125.exeVirustotal: Detection: 31%
              Source: unknownProcess created: C:\Users\user\Desktop\New Order-090125.exe "C:\Users\user\Desktop\New Order-090125.exe"
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New Order-090125.exe"
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Users\user\Desktop\New Order-090125.exe "C:\Users\user\Desktop\New Order-090125.exe"
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New Order-090125.exe"
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New Order-090125.exe"Jump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Users\user\Desktop\New Order-090125.exe "C:\Users\user\Desktop\New Order-090125.exe"Jump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New Order-090125.exe"Jump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: New Order-090125.exeStatic file information: File size 1419264 > 1048576
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: New Order-090125.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: New Order-090125.exe, 00000000.00000003.2185150823.0000000003970000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000000.00000003.2185414433.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2208251740.00000000042B0000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2206792170.0000000004110000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: New Order-090125.exe, 00000000.00000003.2185150823.0000000003970000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000000.00000003.2185414433.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2208251740.00000000042B0000.00000004.00001000.00020000.00000000.sdmp, New Order-090125.exe, 00000003.00000003.2206792170.0000000004110000.00000004.00001000.00020000.00000000.sdmp
              Source: New Order-090125.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: New Order-090125.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: New Order-090125.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: New Order-090125.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: New Order-090125.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CD42DE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF22CB push ds; iretd 0_2_00CF22E2
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF0A76 push ecx; ret 0_2_00CF0A89
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_0178C464 push eax; retf 3_2_0178C465
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C40C push cs; iretd 4_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00423149 push eax; ret 4_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C50E push cs; iretd 4_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004231C8 push eax; ret 4_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E21D push ecx; ret 4_2_0040E230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C6BE push ebx; ret 4_2_0041C6BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06115528 push eax; ret 4_2_06115691
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00CEF98E
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D61C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00D61C41
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTR
              Source: C:\Users\user\Desktop\New Order-090125.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96400
              Source: C:\Users\user\Desktop\New Order-090125.exeAPI/Special instruction interceptor: Address: EA45AC
              Source: C:\Users\user\Desktop\New Order-090125.exeAPI/Special instruction interceptor: Address: 178BE5C
              Source: New Order-090125.exe, 00000000.00000002.2190001449.00000000010FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
              Source: New Order-090125.exe, 00000003.00000002.2210075248.00000000019E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEXP
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\New Order-090125.exeAPI coverage: 3.5 %
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D0C2A2 FindFirstFileExW,0_2_00D0C2A2
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D468EE FindFirstFileW,FindClose,0_2_00D468EE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00D4698F
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D3D076
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D3D3A9
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D49642
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D4979D
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D3DBBE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00D49B2B
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00D45C97
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CD42DE
              Source: RegSvcs.exe, 00000004.00000002.3433408152.0000000000C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D4EAA2 BlockInput,0_2_00D4EAA2
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D02622
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CD42DE
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF4CE8 mov eax, dword ptr fs:[00000030h]0_2_00CF4CE8
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00EA4878 mov eax, dword ptr fs:[00000030h]0_2_00EA4878
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00EA4818 mov eax, dword ptr fs:[00000030h]0_2_00EA4818
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00EA3218 mov eax, dword ptr fs:[00000030h]0_2_00EA3218
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_0178C0C8 mov eax, dword ptr fs:[00000030h]3_2_0178C0C8
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_0178AAC8 mov eax, dword ptr fs:[00000030h]3_2_0178AAC8
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 3_2_0178C128 mov eax, dword ptr fs:[00000030h]3_2_0178C128
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00D30B62
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D02622
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CF083F
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF09D5 SetUnhandledExceptionFilter,0_2_00CF09D5
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00CF0C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040E61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00416F6A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004123F1 SetUnhandledExceptionFilter,4_2_004123F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\New Order-090125.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 943008Jump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D31201
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D12BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00D12BA5
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D3B226 SendInput,keybd_event,0_2_00D3B226
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00D522DA
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New Order-090125.exe"Jump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\New Order-090125.exe"Jump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00D30B62
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D31663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00D31663
              Source: New Order-090125.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: New Order-090125.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CF0698 cpuid 0_2_00CF0698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,4_2_00417A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D48195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00D48195
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D2D27A GetUserNameW,0_2_00D2D27A
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D0B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00D0B952
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00CD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CD42DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: New Order-090125.exe, 00000000.00000002.2190001449.00000000010FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTR
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: New Order-090125.exeBinary or memory string: WIN_81
              Source: New Order-090125.exeBinary or memory string: WIN_XP
              Source: New Order-090125.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: New Order-090125.exeBinary or memory string: WIN_XPe
              Source: New Order-090125.exeBinary or memory string: WIN_VISTA
              Source: New Order-090125.exeBinary or memory string: WIN_7
              Source: New Order-090125.exeBinary or memory string: WIN_8

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTR
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d46458.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2d00000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d45570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3d6f190.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0ee8.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2810dce.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2cd0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.2811cb6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2064, type: MEMORYSTR
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D51204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00D51204
              Source: C:\Users\user\Desktop\New Order-090125.exeCode function: 0_2_00D51806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00D51806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              1
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS137
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets341
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587654 Sample: New Order-090125.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 24 reallyfreegeoip.org 2->24 26 checkip.dyndns.org 2->26 28 2 other IPs or domains 2->28 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus / Scanner detection for submitted sample 2->38 42 11 other signatures 2->42 8 New Order-090125.exe 1 2->8         started        signatures3 40 Tries to detect the country of the analysis system (by using the IP) 24->40 process4 signatures5 44 Binary is likely a compiled AutoIt script file 8->44 46 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->46 11 New Order-090125.exe 8->11         started        14 RegSvcs.exe 8->14         started        process6 signatures7 48 Binary is likely a compiled AutoIt script file 11->48 50 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->50 52 Writes to foreign memory regions 11->52 54 Maps a DLL or memory area into another process 11->54 16 RegSvcs.exe 15 2 11->16         started        process8 dnsIp9 20 checkip.dyndns.com 132.226.247.73, 49716, 80 UTMEMUS United States 16->20 22 reallyfreegeoip.org 104.21.64.1, 443, 49775 CLOUDFLARENETUS United States 16->22 30 Tries to steal Mail credentials (via file / registry access) 16->30 32 Tries to harvest and steal browser information (history, passwords, etc) 16->32 signatures10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              New Order-090125.exe53%ReversingLabsWin32.Trojan.Leonem
              New Order-090125.exe32%VirustotalBrowse
              New Order-090125.exe100%AviraDR/AutoIt.Gen8
              New Order-090125.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.64.1
              truefalse
                high
                checkip.dyndns.com
                132.226.247.73
                truefalse
                  high
                  18.31.95.13.in-addr.arpa
                  unknown
                  unknownfalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.orgRegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.orgRegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002E20000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.comRegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000004.00000002.3434505996.0000000002DA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/bot-/sendDocument?chat_id=RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.org/qRegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmpfalse
                                        high
                                        http://reallyfreegeoip.orgRegSvcs.exe, 00000004.00000002.3434505996.0000000002E48000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434505996.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            104.21.64.1
                                            reallyfreegeoip.orgUnited States
                                            13335CLOUDFLARENETUSfalse
                                            132.226.247.73
                                            checkip.dyndns.comUnited States
                                            16989UTMEMUSfalse
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1587654
                                            Start date and time:2025-01-10 16:24:07 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 6m 44s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:7
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:New Order-090125.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@7/1@3/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 97%
                                            • Number of executed functions: 46
                                            • Number of non-executed functions: 302
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212, 13.95.31.18
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            No simulations
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            104.21.64.11162-201.exeGet hashmaliciousFormBookBrowse
                                            • www.mzkd6gp5.top/utww/
                                            QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                            • www.mzkd6gp5.top/3u0p/
                                            Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                            • ordrr.statementquo.com/QCbxA/
                                            SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                            • adsfirm.com/administrator/index.php
                                            PO2412010.exeGet hashmaliciousFormBookBrowse
                                            • www.bser101pp.buzz/v89f/
                                            132.226.247.73B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            reallyfreegeoip.org4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.96.1
                                            ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 104.21.112.1
                                            B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.48.1
                                            B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 104.21.32.1
                                            VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                            • 104.21.80.1
                                            bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.80.1
                                            Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 104.21.48.1
                                            PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 104.21.96.1
                                            IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                            • 104.21.64.1
                                            RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                            • 104.21.48.1
                                            checkip.dyndns.com4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.6.168
                                            ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.130.0
                                            B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                            • 193.122.130.0
                                            bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.130.0
                                            Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.130.0
                                            PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                            • 193.122.6.168
                                            RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.130.0
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            UTMEMUSB7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.8.169
                                            1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                            • 132.226.247.73
                                            jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                            • 132.226.8.169
                                            Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                            • 132.226.8.169
                                            fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.8.169
                                            CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                            • 132.226.8.169
                                            Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            CLOUDFLARENETUS4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.96.1
                                            Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.56.70
                                            https://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
                                            • 188.114.96.3
                                            DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.12.205
                                            RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                            • 104.26.13.205
                                            ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 104.21.112.1
                                            https://booking.extrantelabelason.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                            • 104.18.86.42
                                            Setup.exeGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            https://eu.boxif.xyzGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54328bd36c14bd82ddaa0c04b25ed9ad4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.64.1
                                            ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 104.21.64.1
                                            B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.64.1
                                            B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 104.21.64.1
                                            VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                            • 104.21.64.1
                                            bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 104.21.64.1
                                            Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 104.21.64.1
                                            PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 104.21.64.1
                                            IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                            • 104.21.64.1
                                            RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                            • 104.21.64.1
                                            No context
                                            Process:C:\Users\user\Desktop\New Order-090125.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):209920
                                            Entropy (8bit):7.778659387858096
                                            Encrypted:false
                                            SSDEEP:6144:bcmJe0jTbUd21Y6T+MFEJnejks0GNgmj0hWBNOjQVPiIwTeN8C:5XUd2bFE8jf0hWBNO8jqC
                                            MD5:FC4F59672166F5DEC03B829FE2897367
                                            SHA1:6207C8DFD63F69A6A77A1E2D23B85E66DA8252BF
                                            SHA-256:515960CCEF52FBF4881AAD656F648C1F885945BC21212033968644F2C8B7842F
                                            SHA-512:47889632736F3D7F9FCE18854327F4A774CF6BACBCA6D98B56D37EA7AE35CB4FE80BFF7BEF989D6CBE0C959BC5FEF32E8B850F556AD0B63838629C05FAA0B6AF
                                            Malicious:false
                                            Reputation:low
                                            Preview:...RQMQ152Q1..TK.RMQ112QqBOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ1.2Q1LP.ER.D...3..c.<"!r=#^V@0\b,5%<=9qST.#D,o=%r....\]5TlBYAvRMQ112QYR.yg#.3}@.L}@.1fh-,r .O9.<d%.,~<.OmC.Opl:5N#./..[/.3.*yq)3|@.L.X!'x:.,MQ112Q1BOTKRRMQ1.\..BOTK..MQ}06QE.O.KRRMQ112.1aN_J[RM.012.0BOTKR}.Q11"Q1B.UKRR.Q1!2Q1@OTNRRMQ112T1BOTKRRM.212U1B.oIRPMQ.12A1B_TKRR]Q1!2Q1BOT[RRMQ112Q1BO.^PR.Q11213B.GJRRMQ112Q1BOTKRRMQ112Q1BOT..SMM112Q1BOTKRRMQ112Q1BOTKRRMQ1.?S1.OTKRRMQ112Q1.NT.SRMQ112Q1BOTKRRMQ112Q1BOTKR|94IE2Q1Z.UKRBMQ1.3Q1FOTKRRMQ112Q1BOtKR2c#UPF01B.9KRR.P11\Q1B.UKRRMQ112Q1BOT.RR..UPF01BO.{RRMq312G1BO^IRRMQ112Q1BOTK.RM..CA#RBOT.ASMQQ32Q%COTkPRMQ112Q1BOTKR.MQq12Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1BOTKRRMQ112Q1
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.290303045667435
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:New Order-090125.exe
                                            File size:1'419'264 bytes
                                            MD5:6e385520e9eea19e8d04aafa9ca65141
                                            SHA1:d28d1da48e5b54d524b58b087ac233bf20ef667c
                                            SHA256:303a9101194ca11bc42d20bb65f44b28252727315be094a09d724443564636e6
                                            SHA512:4bf97250aed69a0d5851e1e7310675bf7a86f02a1af3b2e25889c3ec642de4384418fdd0186f7930e6e3168151f3b6f5cd2f13f8c989abc4820cf6cc013d18f0
                                            SSDEEP:24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8a6Cmy45ZlU1exI5kXrBlbv:fTvC/MTQYxsWR7a6645Z6ExG
                                            TLSH:7D65D0027381C062FF9B92334B5AF7515ABC7A260123E61F13A81DB9BD705B1563E7A3
                                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                            Icon Hash:aaf3e3e3938382a0
                                            Entrypoint:0x420577
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x67806565 [Fri Jan 10 00:10:13 2025 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:1
                                            File Version Major:5
                                            File Version Minor:1
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:1
                                            Import Hash:948cc502fe9226992dce9417f952fce3
                                            Instruction
                                            call 00007F5F890960C3h
                                            jmp 00007F5F890959CFh
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            push dword ptr [ebp+08h]
                                            mov esi, ecx
                                            call 00007F5F89095BADh
                                            mov dword ptr [esi], 0049FDF0h
                                            mov eax, esi
                                            pop esi
                                            pop ebp
                                            retn 0004h
                                            and dword ptr [ecx+04h], 00000000h
                                            mov eax, ecx
                                            and dword ptr [ecx+08h], 00000000h
                                            mov dword ptr [ecx+04h], 0049FDF8h
                                            mov dword ptr [ecx], 0049FDF0h
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            push dword ptr [ebp+08h]
                                            mov esi, ecx
                                            call 00007F5F89095B7Ah
                                            mov dword ptr [esi], 0049FE0Ch
                                            mov eax, esi
                                            pop esi
                                            pop ebp
                                            retn 0004h
                                            and dword ptr [ecx+04h], 00000000h
                                            mov eax, ecx
                                            and dword ptr [ecx+08h], 00000000h
                                            mov dword ptr [ecx+04h], 0049FE14h
                                            mov dword ptr [ecx], 0049FE0Ch
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            mov esi, ecx
                                            lea eax, dword ptr [esi+04h]
                                            mov dword ptr [esi], 0049FDD0h
                                            and dword ptr [eax], 00000000h
                                            and dword ptr [eax+04h], 00000000h
                                            push eax
                                            mov eax, dword ptr [ebp+08h]
                                            add eax, 04h
                                            push eax
                                            call 00007F5F8909876Dh
                                            pop ecx
                                            pop ecx
                                            mov eax, esi
                                            pop esi
                                            pop ebp
                                            retn 0004h
                                            lea eax, dword ptr [ecx+04h]
                                            mov dword ptr [ecx], 0049FDD0h
                                            push eax
                                            call 00007F5F890987B8h
                                            pop ecx
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            mov esi, ecx
                                            lea eax, dword ptr [esi+04h]
                                            mov dword ptr [esi], 0049FDD0h
                                            push eax
                                            call 00007F5F890987A1h
                                            test byte ptr [ebp+08h], 00000001h
                                            pop ecx
                                            Programming Language:
                                            • [ C ] VS2008 SP1 build 30729
                                            • [IMP] VS2008 SP1 build 30729
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x83c90.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1580000x7594.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0xd40000x83c900x83e00cd78d8335084c9baaf8415d675177113False0.949920393957346data7.939810390285366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x1580000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                            RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                            RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                            RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                            RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                            RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                            RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                            RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                            RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                            RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                            RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                            RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                            RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                            RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                            RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                            RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                            RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                            RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                            RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                            RT_RCDATA0xdc7b80x7af56data1.0003196740516005
                                            RT_GROUP_ICON0x1577100x76dataEnglishGreat Britain0.6610169491525424
                                            RT_GROUP_ICON0x1577880x14dataEnglishGreat Britain1.25
                                            RT_GROUP_ICON0x15779c0x14dataEnglishGreat Britain1.15
                                            RT_GROUP_ICON0x1577b00x14dataEnglishGreat Britain1.25
                                            RT_VERSION0x1577c40xdcdataEnglishGreat Britain0.6181818181818182
                                            RT_MANIFEST0x1578a00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                            DLLImport
                                            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                            PSAPI.DLLGetProcessMemoryInfo
                                            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                            UxTheme.dllIsThemeActive
                                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishGreat Britain
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-01-10T16:25:17.079743+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649716132.226.247.7380TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 10, 2025 16:25:07.674417019 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:25:07.679332018 CET8049716132.226.247.73192.168.2.6
                                            Jan 10, 2025 16:25:07.680123091 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:25:07.680421114 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:25:07.685240984 CET8049716132.226.247.73192.168.2.6
                                            Jan 10, 2025 16:25:15.038845062 CET8049716132.226.247.73192.168.2.6
                                            Jan 10, 2025 16:25:15.051171064 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:25:15.055989027 CET8049716132.226.247.73192.168.2.6
                                            Jan 10, 2025 16:25:17.036277056 CET8049716132.226.247.73192.168.2.6
                                            Jan 10, 2025 16:25:17.046329021 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.046350956 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.046422005 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.056226969 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.056243896 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.079742908 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:25:17.551009893 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.551161051 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.554071903 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.554095030 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.554439068 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.595383883 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.606951952 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.647341013 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.720545053 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.720606089 CET44349775104.21.64.1192.168.2.6
                                            Jan 10, 2025 16:25:17.720674038 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:17.727415085 CET49775443192.168.2.6104.21.64.1
                                            Jan 10, 2025 16:25:21.415333033 CET6399153192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:21.420732975 CET53639911.1.1.1192.168.2.6
                                            Jan 10, 2025 16:25:21.420857906 CET6399153192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:21.425868988 CET53639911.1.1.1192.168.2.6
                                            Jan 10, 2025 16:25:21.897205114 CET6399153192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:21.902158976 CET53639911.1.1.1192.168.2.6
                                            Jan 10, 2025 16:25:21.903991938 CET6399153192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:34.962627888 CET4979753192.168.2.6162.159.36.2
                                            Jan 10, 2025 16:25:34.967456102 CET5349797162.159.36.2192.168.2.6
                                            Jan 10, 2025 16:25:34.967561960 CET4979753192.168.2.6162.159.36.2
                                            Jan 10, 2025 16:25:34.972393990 CET5349797162.159.36.2192.168.2.6
                                            Jan 10, 2025 16:25:35.436273098 CET4979753192.168.2.6162.159.36.2
                                            Jan 10, 2025 16:25:35.441396952 CET5349797162.159.36.2192.168.2.6
                                            Jan 10, 2025 16:25:35.441524029 CET4979753192.168.2.6162.159.36.2
                                            Jan 10, 2025 16:26:22.040100098 CET8049716132.226.247.73192.168.2.6
                                            Jan 10, 2025 16:26:22.040234089 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:26:57.048966885 CET4971680192.168.2.6132.226.247.73
                                            Jan 10, 2025 16:26:57.053930044 CET8049716132.226.247.73192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 10, 2025 16:25:07.660671949 CET5007353192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:07.668250084 CET53500731.1.1.1192.168.2.6
                                            Jan 10, 2025 16:25:17.038295984 CET5283153192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:17.045335054 CET53528311.1.1.1192.168.2.6
                                            Jan 10, 2025 16:25:21.414798975 CET53621511.1.1.1192.168.2.6
                                            Jan 10, 2025 16:25:34.961883068 CET5356301162.159.36.2192.168.2.6
                                            Jan 10, 2025 16:25:35.463170052 CET5239553192.168.2.61.1.1.1
                                            Jan 10, 2025 16:25:35.471163034 CET53523951.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 10, 2025 16:25:07.660671949 CET192.168.2.61.1.1.10x63ffStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.038295984 CET192.168.2.61.1.1.10x993Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:35.463170052 CET192.168.2.61.1.1.10x499eStandard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 10, 2025 16:25:07.668250084 CET1.1.1.1192.168.2.60x63ffNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Jan 10, 2025 16:25:07.668250084 CET1.1.1.1192.168.2.60x63ffNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:07.668250084 CET1.1.1.1192.168.2.60x63ffNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:07.668250084 CET1.1.1.1192.168.2.60x63ffNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:07.668250084 CET1.1.1.1192.168.2.60x63ffNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:07.668250084 CET1.1.1.1192.168.2.60x63ffNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:17.045335054 CET1.1.1.1192.168.2.60x993No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                            Jan 10, 2025 16:25:35.471163034 CET1.1.1.1192.168.2.60x499eName error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                            • reallyfreegeoip.org
                                            • checkip.dyndns.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649716132.226.247.73802064C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 10, 2025 16:25:07.680421114 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jan 10, 2025 16:25:15.038845062 CET273INHTTP/1.1 200 OK
                                            Date: Fri, 10 Jan 2025 15:25:14 GMT
                                            Content-Type: text/html
                                            Content-Length: 104
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                            Jan 10, 2025 16:25:15.051171064 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jan 10, 2025 16:25:17.036277056 CET273INHTTP/1.1 200 OK
                                            Date: Fri, 10 Jan 2025 15:25:16 GMT
                                            Content-Type: text/html
                                            Content-Length: 104
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649775104.21.64.14432064C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            TimestampBytes transferredDirectionData
                                            2025-01-10 15:25:17 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2025-01-10 15:25:17 UTC857INHTTP/1.1 200 OK
                                            Date: Fri, 10 Jan 2025 15:25:17 GMT
                                            Content-Type: text/xml
                                            Content-Length: 362
                                            Connection: close
                                            Age: 1837506
                                            Cache-Control: max-age=31536000
                                            cf-cache-status: HIT
                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1iu3SIQjoWk9XXcyZ%2FU%2BshISGEDsdEj956Ju6KJ7wWtD%2F6cUx5453yDsiJKGjKcsEW7UF7T9fS6VZc5PUxaqYU%2FnTUJdnHKaNB0afIp8xSsFRgS32EVfWXzNEiirzb7yF1gs3Kb6"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8ffdadc958b0de95-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=1657&min_rtt=1647&rtt_var=638&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1686886&cwnd=243&unsent_bytes=0&cid=2181aac16cf9a8b5&ts=180&x=0"
                                            2025-01-10 15:25:17 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:10:25:02
                                            Start date:10/01/2025
                                            Path:C:\Users\user\Desktop\New Order-090125.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\New Order-090125.exe"
                                            Imagebase:0xcd0000
                                            File size:1'419'264 bytes
                                            MD5 hash:6E385520E9EEA19E8D04AAFA9CA65141
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2187844911.0000000000BE0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:10:25:03
                                            Start date:10/01/2025
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\New Order-090125.exe"
                                            Imagebase:0x260000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:10:25:03
                                            Start date:10/01/2025
                                            Path:C:\Users\user\Desktop\New Order-090125.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\New Order-090125.exe"
                                            Imagebase:0xcd0000
                                            File size:1'419'264 bytes
                                            MD5 hash:6E385520E9EEA19E8D04AAFA9CA65141
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.2208907705.0000000000EF0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:4
                                            Start time:10:25:05
                                            Start date:10/01/2025
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\New Order-090125.exe"
                                            Imagebase:0x6a0000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3434043483.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3435846726.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.3434454589.0000000002D00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.3434420870.0000000002CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.3433191418.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:2.6%
                                              Dynamic/Decrypted Code Coverage:1.2%
                                              Signature Coverage:3.3%
                                              Total number of Nodes:1613
                                              Total number of Limit Nodes:44
                                              execution_graph 95630 cd1cad SystemParametersInfoW 95631 cddee5 95634 cdb710 95631->95634 95635 cdb72b 95634->95635 95636 d20146 95635->95636 95637 d200f8 95635->95637 95657 cdb750 95635->95657 95700 d558a2 207 API calls 2 library calls 95636->95700 95640 d20102 95637->95640 95643 d2010f 95637->95643 95637->95657 95698 d55d33 207 API calls 95640->95698 95656 cdba20 95643->95656 95699 d561d0 207 API calls 2 library calls 95643->95699 95645 ced336 40 API calls 95645->95657 95648 d203d9 95648->95648 95651 cdba4e 95652 d20322 95707 d55c0c 82 API calls 95652->95707 95656->95651 95708 d4359c 82 API calls __wsopen_s 95656->95708 95657->95645 95657->95651 95657->95652 95657->95656 95661 cdbbe0 40 API calls 95657->95661 95665 cdec40 95657->95665 95689 cda81b 41 API calls 95657->95689 95690 ced2f0 40 API calls 95657->95690 95691 cea01b 207 API calls 95657->95691 95692 cf0242 5 API calls __Init_thread_wait 95657->95692 95693 ceedcd 22 API calls 95657->95693 95694 cf00a3 29 API calls __onexit 95657->95694 95695 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95657->95695 95696 ceee53 82 API calls 95657->95696 95697 cee5ca 207 API calls 95657->95697 95701 cdaceb 23 API calls ISource 95657->95701 95702 d2f6bf 23 API calls 95657->95702 95703 cda8c7 95657->95703 95661->95657 95686 cdec76 ISource 95665->95686 95666 cefddb 22 API calls 95666->95686 95667 cf0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95667->95686 95668 cdfef7 95673 cda8c7 22 API calls 95668->95673 95681 cded9d ISource 95668->95681 95671 d24600 95677 cda8c7 22 API calls 95671->95677 95671->95681 95672 d24b0b 95712 d4359c 82 API calls __wsopen_s 95672->95712 95673->95681 95676 cda8c7 22 API calls 95676->95686 95677->95681 95679 cdfbe3 95679->95681 95682 d24bdc 95679->95682 95688 cdf3ae ISource 95679->95688 95680 cda961 22 API calls 95680->95686 95681->95657 95713 d4359c 82 API calls __wsopen_s 95682->95713 95683 cf00a3 29 API calls pre_c_initialization 95683->95686 95685 d24beb 95714 d4359c 82 API calls __wsopen_s 95685->95714 95686->95666 95686->95667 95686->95668 95686->95671 95686->95672 95686->95676 95686->95679 95686->95680 95686->95681 95686->95683 95686->95685 95687 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95686->95687 95686->95688 95709 ce01e0 207 API calls 2 library calls 95686->95709 95710 ce06a0 41 API calls ISource 95686->95710 95687->95686 95688->95681 95711 d4359c 82 API calls __wsopen_s 95688->95711 95689->95657 95690->95657 95691->95657 95692->95657 95693->95657 95694->95657 95695->95657 95696->95657 95697->95657 95698->95643 95699->95656 95700->95657 95701->95657 95702->95657 95704 cda8db 95703->95704 95706 cda8ea __fread_nolock 95703->95706 95704->95706 95715 cefe0b 95704->95715 95706->95657 95707->95656 95708->95648 95709->95686 95710->95686 95711->95681 95712->95681 95713->95685 95714->95681 95718 cefddb 95715->95718 95717 cefdfa 95717->95706 95718->95717 95721 cefdfc 95718->95721 95725 cfea0c 95718->95725 95732 cf4ead 7 API calls 2 library calls 95718->95732 95720 cf066d 95734 cf32a4 RaiseException 95720->95734 95721->95720 95733 cf32a4 RaiseException 95721->95733 95724 cf068a 95724->95706 95731 d03820 pre_c_initialization 95725->95731 95726 d0385e 95736 cff2d9 20 API calls __dosmaperr 95726->95736 95727 d03849 RtlAllocateHeap 95729 d0385c 95727->95729 95727->95731 95729->95718 95731->95726 95731->95727 95735 cf4ead 7 API calls 2 library calls 95731->95735 95732->95718 95733->95720 95734->95724 95735->95731 95736->95729 95737 cd1044 95742 cd10f3 95737->95742 95739 cd104a 95778 cf00a3 29 API calls __onexit 95739->95778 95741 cd1054 95779 cd1398 95742->95779 95746 cd116a 95789 cda961 95746->95789 95749 cda961 22 API calls 95750 cd117e 95749->95750 95751 cda961 22 API calls 95750->95751 95752 cd1188 95751->95752 95753 cda961 22 API calls 95752->95753 95754 cd11c6 95753->95754 95755 cda961 22 API calls 95754->95755 95756 cd1292 95755->95756 95794 cd171c 95756->95794 95760 cd12c4 95761 cda961 22 API calls 95760->95761 95762 cd12ce 95761->95762 95815 ce1940 95762->95815 95764 cd12f9 95825 cd1aab 95764->95825 95766 cd1315 95767 cd1325 GetStdHandle 95766->95767 95768 d12485 95767->95768 95769 cd137a 95767->95769 95768->95769 95770 d1248e 95768->95770 95772 cd1387 OleInitialize 95769->95772 95832 cefddb 95770->95832 95772->95739 95773 d12495 95842 d4011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95773->95842 95775 d1249e 95843 d40944 CreateThread 95775->95843 95777 d124aa CloseHandle 95777->95769 95778->95741 95844 cd13f1 95779->95844 95782 cd13f1 22 API calls 95783 cd13d0 95782->95783 95784 cda961 22 API calls 95783->95784 95785 cd13dc 95784->95785 95851 cd6b57 95785->95851 95787 cd1129 95788 cd1bc3 6 API calls 95787->95788 95788->95746 95790 cefe0b 22 API calls 95789->95790 95791 cda976 95790->95791 95792 cefddb 22 API calls 95791->95792 95793 cd1174 95792->95793 95793->95749 95795 cda961 22 API calls 95794->95795 95796 cd172c 95795->95796 95797 cda961 22 API calls 95796->95797 95798 cd1734 95797->95798 95799 cda961 22 API calls 95798->95799 95800 cd174f 95799->95800 95801 cefddb 22 API calls 95800->95801 95802 cd129c 95801->95802 95803 cd1b4a 95802->95803 95804 cd1b58 95803->95804 95805 cda961 22 API calls 95804->95805 95806 cd1b63 95805->95806 95807 cda961 22 API calls 95806->95807 95808 cd1b6e 95807->95808 95809 cda961 22 API calls 95808->95809 95810 cd1b79 95809->95810 95811 cda961 22 API calls 95810->95811 95812 cd1b84 95811->95812 95813 cefddb 22 API calls 95812->95813 95814 cd1b96 RegisterWindowMessageW 95813->95814 95814->95760 95816 ce1981 95815->95816 95823 ce195d 95815->95823 95874 cf0242 5 API calls __Init_thread_wait 95816->95874 95819 ce198b 95819->95823 95875 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95819->95875 95820 ce8727 95824 ce196e 95820->95824 95877 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95820->95877 95823->95824 95876 cf0242 5 API calls __Init_thread_wait 95823->95876 95824->95764 95826 cd1abb 95825->95826 95827 d1272d 95825->95827 95828 cefddb 22 API calls 95826->95828 95878 d43209 23 API calls 95827->95878 95830 cd1ac3 95828->95830 95830->95766 95831 d12738 95835 cefde0 95832->95835 95833 cfea0c ___std_exception_copy 21 API calls 95833->95835 95834 cefdfa 95834->95773 95835->95833 95835->95834 95837 cefdfc 95835->95837 95879 cf4ead 7 API calls 2 library calls 95835->95879 95838 cf066d 95837->95838 95880 cf32a4 RaiseException 95837->95880 95881 cf32a4 RaiseException 95838->95881 95841 cf068a 95841->95773 95842->95775 95843->95777 95882 d4092a 28 API calls 95843->95882 95845 cda961 22 API calls 95844->95845 95846 cd13fc 95845->95846 95847 cda961 22 API calls 95846->95847 95848 cd1404 95847->95848 95849 cda961 22 API calls 95848->95849 95850 cd13c6 95849->95850 95850->95782 95852 d14ba1 95851->95852 95853 cd6b67 _wcslen 95851->95853 95864 cd93b2 95852->95864 95856 cd6b7d 95853->95856 95857 cd6ba2 95853->95857 95855 d14baa 95855->95855 95863 cd6f34 22 API calls 95856->95863 95859 cefddb 22 API calls 95857->95859 95860 cd6bae 95859->95860 95861 cefe0b 22 API calls 95860->95861 95862 cd6b85 __fread_nolock 95861->95862 95862->95787 95863->95862 95865 cd93c9 __fread_nolock 95864->95865 95866 cd93c0 95864->95866 95865->95855 95866->95865 95868 cdaec9 95866->95868 95869 cdaedc 95868->95869 95870 cdaed9 __fread_nolock 95868->95870 95871 cefddb 22 API calls 95869->95871 95870->95865 95872 cdaee7 95871->95872 95873 cefe0b 22 API calls 95872->95873 95873->95870 95874->95819 95875->95823 95876->95820 95877->95824 95878->95831 95879->95835 95880->95838 95881->95841 95883 cd2de3 95884 cd2df0 __wsopen_s 95883->95884 95885 cd2e09 95884->95885 95886 d12c2b ___scrt_fastfail 95884->95886 95899 cd3aa2 95885->95899 95888 d12c47 GetOpenFileNameW 95886->95888 95890 d12c96 95888->95890 95892 cd6b57 22 API calls 95890->95892 95894 d12cab 95892->95894 95894->95894 95896 cd2e27 95927 cd44a8 95896->95927 95957 d11f50 95899->95957 95902 cd3ace 95904 cd6b57 22 API calls 95902->95904 95903 cd3ae9 95963 cda6c3 95903->95963 95906 cd3ada 95904->95906 95959 cd37a0 95906->95959 95909 cd2da5 95910 d11f50 __wsopen_s 95909->95910 95911 cd2db2 GetLongPathNameW 95910->95911 95912 cd6b57 22 API calls 95911->95912 95913 cd2dda 95912->95913 95914 cd3598 95913->95914 95915 cda961 22 API calls 95914->95915 95916 cd35aa 95915->95916 95917 cd3aa2 23 API calls 95916->95917 95918 cd35b5 95917->95918 95919 d132eb 95918->95919 95920 cd35c0 95918->95920 95925 d1330d 95919->95925 95981 cece60 41 API calls 95919->95981 95969 cd515f 95920->95969 95926 cd35df 95926->95896 95982 cd4ecb 95927->95982 95930 d13833 96004 d42cf9 95930->96004 95931 cd4ecb 94 API calls 95933 cd44e1 95931->95933 95933->95930 95935 cd44e9 95933->95935 95934 d13848 95936 d13869 95934->95936 95937 d1384c 95934->95937 95939 d13854 95935->95939 95940 cd44f5 95935->95940 95938 cefe0b 22 API calls 95936->95938 96054 cd4f39 95937->96054 95956 d138ae 95938->95956 96060 d3da5a 82 API calls 95939->96060 96053 cd940c 136 API calls 2 library calls 95940->96053 95944 d13862 95944->95936 95945 cd2e31 95946 d13a5f 95951 d13a67 95946->95951 95947 cd4f39 68 API calls 95947->95951 95951->95947 96062 d3989b 82 API calls __wsopen_s 95951->96062 95953 cd9cb3 22 API calls 95953->95956 95956->95946 95956->95951 95956->95953 96030 d3967e 95956->96030 96033 d40b5a 95956->96033 96039 cda4a1 95956->96039 96047 cd3ff7 95956->96047 96061 d395ad 42 API calls _wcslen 95956->96061 95958 cd3aaf GetFullPathNameW 95957->95958 95958->95902 95958->95903 95960 cd37ae 95959->95960 95961 cd93b2 22 API calls 95960->95961 95962 cd2e12 95961->95962 95962->95909 95964 cda6dd 95963->95964 95965 cda6d0 95963->95965 95966 cefddb 22 API calls 95964->95966 95965->95906 95967 cda6e7 95966->95967 95968 cefe0b 22 API calls 95967->95968 95968->95965 95970 cd516e 95969->95970 95974 cd518f __fread_nolock 95969->95974 95972 cefe0b 22 API calls 95970->95972 95971 cefddb 22 API calls 95973 cd35cc 95971->95973 95972->95974 95975 cd35f3 95973->95975 95974->95971 95976 cd3605 95975->95976 95980 cd3624 __fread_nolock 95975->95980 95978 cefe0b 22 API calls 95976->95978 95977 cefddb 22 API calls 95979 cd363b 95977->95979 95978->95980 95979->95926 95980->95977 95981->95919 96063 cd4e90 LoadLibraryA 95982->96063 95987 cd4ef6 LoadLibraryExW 96071 cd4e59 LoadLibraryA 95987->96071 95988 d13ccf 95989 cd4f39 68 API calls 95988->95989 95991 d13cd6 95989->95991 95993 cd4e59 3 API calls 95991->95993 95995 d13cde 95993->95995 96093 cd50f5 95995->96093 95996 cd4f20 95996->95995 95997 cd4f2c 95996->95997 95999 cd4f39 68 API calls 95997->95999 96001 cd44cd 95999->96001 96001->95930 96001->95931 96003 d13d05 96005 d42d15 96004->96005 96006 cd511f 64 API calls 96005->96006 96007 d42d29 96006->96007 96243 d42e66 96007->96243 96010 cd50f5 40 API calls 96011 d42d56 96010->96011 96012 cd50f5 40 API calls 96011->96012 96013 d42d66 96012->96013 96014 cd50f5 40 API calls 96013->96014 96015 d42d81 96014->96015 96016 cd50f5 40 API calls 96015->96016 96017 d42d9c 96016->96017 96018 cd511f 64 API calls 96017->96018 96019 d42db3 96018->96019 96020 cfea0c ___std_exception_copy 21 API calls 96019->96020 96021 d42dba 96020->96021 96022 cfea0c ___std_exception_copy 21 API calls 96021->96022 96023 d42dc4 96022->96023 96024 cd50f5 40 API calls 96023->96024 96025 d42dd8 96024->96025 96026 d428fe 27 API calls 96025->96026 96027 d42dee 96026->96027 96029 d42d3f 96027->96029 96249 d422ce 79 API calls 96027->96249 96029->95934 96031 cefe0b 22 API calls 96030->96031 96032 d396ae __fread_nolock 96031->96032 96032->95956 96032->96032 96034 d40b65 96033->96034 96035 cefddb 22 API calls 96034->96035 96036 d40b7c 96035->96036 96250 cd9cb3 96036->96250 96040 cda52b 96039->96040 96046 cda4b1 __fread_nolock 96039->96046 96042 cefe0b 22 API calls 96040->96042 96041 cefddb 22 API calls 96043 cda4b8 96041->96043 96042->96046 96044 cefddb 22 API calls 96043->96044 96045 cda4d6 96043->96045 96044->96045 96045->95956 96046->96041 96048 cd400a 96047->96048 96050 cd40ae 96047->96050 96049 cefe0b 22 API calls 96048->96049 96051 cd403c 96048->96051 96049->96051 96050->95956 96051->96050 96052 cefddb 22 API calls 96051->96052 96052->96051 96053->95945 96055 cd4f43 96054->96055 96057 cd4f4a 96054->96057 96256 cfe678 96055->96256 96058 cd4f59 96057->96058 96059 cd4f6a FreeLibrary 96057->96059 96058->95939 96059->96058 96060->95944 96061->95956 96062->95951 96064 cd4ea8 GetProcAddress 96063->96064 96065 cd4ec6 96063->96065 96066 cd4eb8 96064->96066 96068 cfe5eb 96065->96068 96066->96065 96067 cd4ebf FreeLibrary 96066->96067 96067->96065 96101 cfe52a 96068->96101 96070 cd4eea 96070->95987 96070->95988 96072 cd4e8d 96071->96072 96073 cd4e6e GetProcAddress 96071->96073 96076 cd4f80 96072->96076 96074 cd4e7e 96073->96074 96074->96072 96075 cd4e86 FreeLibrary 96074->96075 96075->96072 96077 cefe0b 22 API calls 96076->96077 96078 cd4f95 96077->96078 96169 cd5722 96078->96169 96080 cd4fa1 __fread_nolock 96081 cd50a5 96080->96081 96082 d13d1d 96080->96082 96092 cd4fdc 96080->96092 96172 cd42a2 CreateStreamOnHGlobal 96081->96172 96183 d4304d 74 API calls 96082->96183 96085 d13d22 96087 cd511f 64 API calls 96085->96087 96086 cd50f5 40 API calls 96086->96092 96088 d13d45 96087->96088 96089 cd50f5 40 API calls 96088->96089 96091 cd506e ISource 96089->96091 96091->95996 96092->96085 96092->96086 96092->96091 96178 cd511f 96092->96178 96094 d13d70 96093->96094 96095 cd5107 96093->96095 96205 cfe8c4 96095->96205 96098 d428fe 96226 d4274e 96098->96226 96100 d42919 96100->96003 96102 cfe536 CallCatchBlock 96101->96102 96103 cfe544 96102->96103 96105 cfe574 96102->96105 96126 cff2d9 20 API calls __dosmaperr 96103->96126 96107 cfe579 96105->96107 96108 cfe586 96105->96108 96106 cfe549 96127 d027ec 26 API calls pre_c_initialization 96106->96127 96128 cff2d9 20 API calls __dosmaperr 96107->96128 96118 d08061 96108->96118 96112 cfe58f 96113 cfe595 96112->96113 96114 cfe5a2 96112->96114 96129 cff2d9 20 API calls __dosmaperr 96113->96129 96130 cfe5d4 LeaveCriticalSection __fread_nolock 96114->96130 96115 cfe554 __fread_nolock 96115->96070 96119 d0806d CallCatchBlock 96118->96119 96131 d02f5e EnterCriticalSection 96119->96131 96121 d0807b 96132 d080fb 96121->96132 96125 d080ac __fread_nolock 96125->96112 96126->96106 96127->96115 96128->96115 96129->96115 96130->96115 96131->96121 96134 d0811e 96132->96134 96133 d08177 96150 d04c7d 96133->96150 96134->96133 96141 d08088 96134->96141 96148 cf918d EnterCriticalSection 96134->96148 96149 cf91a1 LeaveCriticalSection 96134->96149 96139 d08189 96139->96141 96163 d03405 11 API calls 2 library calls 96139->96163 96145 d080b7 96141->96145 96142 d081a8 96164 cf918d EnterCriticalSection 96142->96164 96168 d02fa6 LeaveCriticalSection 96145->96168 96147 d080be 96147->96125 96148->96134 96149->96134 96155 d04c8a pre_c_initialization 96150->96155 96151 d04cca 96166 cff2d9 20 API calls __dosmaperr 96151->96166 96152 d04cb5 RtlAllocateHeap 96153 d04cc8 96152->96153 96152->96155 96157 d029c8 96153->96157 96155->96151 96155->96152 96165 cf4ead 7 API calls 2 library calls 96155->96165 96158 d029d3 RtlFreeHeap 96157->96158 96162 d029fc __dosmaperr 96157->96162 96159 d029e8 96158->96159 96158->96162 96167 cff2d9 20 API calls __dosmaperr 96159->96167 96161 d029ee GetLastError 96161->96162 96162->96139 96163->96142 96164->96141 96165->96155 96166->96153 96167->96161 96168->96147 96170 cefddb 22 API calls 96169->96170 96171 cd5734 96170->96171 96171->96080 96173 cd42bc FindResourceExW 96172->96173 96174 cd42d9 96172->96174 96173->96174 96175 d135ba LoadResource 96173->96175 96174->96092 96175->96174 96176 d135cf SizeofResource 96175->96176 96176->96174 96177 d135e3 LockResource 96176->96177 96177->96174 96179 d13d90 96178->96179 96180 cd512e 96178->96180 96184 cfece3 96180->96184 96183->96085 96187 cfeaaa 96184->96187 96186 cd513c 96186->96092 96190 cfeab6 CallCatchBlock 96187->96190 96188 cfeac2 96200 cff2d9 20 API calls __dosmaperr 96188->96200 96190->96188 96191 cfeae8 96190->96191 96202 cf918d EnterCriticalSection 96191->96202 96192 cfeac7 96201 d027ec 26 API calls pre_c_initialization 96192->96201 96195 cfeaf4 96203 cfec0a 62 API calls 2 library calls 96195->96203 96197 cfeb08 96204 cfeb27 LeaveCriticalSection __fread_nolock 96197->96204 96199 cfead2 __fread_nolock 96199->96186 96200->96192 96201->96199 96202->96195 96203->96197 96204->96199 96208 cfe8e1 96205->96208 96207 cd5118 96207->96098 96209 cfe8ed CallCatchBlock 96208->96209 96210 cfe92d 96209->96210 96211 cfe900 ___scrt_fastfail 96209->96211 96212 cfe925 __fread_nolock 96209->96212 96223 cf918d EnterCriticalSection 96210->96223 96221 cff2d9 20 API calls __dosmaperr 96211->96221 96212->96207 96215 cfe937 96224 cfe6f8 38 API calls 4 library calls 96215->96224 96216 cfe91a 96222 d027ec 26 API calls pre_c_initialization 96216->96222 96219 cfe94e 96225 cfe96c LeaveCriticalSection __fread_nolock 96219->96225 96221->96216 96222->96212 96223->96215 96224->96219 96225->96212 96229 cfe4e8 96226->96229 96228 d4275d 96228->96100 96232 cfe469 96229->96232 96231 cfe505 96231->96228 96233 cfe48c 96232->96233 96234 cfe478 96232->96234 96239 cfe488 __alldvrm 96233->96239 96242 d0333f 11 API calls 2 library calls 96233->96242 96240 cff2d9 20 API calls __dosmaperr 96234->96240 96236 cfe47d 96241 d027ec 26 API calls pre_c_initialization 96236->96241 96239->96231 96240->96236 96241->96239 96242->96239 96244 d42e7a 96243->96244 96245 cd50f5 40 API calls 96244->96245 96246 d428fe 27 API calls 96244->96246 96247 d42d3b 96244->96247 96248 cd511f 64 API calls 96244->96248 96245->96244 96246->96244 96247->96010 96247->96029 96248->96244 96249->96029 96251 cd9cc2 _wcslen 96250->96251 96252 cefe0b 22 API calls 96251->96252 96253 cd9cea __fread_nolock 96252->96253 96254 cefddb 22 API calls 96253->96254 96255 cd9d00 96254->96255 96255->95956 96257 cfe684 CallCatchBlock 96256->96257 96258 cfe6aa 96257->96258 96259 cfe695 96257->96259 96268 cfe6a5 __fread_nolock 96258->96268 96271 cf918d EnterCriticalSection 96258->96271 96269 cff2d9 20 API calls __dosmaperr 96259->96269 96261 cfe69a 96270 d027ec 26 API calls pre_c_initialization 96261->96270 96264 cfe6c6 96272 cfe602 96264->96272 96266 cfe6d1 96288 cfe6ee LeaveCriticalSection __fread_nolock 96266->96288 96268->96057 96269->96261 96270->96268 96271->96264 96273 cfe60f 96272->96273 96274 cfe624 96272->96274 96289 cff2d9 20 API calls __dosmaperr 96273->96289 96279 cfe61f 96274->96279 96291 cfdc0b 96274->96291 96277 cfe614 96290 d027ec 26 API calls pre_c_initialization 96277->96290 96279->96266 96284 cfe646 96308 d0862f 96284->96308 96287 d029c8 _free 20 API calls 96287->96279 96288->96268 96289->96277 96290->96279 96292 cfdc23 96291->96292 96293 cfdc1f 96291->96293 96292->96293 96294 cfd955 __fread_nolock 26 API calls 96292->96294 96297 d04d7a 96293->96297 96295 cfdc43 96294->96295 96323 d059be 62 API calls 5 library calls 96295->96323 96298 d04d90 96297->96298 96300 cfe640 96297->96300 96299 d029c8 _free 20 API calls 96298->96299 96298->96300 96299->96300 96301 cfd955 96300->96301 96302 cfd976 96301->96302 96303 cfd961 96301->96303 96302->96284 96324 cff2d9 20 API calls __dosmaperr 96303->96324 96305 cfd966 96325 d027ec 26 API calls pre_c_initialization 96305->96325 96307 cfd971 96307->96284 96309 d08653 96308->96309 96310 d0863e 96308->96310 96312 d0868e 96309->96312 96316 d0867a 96309->96316 96326 cff2c6 20 API calls __dosmaperr 96310->96326 96331 cff2c6 20 API calls __dosmaperr 96312->96331 96313 d08643 96327 cff2d9 20 API calls __dosmaperr 96313->96327 96328 d08607 96316->96328 96317 d08693 96332 cff2d9 20 API calls __dosmaperr 96317->96332 96320 d0869b 96333 d027ec 26 API calls pre_c_initialization 96320->96333 96322 cfe64c 96322->96279 96322->96287 96323->96293 96324->96305 96325->96307 96326->96313 96327->96322 96334 d08585 96328->96334 96330 d0862b 96330->96322 96331->96317 96332->96320 96333->96322 96335 d08591 CallCatchBlock 96334->96335 96345 d05147 EnterCriticalSection 96335->96345 96337 d0859f 96338 d085d1 96337->96338 96339 d085c6 96337->96339 96361 cff2d9 20 API calls __dosmaperr 96338->96361 96346 d086ae 96339->96346 96342 d085cc 96362 d085fb LeaveCriticalSection __wsopen_s 96342->96362 96344 d085ee __fread_nolock 96344->96330 96345->96337 96363 d053c4 96346->96363 96348 d086c4 96376 d05333 21 API calls 2 library calls 96348->96376 96350 d086be 96350->96348 96351 d053c4 __wsopen_s 26 API calls 96350->96351 96360 d086f6 96350->96360 96356 d086ed 96351->96356 96352 d053c4 __wsopen_s 26 API calls 96353 d08702 CloseHandle 96352->96353 96353->96348 96357 d0870e GetLastError 96353->96357 96354 d0873e 96354->96342 96355 d0871c 96355->96354 96377 cff2a3 20 API calls __dosmaperr 96355->96377 96359 d053c4 __wsopen_s 26 API calls 96356->96359 96357->96348 96359->96360 96360->96348 96360->96352 96361->96342 96362->96344 96364 d053d1 96363->96364 96365 d053e6 96363->96365 96378 cff2c6 20 API calls __dosmaperr 96364->96378 96370 d0540b 96365->96370 96380 cff2c6 20 API calls __dosmaperr 96365->96380 96367 d053d6 96379 cff2d9 20 API calls __dosmaperr 96367->96379 96370->96350 96371 d05416 96381 cff2d9 20 API calls __dosmaperr 96371->96381 96372 d053de 96372->96350 96374 d0541e 96382 d027ec 26 API calls pre_c_initialization 96374->96382 96376->96355 96377->96354 96378->96367 96379->96372 96380->96371 96381->96374 96382->96372 96383 d22a00 96397 cdd7b0 ISource 96383->96397 96384 cddb11 PeekMessageW 96384->96397 96385 cdd807 GetInputState 96385->96384 96385->96397 96386 d21cbe TranslateAcceleratorW 96386->96397 96388 cddb8f PeekMessageW 96388->96397 96389 cddb73 TranslateMessage DispatchMessageW 96389->96388 96390 cdda04 timeGetTime 96390->96397 96391 cddbaf Sleep 96408 cddbc0 96391->96408 96392 d22b74 Sleep 96392->96408 96393 d21dda timeGetTime 96502 cee300 23 API calls 96393->96502 96394 cee551 timeGetTime 96394->96408 96397->96384 96397->96385 96397->96386 96397->96388 96397->96389 96397->96390 96397->96391 96397->96392 96397->96393 96399 cdd9d5 96397->96399 96411 cdec40 207 API calls 96397->96411 96415 cddd50 96397->96415 96422 cddfd0 96397->96422 96445 ce1310 96397->96445 96500 cdbf40 207 API calls 2 library calls 96397->96500 96501 ceedf6 IsDialogMessageW GetClassLongW 96397->96501 96503 d43a2a 23 API calls 96397->96503 96504 d4359c 82 API calls __wsopen_s 96397->96504 96398 d22c0b GetExitCodeProcess 96402 d22c21 WaitForSingleObject 96398->96402 96403 d22c37 CloseHandle 96398->96403 96400 d629bf GetForegroundWindow 96400->96408 96402->96397 96402->96403 96403->96408 96404 d22a31 96404->96399 96405 d22ca9 Sleep 96405->96397 96408->96394 96408->96397 96408->96398 96408->96399 96408->96400 96408->96404 96408->96405 96505 d55658 23 API calls 96408->96505 96506 d3e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96408->96506 96507 d3d4dc 47 API calls 96408->96507 96411->96397 96416 cddd6f 96415->96416 96417 cddd83 96415->96417 96508 cdd260 207 API calls 2 library calls 96416->96508 96509 d4359c 82 API calls __wsopen_s 96417->96509 96420 cddd7a 96420->96397 96421 d22f75 96421->96421 96423 cde010 96422->96423 96435 cde0dc ISource 96423->96435 96512 cf0242 5 API calls __Init_thread_wait 96423->96512 96426 cde3e1 96426->96397 96427 d22fca 96430 cda961 22 API calls 96427->96430 96427->96435 96428 cda961 22 API calls 96428->96435 96429 d4359c 82 API calls 96429->96435 96431 d22fe4 96430->96431 96513 cf00a3 29 API calls __onexit 96431->96513 96435->96426 96435->96428 96435->96429 96440 cda8c7 22 API calls 96435->96440 96441 cdec40 207 API calls 96435->96441 96442 ce04f0 22 API calls 96435->96442 96510 cda81b 41 API calls 96435->96510 96511 cea308 207 API calls 96435->96511 96515 cf0242 5 API calls __Init_thread_wait 96435->96515 96516 cf00a3 29 API calls __onexit 96435->96516 96517 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96435->96517 96518 d547d4 207 API calls 96435->96518 96519 d568c1 207 API calls 96435->96519 96436 d22fee 96514 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96436->96514 96440->96435 96441->96435 96442->96435 96446 ce1376 96445->96446 96447 ce17b0 96445->96447 96449 d26331 96446->96449 96452 ce1940 9 API calls 96446->96452 96677 cf0242 5 API calls __Init_thread_wait 96447->96677 96636 d5709c 96449->96636 96450 ce17ba 96456 cd9cb3 22 API calls 96450->96456 96460 ce17fb 96450->96460 96454 ce13a0 96452->96454 96453 d2633d 96453->96397 96455 ce1940 9 API calls 96454->96455 96457 ce13b6 96455->96457 96458 ce17d4 96456->96458 96457->96460 96461 ce13ec 96457->96461 96678 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96458->96678 96459 d26346 96682 d4359c 82 API calls __wsopen_s 96459->96682 96460->96459 96462 ce182c 96460->96462 96461->96459 96484 ce1408 __fread_nolock 96461->96484 96679 cdaceb 23 API calls ISource 96462->96679 96466 ce1839 96680 ced217 207 API calls 96466->96680 96468 d2636e 96683 d4359c 82 API calls __wsopen_s 96468->96683 96469 ce152f 96471 ce153c 96469->96471 96472 d263d1 96469->96472 96474 ce1940 9 API calls 96471->96474 96685 d55745 54 API calls _wcslen 96472->96685 96475 ce1549 96474->96475 96479 ce1940 9 API calls 96475->96479 96487 ce15c7 ISource 96475->96487 96476 cefddb 22 API calls 96476->96484 96477 cefe0b 22 API calls 96477->96484 96478 ce1872 96478->96449 96681 cefaeb 23 API calls 96478->96681 96485 ce1563 96479->96485 96480 ce171d 96480->96397 96483 cdec40 207 API calls 96483->96484 96484->96466 96484->96468 96484->96469 96484->96476 96484->96477 96484->96483 96484->96487 96488 d263b2 96484->96488 96485->96487 96492 cda8c7 22 API calls 96485->96492 96486 ce167b ISource 96486->96480 96676 cece17 22 API calls ISource 96486->96676 96487->96478 96487->96486 96490 ce1940 9 API calls 96487->96490 96520 d5e204 96487->96520 96556 cd6246 96487->96556 96560 d4f0ec 96487->96560 96569 d4744a 96487->96569 96625 cd6216 96487->96625 96630 d483da 96487->96630 96633 d5958b 96487->96633 96686 d4359c 82 API calls __wsopen_s 96487->96686 96684 d4359c 82 API calls __wsopen_s 96488->96684 96490->96487 96492->96487 96500->96397 96501->96397 96502->96397 96503->96397 96504->96397 96505->96408 96506->96408 96507->96408 96508->96420 96509->96421 96510->96435 96511->96435 96512->96427 96513->96436 96514->96435 96515->96435 96516->96435 96517->96435 96518->96435 96519->96435 96521 cda961 22 API calls 96520->96521 96522 d5e21b 96521->96522 96687 cd7510 96522->96687 96527 cd7510 53 API calls 96528 d5e24a 96527->96528 96529 d5e2c7 96528->96529 96530 d5e262 96528->96530 96531 cd7510 53 API calls 96529->96531 96734 cdb567 39 API calls 96530->96734 96533 d5e2cc 96531->96533 96535 d5e314 96533->96535 96536 d5e2d9 96533->96536 96534 d5e267 96534->96536 96539 d5e280 96534->96539 96537 d5e32c 96535->96537 96747 cdb567 39 API calls 96535->96747 96746 cd9c6e 22 API calls 96536->96746 96541 d5e345 96537->96541 96748 cdb567 39 API calls 96537->96748 96735 cd6d25 22 API calls __fread_nolock 96539->96735 96545 cda8c7 22 API calls 96541->96545 96543 d5e28d 96736 cd6350 96543->96736 96547 d5e35f 96545->96547 96715 d392c8 96547->96715 96551 d5e2b4 96552 cd6350 22 API calls 96551->96552 96555 d5e2c2 96552->96555 96553 d5e2e6 96553->96487 96749 cd62b5 22 API calls 96555->96749 96557 cd625f 96556->96557 96558 cd6250 96556->96558 96557->96558 96559 cd6264 CloseHandle 96557->96559 96558->96487 96559->96558 96561 cd7510 53 API calls 96560->96561 96562 d4f126 96561->96562 96782 cd9e90 96562->96782 96564 d4f136 96565 cdec40 207 API calls 96564->96565 96566 d4f15b 96564->96566 96565->96566 96568 d4f15f 96566->96568 96810 cd9c6e 22 API calls 96566->96810 96568->96487 96570 d47469 96569->96570 96571 d47474 96569->96571 96826 cdb567 39 API calls 96570->96826 96573 d47554 96571->96573 96575 cda961 22 API calls 96571->96575 96574 cefddb 22 API calls 96573->96574 96623 d476a4 96573->96623 96576 d47587 96574->96576 96577 d47495 96575->96577 96578 cefe0b 22 API calls 96576->96578 96579 cda961 22 API calls 96577->96579 96580 d47598 96578->96580 96581 d4749e 96579->96581 96582 cd6246 CloseHandle 96580->96582 96583 cd7510 53 API calls 96581->96583 96584 d475a3 96582->96584 96586 d474aa 96583->96586 96585 cda961 22 API calls 96584->96585 96587 d475ab 96585->96587 96827 cd525f 22 API calls 96586->96827 96589 cd6246 CloseHandle 96587->96589 96591 d475b2 96589->96591 96590 d474bf 96592 cd6350 22 API calls 96590->96592 96593 cd7510 53 API calls 96591->96593 96594 d474f2 96592->96594 96596 d475be 96593->96596 96595 d4754a 96594->96595 96828 d3d4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 96594->96828 96830 cdb567 39 API calls 96595->96830 96598 cd6246 CloseHandle 96596->96598 96601 d475c8 96598->96601 96600 d47502 96600->96595 96602 d47506 96600->96602 96818 cd5745 96601->96818 96603 cd9cb3 22 API calls 96602->96603 96605 d47513 96603->96605 96829 d3d2c1 26 API calls 96605->96829 96608 d476de GetLastError 96610 d476f7 96608->96610 96609 d475ea 96831 cd53de 27 API calls ISource 96609->96831 96611 cd6216 CloseHandle 96610->96611 96611->96623 96613 d475f8 96832 cd53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96613->96832 96614 d4751c 96614->96595 96616 d47645 96617 cefddb 22 API calls 96616->96617 96619 d47679 96617->96619 96618 d475ff 96618->96616 96833 d3ccff 96618->96833 96620 cda961 22 API calls 96619->96620 96622 d47686 96620->96622 96622->96623 96837 d3417d 22 API calls __fread_nolock 96622->96837 96623->96487 96626 cd6246 CloseHandle 96625->96626 96627 cd621e 96626->96627 96628 cd6246 CloseHandle 96627->96628 96629 cd622d ISource 96628->96629 96629->96487 96840 d498e3 96630->96840 96632 d483ea 96632->96487 96920 d57f59 96633->96920 96635 d5959b 96635->96487 96637 d570f5 96636->96637 96638 d570db 96636->96638 97004 d55689 96637->97004 97015 d4359c 82 API calls __wsopen_s 96638->97015 96642 cdec40 206 API calls 96643 d57164 96642->96643 96644 d570ed 96643->96644 96645 d571a6 96643->96645 96646 d571ff 96643->96646 96644->96453 96653 d40acc 22 API calls 96645->96653 96647 d57253 96646->96647 96648 d57205 96646->96648 96647->96644 96649 cd7510 53 API calls 96647->96649 97016 d41119 22 API calls 96648->97016 96651 d57265 96649->96651 96654 cdaec9 22 API calls 96651->96654 96652 d57228 97017 cda673 22 API calls 96652->97017 96656 d571de 96653->96656 96657 d57289 CharUpperBuffW 96654->96657 96659 ce1310 206 API calls 96656->96659 96660 d572a3 96657->96660 96658 d57230 97018 cdbf40 207 API calls 2 library calls 96658->97018 96659->96644 96661 d572f6 96660->96661 96662 d572aa 96660->96662 96664 cd7510 53 API calls 96661->96664 97011 d40acc 96662->97011 96665 d572fe 96664->96665 97019 cee300 23 API calls 96665->97019 96669 ce1310 206 API calls 96669->96644 96670 d57308 96670->96644 96671 cd7510 53 API calls 96670->96671 96672 d57323 96671->96672 97020 cda673 22 API calls 96672->97020 96674 d57333 97021 cdbf40 207 API calls 2 library calls 96674->97021 96676->96486 96677->96450 96678->96460 96679->96466 96680->96478 96681->96478 96682->96487 96683->96487 96684->96487 96685->96485 96686->96487 96688 cd7525 96687->96688 96689 cd7522 96687->96689 96690 cd752d 96688->96690 96691 cd755b 96688->96691 96710 cd6270 96689->96710 96750 cf51c6 26 API calls 96690->96750 96693 d150f6 96691->96693 96696 cd756d 96691->96696 96701 d1500f 96691->96701 96753 cf5183 26 API calls 96693->96753 96694 cd753d 96700 cefddb 22 API calls 96694->96700 96751 cefb21 51 API calls 96696->96751 96697 d1510e 96697->96697 96702 cd7547 96700->96702 96703 d15088 96701->96703 96705 cefe0b 22 API calls 96701->96705 96704 cd9cb3 22 API calls 96702->96704 96752 cefb21 51 API calls 96703->96752 96704->96689 96706 d15058 96705->96706 96707 cefddb 22 API calls 96706->96707 96708 d1507f 96707->96708 96709 cd9cb3 22 API calls 96708->96709 96709->96703 96711 cefe0b 22 API calls 96710->96711 96712 cd6295 96711->96712 96713 cefddb 22 API calls 96712->96713 96714 cd62a3 96713->96714 96714->96527 96716 cda961 22 API calls 96715->96716 96717 d392de 96716->96717 96718 cd6270 22 API calls 96717->96718 96719 d392f2 96718->96719 96726 d39314 96719->96726 96754 d38e54 96719->96754 96721 d38e54 41 API calls 96721->96726 96725 cd6350 22 API calls 96725->96726 96726->96721 96726->96725 96727 d393b3 96726->96727 96730 d39397 96726->96730 96762 cd6d25 22 API calls __fread_nolock 96726->96762 96728 cda8c7 22 API calls 96727->96728 96729 d393c2 96727->96729 96728->96729 96729->96555 96763 cd6d25 22 API calls __fread_nolock 96730->96763 96732 d393a7 96733 cd6350 22 API calls 96732->96733 96733->96727 96734->96534 96735->96543 96737 d14a51 96736->96737 96738 cd6362 96736->96738 96776 cd4a88 22 API calls __fread_nolock 96737->96776 96766 cd6373 96738->96766 96741 cd636e 96745 cd6d25 22 API calls __fread_nolock 96741->96745 96742 d14a5b 96743 d14a67 96742->96743 96744 cda8c7 22 API calls 96742->96744 96744->96743 96745->96551 96746->96553 96747->96537 96748->96541 96749->96553 96750->96694 96751->96694 96752->96693 96753->96697 96755 d38e74 _wcslen 96754->96755 96756 d38ea9 96755->96756 96757 d38f68 96755->96757 96758 d38f63 96755->96758 96756->96758 96764 cece60 41 API calls 96756->96764 96757->96758 96765 cece60 41 API calls 96757->96765 96758->96726 96761 cd6d25 22 API calls __fread_nolock 96758->96761 96761->96726 96762->96726 96763->96732 96764->96756 96765->96757 96768 cd6382 96766->96768 96772 cd63b6 __fread_nolock 96766->96772 96767 d14a82 96770 cefddb 22 API calls 96767->96770 96768->96767 96769 cd63a9 96768->96769 96768->96772 96777 cda587 96769->96777 96773 d14a91 96770->96773 96772->96741 96774 cefe0b 22 API calls 96773->96774 96775 d14ac5 __fread_nolock 96774->96775 96776->96742 96778 cda59d 96777->96778 96781 cda598 __fread_nolock 96777->96781 96779 cefe0b 22 API calls 96778->96779 96780 d1f80f 96778->96780 96779->96781 96781->96772 96783 cd6270 22 API calls 96782->96783 96805 cd9eb5 96783->96805 96784 cd9fd2 96785 cda4a1 22 API calls 96784->96785 96786 cd9fec 96785->96786 96786->96564 96789 d1f7c4 96816 d396e2 84 API calls __wsopen_s 96789->96816 96790 d1f699 96798 cefddb 22 API calls 96790->96798 96791 cda12c __fread_nolock 96791->96789 96801 cda405 96791->96801 96793 d1f7d2 96800 cda4a1 22 API calls 96793->96800 96794 cda4a1 22 API calls 96794->96805 96797 cda6c3 22 API calls 96797->96805 96799 d1f754 96798->96799 96803 cefe0b 22 API calls 96799->96803 96802 d1f7e8 96800->96802 96801->96786 96817 d396e2 84 API calls __wsopen_s 96801->96817 96802->96786 96803->96791 96805->96784 96805->96789 96805->96790 96805->96791 96805->96794 96805->96797 96805->96801 96806 cda587 22 API calls 96805->96806 96807 cdaec9 22 API calls 96805->96807 96811 cd4573 41 API calls _wcslen 96805->96811 96813 cd48c8 23 API calls 96805->96813 96814 cd49bd 22 API calls __fread_nolock 96805->96814 96815 cda673 22 API calls 96805->96815 96806->96805 96808 cda0db CharUpperBuffW 96807->96808 96812 cda673 22 API calls 96808->96812 96810->96568 96811->96805 96812->96805 96813->96805 96814->96805 96815->96805 96816->96793 96817->96786 96819 cd575c CreateFileW 96818->96819 96820 d14035 96818->96820 96821 cd577b 96819->96821 96820->96821 96822 d1403b CreateFileW 96820->96822 96821->96608 96821->96609 96822->96821 96823 d14063 96822->96823 96838 cd54c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96823->96838 96825 d1406e 96825->96821 96826->96571 96827->96590 96828->96600 96829->96614 96830->96573 96831->96613 96832->96618 96834 d3cd19 WriteFile 96833->96834 96835 d3cd0e 96833->96835 96834->96616 96839 d3cc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96835->96839 96837->96623 96838->96825 96839->96834 96841 d49902 96840->96841 96842 d499e8 96840->96842 96844 cefddb 22 API calls 96841->96844 96897 d49caa 39 API calls 96842->96897 96845 d49909 96844->96845 96846 cefe0b 22 API calls 96845->96846 96847 d4991a 96846->96847 96848 cd6246 CloseHandle 96847->96848 96850 d49925 96848->96850 96849 d49ac5 96891 d41e96 96849->96891 96853 cda961 22 API calls 96850->96853 96851 d499ca 96851->96632 96856 d4992d 96853->96856 96854 d49acc 96861 d3ccff 4 API calls 96854->96861 96855 d499a2 96855->96849 96855->96851 96857 d49a33 96855->96857 96858 cd6246 CloseHandle 96856->96858 96859 cd7510 53 API calls 96857->96859 96860 d49934 96858->96860 96867 d49a3a 96859->96867 96863 cd7510 53 API calls 96860->96863 96885 d49aa8 96861->96885 96862 d49abb 96908 d3cd57 30 API calls 96862->96908 96866 d49940 96863->96866 96864 d49a6e 96868 cd6270 22 API calls 96864->96868 96869 cd6246 CloseHandle 96866->96869 96867->96862 96867->96864 96871 d49a7e 96868->96871 96872 d4994a 96869->96872 96870 cd6246 CloseHandle 96873 d49b1e 96870->96873 96874 d49a8e 96871->96874 96877 cda8c7 22 API calls 96871->96877 96875 cd5745 5 API calls 96872->96875 96876 cd6216 CloseHandle 96873->96876 96898 cd33c6 96874->96898 96878 d49959 96875->96878 96876->96851 96877->96874 96880 d499c2 96878->96880 96881 d4995d 96878->96881 96883 cd6216 CloseHandle 96880->96883 96895 cd53de 27 API calls ISource 96881->96895 96883->96851 96885->96851 96885->96870 96887 d4996b 96896 cd53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96887->96896 96889 d49972 96889->96855 96890 d3ccff 4 API calls 96889->96890 96890->96855 96892 d41ea4 96891->96892 96893 d41e9f 96891->96893 96892->96854 96909 d40f67 24 API calls __fread_nolock 96893->96909 96895->96887 96896->96889 96897->96855 96899 cd33dd 96898->96899 96900 d130bb 96898->96900 96910 cd33ee 96899->96910 96902 cefddb 22 API calls 96900->96902 96904 d130c5 _wcslen 96902->96904 96903 cd33e8 96907 d3cd57 30 API calls 96903->96907 96905 cefe0b 22 API calls 96904->96905 96906 d130fe __fread_nolock 96905->96906 96907->96885 96908->96885 96909->96892 96911 cd33fe _wcslen 96910->96911 96912 d1311d 96911->96912 96913 cd3411 96911->96913 96914 cefddb 22 API calls 96912->96914 96915 cda587 22 API calls 96913->96915 96916 d13127 96914->96916 96917 cd341e __fread_nolock 96915->96917 96918 cefe0b 22 API calls 96916->96918 96917->96903 96919 d13157 __fread_nolock 96918->96919 96921 cd7510 53 API calls 96920->96921 96922 d57f90 96921->96922 96924 d57fd5 ISource 96922->96924 96958 d58cd3 96922->96958 96924->96635 96925 d5844f 96999 d58ee4 60 API calls 96925->96999 96928 d5845e 96930 d5828f 96928->96930 96931 d5846a 96928->96931 96929 d58049 96929->96924 96932 cd7510 53 API calls 96929->96932 96945 d58281 96929->96945 96990 d3417d 22 API calls __fread_nolock 96929->96990 96991 d5851d 42 API calls _strftime 96929->96991 96971 d57e86 96930->96971 96931->96924 96932->96929 96937 d582c8 96986 cefc70 96937->96986 96940 d58302 96993 cd63eb 22 API calls 96940->96993 96941 d582e8 96992 d4359c 82 API calls __wsopen_s 96941->96992 96944 d582f3 GetCurrentProcess TerminateProcess 96944->96940 96945->96925 96945->96930 96946 d58311 96994 cd6a50 22 API calls 96946->96994 96948 d5832a 96956 d58352 96948->96956 96995 ce04f0 22 API calls 96948->96995 96950 d584c5 96950->96924 96954 d584d9 FreeLibrary 96950->96954 96951 d58341 96996 d58b7b 75 API calls 96951->96996 96954->96924 96956->96950 96997 ce04f0 22 API calls 96956->96997 96998 cdaceb 23 API calls ISource 96956->96998 97000 d58b7b 75 API calls 96956->97000 96959 cdaec9 22 API calls 96958->96959 96960 d58cee CharLowerBuffW 96959->96960 96961 d38e54 41 API calls 96960->96961 96962 d58d0f 96961->96962 96964 cda961 22 API calls 96962->96964 96970 d58d48 _wcslen 96962->96970 96965 d58d2a 96964->96965 97001 cd6d25 22 API calls __fread_nolock 96965->97001 96967 d58d3e 96968 cd93b2 22 API calls 96967->96968 96968->96970 96969 d58e5e _wcslen 96969->96929 96970->96969 97002 d5851d 42 API calls _strftime 96970->97002 96972 d57ea1 96971->96972 96976 d57eec 96971->96976 96973 cefe0b 22 API calls 96972->96973 96974 d57ec3 96973->96974 96975 cefddb 22 API calls 96974->96975 96974->96976 96975->96974 96977 d59096 96976->96977 96978 d592ab ISource 96977->96978 96983 d590ba _strcat _wcslen 96977->96983 96978->96937 96979 cdb567 39 API calls 96979->96983 96980 cdb6b5 39 API calls 96980->96983 96981 cdb38f 39 API calls 96981->96983 96982 cd7510 53 API calls 96982->96983 96983->96978 96983->96979 96983->96980 96983->96981 96983->96982 96984 cfea0c 21 API calls ___std_exception_copy 96983->96984 97003 d3efae 24 API calls _wcslen 96983->97003 96984->96983 96987 cefc85 96986->96987 96988 cefd1d VirtualProtect 96987->96988 96989 cefceb 96987->96989 96988->96989 96989->96940 96989->96941 96990->96929 96991->96929 96992->96944 96993->96946 96994->96948 96995->96951 96996->96956 96997->96956 96998->96956 96999->96928 97000->96956 97001->96967 97002->96969 97003->96983 97005 d556f2 97004->97005 97006 d556a4 97004->97006 97005->96642 97007 cefe0b 22 API calls 97006->97007 97009 d556c6 97007->97009 97008 cefddb 22 API calls 97008->97009 97009->97005 97009->97008 97022 d40a59 22 API calls 97009->97022 97012 d40ada 97011->97012 97014 d40b13 97011->97014 97013 cefddb 22 API calls 97012->97013 97012->97014 97013->97014 97014->96669 97015->96644 97016->96652 97017->96658 97018->96644 97019->96670 97020->96674 97021->96644 97022->97009 97023 d08402 97028 d081be 97023->97028 97026 d0842a 97029 d081ef try_get_first_available_module 97028->97029 97036 d08338 97029->97036 97043 cf8e0b 40 API calls 2 library calls 97029->97043 97031 d083ee 97047 d027ec 26 API calls pre_c_initialization 97031->97047 97033 d08343 97033->97026 97040 d10984 97033->97040 97035 d0838c 97035->97036 97044 cf8e0b 40 API calls 2 library calls 97035->97044 97036->97033 97046 cff2d9 20 API calls __dosmaperr 97036->97046 97038 d083ab 97038->97036 97045 cf8e0b 40 API calls 2 library calls 97038->97045 97048 d10081 97040->97048 97042 d1099f 97042->97026 97043->97035 97044->97038 97045->97036 97046->97031 97047->97033 97051 d1008d CallCatchBlock 97048->97051 97049 d1009b 97106 cff2d9 20 API calls __dosmaperr 97049->97106 97051->97049 97053 d100d4 97051->97053 97052 d100a0 97107 d027ec 26 API calls pre_c_initialization 97052->97107 97059 d1065b 97053->97059 97058 d100aa __fread_nolock 97058->97042 97109 d1042f 97059->97109 97062 d106a6 97127 d05221 97062->97127 97063 d1068d 97141 cff2c6 20 API calls __dosmaperr 97063->97141 97066 d106ab 97067 d106b4 97066->97067 97068 d106cb 97066->97068 97143 cff2c6 20 API calls __dosmaperr 97067->97143 97140 d1039a CreateFileW 97068->97140 97072 d106b9 97144 cff2d9 20 API calls __dosmaperr 97072->97144 97074 d10781 GetFileType 97075 d1078c GetLastError 97074->97075 97081 d107d3 97074->97081 97147 cff2a3 20 API calls __dosmaperr 97075->97147 97076 d10692 97142 cff2d9 20 API calls __dosmaperr 97076->97142 97077 d10704 97077->97074 97078 d10756 GetLastError 97077->97078 97145 d1039a CreateFileW 97077->97145 97146 cff2a3 20 API calls __dosmaperr 97078->97146 97149 d0516a 21 API calls 2 library calls 97081->97149 97082 d1079a CloseHandle 97082->97076 97086 d107c3 97082->97086 97085 d10749 97085->97074 97085->97078 97148 cff2d9 20 API calls __dosmaperr 97086->97148 97087 d107f4 97089 d10840 97087->97089 97150 d105ab 72 API calls 3 library calls 97087->97150 97094 d1086d 97089->97094 97151 d1014d 72 API calls 4 library calls 97089->97151 97090 d107c8 97090->97076 97093 d10866 97093->97094 97095 d1087e 97093->97095 97096 d086ae __wsopen_s 29 API calls 97094->97096 97097 d100f8 97095->97097 97098 d108fc CloseHandle 97095->97098 97096->97097 97108 d10121 LeaveCriticalSection __wsopen_s 97097->97108 97152 d1039a CreateFileW 97098->97152 97100 d10927 97101 d10931 GetLastError 97100->97101 97102 d1095d 97100->97102 97153 cff2a3 20 API calls __dosmaperr 97101->97153 97102->97097 97104 d1093d 97154 d05333 21 API calls 2 library calls 97104->97154 97106->97052 97107->97058 97108->97058 97110 d10450 97109->97110 97111 d1046a 97109->97111 97110->97111 97162 cff2d9 20 API calls __dosmaperr 97110->97162 97155 d103bf 97111->97155 97114 d1045f 97163 d027ec 26 API calls pre_c_initialization 97114->97163 97116 d104a2 97117 d104d1 97116->97117 97164 cff2d9 20 API calls __dosmaperr 97116->97164 97125 d10524 97117->97125 97166 cfd70d 26 API calls 2 library calls 97117->97166 97120 d1051f 97122 d1059e 97120->97122 97120->97125 97121 d104c6 97165 d027ec 26 API calls pre_c_initialization 97121->97165 97167 d027fc 11 API calls _abort 97122->97167 97125->97062 97125->97063 97126 d105aa 97128 d0522d CallCatchBlock 97127->97128 97170 d02f5e EnterCriticalSection 97128->97170 97130 d05259 97174 d05000 97130->97174 97131 d05234 97131->97130 97136 d052c7 EnterCriticalSection 97131->97136 97138 d0527b 97131->97138 97134 d052a4 __fread_nolock 97134->97066 97137 d052d4 LeaveCriticalSection 97136->97137 97136->97138 97137->97131 97171 d0532a 97138->97171 97140->97077 97141->97076 97142->97097 97143->97072 97144->97076 97145->97085 97146->97076 97147->97082 97148->97090 97149->97087 97150->97089 97151->97093 97152->97100 97153->97104 97154->97102 97157 d103d7 97155->97157 97156 d103f2 97156->97116 97157->97156 97168 cff2d9 20 API calls __dosmaperr 97157->97168 97159 d10416 97169 d027ec 26 API calls pre_c_initialization 97159->97169 97161 d10421 97161->97116 97162->97114 97163->97111 97164->97121 97165->97117 97166->97120 97167->97126 97168->97159 97169->97161 97170->97131 97182 d02fa6 LeaveCriticalSection 97171->97182 97173 d05331 97173->97134 97175 d04c7d pre_c_initialization 20 API calls 97174->97175 97176 d05012 97175->97176 97180 d0501f 97176->97180 97183 d03405 11 API calls 2 library calls 97176->97183 97177 d029c8 _free 20 API calls 97179 d05071 97177->97179 97179->97138 97181 d05147 EnterCriticalSection 97179->97181 97180->97177 97181->97138 97182->97173 97183->97176 97184 cdf7bf 97185 cdfcb6 97184->97185 97186 cdf7d3 97184->97186 97221 cdaceb 23 API calls ISource 97185->97221 97188 cdfcc2 97186->97188 97190 cefddb 22 API calls 97186->97190 97222 cdaceb 23 API calls ISource 97188->97222 97191 cdf7e5 97190->97191 97191->97188 97192 cdf83e 97191->97192 97193 cdfd3d 97191->97193 97195 ce1310 207 API calls 97192->97195 97216 cded9d ISource 97192->97216 97223 d41155 22 API calls 97193->97223 97215 cdec76 ISource 97195->97215 97196 cdfef7 97202 cda8c7 22 API calls 97196->97202 97196->97216 97199 d24600 97205 cda8c7 22 API calls 97199->97205 97199->97216 97200 d24b0b 97225 d4359c 82 API calls __wsopen_s 97200->97225 97201 cda8c7 22 API calls 97201->97215 97202->97216 97205->97216 97207 cdfbe3 97209 d24bdc 97207->97209 97207->97216 97217 cdf3ae ISource 97207->97217 97208 cda961 22 API calls 97208->97215 97226 d4359c 82 API calls __wsopen_s 97209->97226 97210 cf00a3 29 API calls pre_c_initialization 97210->97215 97212 cf0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97212->97215 97213 d24beb 97227 d4359c 82 API calls __wsopen_s 97213->97227 97214 cefddb 22 API calls 97214->97215 97215->97196 97215->97199 97215->97200 97215->97201 97215->97207 97215->97208 97215->97210 97215->97212 97215->97213 97215->97214 97215->97216 97215->97217 97218 cf01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97215->97218 97219 ce01e0 207 API calls 2 library calls 97215->97219 97220 ce06a0 41 API calls ISource 97215->97220 97217->97216 97224 d4359c 82 API calls __wsopen_s 97217->97224 97218->97215 97219->97215 97220->97215 97221->97188 97222->97193 97223->97216 97224->97216 97225->97216 97226->97213 97227->97216 97228 ea3758 97243 ea13a8 97228->97243 97230 ea37e6 97246 ea3648 97230->97246 97232 ea380f CreateFileW 97234 ea385e 97232->97234 97235 ea3863 97232->97235 97235->97234 97236 ea387a VirtualAlloc 97235->97236 97236->97234 97237 ea3898 ReadFile 97236->97237 97237->97234 97238 ea38b3 97237->97238 97239 ea2648 13 API calls 97238->97239 97240 ea38e6 97239->97240 97241 ea3909 ExitProcess 97240->97241 97242 ea36d8 CreateProcessW 97240->97242 97241->97234 97242->97241 97249 ea4818 GetPEB 97243->97249 97245 ea1a33 97245->97230 97247 ea3651 Sleep 97246->97247 97248 ea365f 97247->97248 97250 ea4842 97249->97250 97250->97245 97251 d23a41 97255 d410c0 97251->97255 97253 d23a4c 97254 d410c0 53 API calls 97253->97254 97254->97253 97256 d410fa 97255->97256 97261 d410cd 97255->97261 97256->97253 97257 d410fc 97267 cefa11 53 API calls 97257->97267 97259 d41101 97260 cd7510 53 API calls 97259->97260 97262 d41108 97260->97262 97261->97256 97261->97257 97261->97259 97264 d410f4 97261->97264 97263 cd6350 22 API calls 97262->97263 97263->97256 97266 cdb270 39 API calls 97264->97266 97266->97256 97267->97259 97268 cf03fb 97269 cf0407 CallCatchBlock 97268->97269 97297 cefeb1 97269->97297 97271 cf040e 97272 cf0561 97271->97272 97275 cf0438 97271->97275 97324 cf083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97272->97324 97274 cf0568 97325 cf4e52 28 API calls _abort 97274->97325 97285 cf0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97275->97285 97308 d0247d 97275->97308 97277 cf056e 97326 cf4e04 28 API calls _abort 97277->97326 97281 cf0576 97282 cf0457 97288 cf04d8 97285->97288 97320 cf4e1a 38 API calls 3 library calls 97285->97320 97286 cf04de 97289 cf04f3 97286->97289 97316 cf0959 97288->97316 97321 cf0992 GetModuleHandleW 97289->97321 97291 cf04fa 97291->97274 97292 cf04fe 97291->97292 97293 cf0507 97292->97293 97322 cf4df5 28 API calls _abort 97292->97322 97323 cf0040 13 API calls 2 library calls 97293->97323 97296 cf050f 97296->97282 97298 cefeba 97297->97298 97327 cf0698 IsProcessorFeaturePresent 97298->97327 97300 cefec6 97328 cf2c94 10 API calls 3 library calls 97300->97328 97302 cefecb 97303 cefecf 97302->97303 97329 d02317 97302->97329 97303->97271 97306 cefee6 97306->97271 97310 d02494 97308->97310 97309 cf0a8c CatchGuardHandler 5 API calls 97311 cf0451 97309->97311 97310->97309 97311->97282 97312 d02421 97311->97312 97313 d02450 97312->97313 97314 cf0a8c CatchGuardHandler 5 API calls 97313->97314 97315 d02479 97314->97315 97315->97285 97380 cf2340 97316->97380 97319 cf097f 97319->97286 97320->97288 97321->97291 97322->97293 97323->97296 97324->97274 97325->97277 97326->97281 97327->97300 97328->97302 97333 d0d1f6 97329->97333 97332 cf2cbd 8 API calls 3 library calls 97332->97303 97334 d0d213 97333->97334 97337 d0d20f 97333->97337 97334->97337 97339 d04bfb 97334->97339 97336 cefed8 97336->97306 97336->97332 97351 cf0a8c 97337->97351 97340 d04c07 CallCatchBlock 97339->97340 97358 d02f5e EnterCriticalSection 97340->97358 97342 d04c0e 97359 d050af 97342->97359 97344 d04c1d 97350 d04c2c 97344->97350 97372 d04a8f 29 API calls 97344->97372 97347 d04c27 97373 d04b45 GetStdHandle GetFileType 97347->97373 97348 d04c3d __fread_nolock 97348->97334 97374 d04c48 LeaveCriticalSection _abort 97350->97374 97352 cf0a97 IsProcessorFeaturePresent 97351->97352 97353 cf0a95 97351->97353 97355 cf0c5d 97352->97355 97353->97336 97379 cf0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97355->97379 97357 cf0d40 97357->97336 97358->97342 97360 d050bb CallCatchBlock 97359->97360 97361 d050c8 97360->97361 97362 d050df 97360->97362 97376 cff2d9 20 API calls __dosmaperr 97361->97376 97375 d02f5e EnterCriticalSection 97362->97375 97365 d050cd 97377 d027ec 26 API calls pre_c_initialization 97365->97377 97366 d050eb 97370 d05000 __wsopen_s 21 API calls 97366->97370 97371 d05117 97366->97371 97368 d050d7 __fread_nolock 97368->97344 97370->97366 97378 d0513e LeaveCriticalSection _abort 97371->97378 97372->97347 97373->97350 97374->97348 97375->97366 97376->97365 97377->97368 97378->97368 97379->97357 97381 cf096c GetStartupInfoW 97380->97381 97381->97319 97382 d12ba5 97383 cd2b25 97382->97383 97384 d12baf 97382->97384 97410 cd2b83 7 API calls 97383->97410 97425 cd3a5a 97384->97425 97388 d12bb8 97390 cd9cb3 22 API calls 97388->97390 97392 d12bc6 97390->97392 97391 cd2b2f 97400 cd2b44 97391->97400 97414 cd3837 97391->97414 97393 d12bf5 97392->97393 97394 d12bce 97392->97394 97395 cd33c6 22 API calls 97393->97395 97397 cd33c6 22 API calls 97394->97397 97408 d12bf1 GetForegroundWindow ShellExecuteW 97395->97408 97398 d12bd9 97397->97398 97401 cd6350 22 API calls 97398->97401 97399 cd2b5f 97407 cd2b66 SetCurrentDirectoryW 97399->97407 97400->97399 97424 cd30f2 Shell_NotifyIconW ___scrt_fastfail 97400->97424 97404 d12be7 97401->97404 97406 cd33c6 22 API calls 97404->97406 97405 d12c26 97405->97399 97406->97408 97409 cd2b7a 97407->97409 97408->97405 97432 cd2cd4 7 API calls 97410->97432 97412 cd2b2a 97413 cd2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97412->97413 97413->97391 97415 cd3862 ___scrt_fastfail 97414->97415 97433 cd4212 97415->97433 97418 cd38e8 97420 d13386 Shell_NotifyIconW 97418->97420 97421 cd3906 Shell_NotifyIconW 97418->97421 97437 cd3923 97421->97437 97423 cd391c 97423->97400 97424->97399 97426 d11f50 __wsopen_s 97425->97426 97427 cd3a67 GetModuleFileNameW 97426->97427 97428 cd9cb3 22 API calls 97427->97428 97429 cd3a8d 97428->97429 97430 cd3aa2 23 API calls 97429->97430 97431 cd3a97 97430->97431 97431->97388 97432->97412 97434 d135a4 97433->97434 97435 cd38b7 97433->97435 97434->97435 97436 d135ad DestroyIcon 97434->97436 97435->97418 97459 d3c874 42 API calls _strftime 97435->97459 97436->97435 97438 cd393f 97437->97438 97439 cd3a13 97437->97439 97440 cd6270 22 API calls 97438->97440 97439->97423 97441 cd394d 97440->97441 97442 d13393 LoadStringW 97441->97442 97443 cd395a 97441->97443 97445 d133ad 97442->97445 97444 cd6b57 22 API calls 97443->97444 97446 cd396f 97444->97446 97449 cda8c7 22 API calls 97445->97449 97453 cd3994 ___scrt_fastfail 97445->97453 97447 cd397c 97446->97447 97448 d133c9 97446->97448 97447->97445 97450 cd3986 97447->97450 97451 cd6350 22 API calls 97448->97451 97449->97453 97452 cd6350 22 API calls 97450->97452 97454 d133d7 97451->97454 97452->97453 97456 cd39f9 Shell_NotifyIconW 97453->97456 97454->97453 97455 cd33c6 22 API calls 97454->97455 97457 d133f9 97455->97457 97456->97439 97458 cd33c6 22 API calls 97457->97458 97458->97453 97459->97418 97460 cd1098 97465 cd42de 97460->97465 97464 cd10a7 97466 cda961 22 API calls 97465->97466 97467 cd42f5 GetVersionExW 97466->97467 97468 cd6b57 22 API calls 97467->97468 97469 cd4342 97468->97469 97470 cd93b2 22 API calls 97469->97470 97472 cd4378 97469->97472 97471 cd436c 97470->97471 97474 cd37a0 22 API calls 97471->97474 97473 cd441b GetCurrentProcess IsWow64Process 97472->97473 97478 d137df 97472->97478 97475 cd4437 97473->97475 97474->97472 97476 cd444f LoadLibraryA 97475->97476 97477 d13824 GetSystemInfo 97475->97477 97479 cd449c GetSystemInfo 97476->97479 97480 cd4460 GetProcAddress 97476->97480 97481 cd4476 97479->97481 97480->97479 97482 cd4470 GetNativeSystemInfo 97480->97482 97483 cd447a FreeLibrary 97481->97483 97484 cd109d 97481->97484 97482->97481 97483->97484 97485 cf00a3 29 API calls __onexit 97484->97485 97485->97464 97486 cd105b 97491 cd344d 97486->97491 97488 cd106a 97522 cf00a3 29 API calls __onexit 97488->97522 97490 cd1074 97492 cd345d __wsopen_s 97491->97492 97493 cda961 22 API calls 97492->97493 97494 cd3513 97493->97494 97495 cd3a5a 24 API calls 97494->97495 97496 cd351c 97495->97496 97523 cd3357 97496->97523 97499 cd33c6 22 API calls 97500 cd3535 97499->97500 97501 cd515f 22 API calls 97500->97501 97502 cd3544 97501->97502 97503 cda961 22 API calls 97502->97503 97504 cd354d 97503->97504 97505 cda6c3 22 API calls 97504->97505 97506 cd3556 RegOpenKeyExW 97505->97506 97507 d13176 RegQueryValueExW 97506->97507 97512 cd3578 97506->97512 97508 d13193 97507->97508 97509 d1320c RegCloseKey 97507->97509 97510 cefe0b 22 API calls 97508->97510 97509->97512 97521 d1321e _wcslen 97509->97521 97511 d131ac 97510->97511 97513 cd5722 22 API calls 97511->97513 97512->97488 97514 d131b7 RegQueryValueExW 97513->97514 97516 d131d4 97514->97516 97518 d131ee ISource 97514->97518 97515 cd4c6d 22 API calls 97515->97521 97517 cd6b57 22 API calls 97516->97517 97517->97518 97518->97509 97519 cd9cb3 22 API calls 97519->97521 97520 cd515f 22 API calls 97520->97521 97521->97512 97521->97515 97521->97519 97521->97520 97522->97490 97524 d11f50 __wsopen_s 97523->97524 97525 cd3364 GetFullPathNameW 97524->97525 97526 cd3386 97525->97526 97527 cd6b57 22 API calls 97526->97527 97528 cd33a4 97527->97528 97528->97499 97529 cd2e37 97530 cda961 22 API calls 97529->97530 97531 cd2e4d 97530->97531 97608 cd4ae3 97531->97608 97533 cd2e6b 97534 cd3a5a 24 API calls 97533->97534 97535 cd2e7f 97534->97535 97536 cd9cb3 22 API calls 97535->97536 97537 cd2e8c 97536->97537 97538 cd4ecb 94 API calls 97537->97538 97539 cd2ea5 97538->97539 97540 cd2ead 97539->97540 97541 d12cb0 97539->97541 97545 cda8c7 22 API calls 97540->97545 97542 d42cf9 80 API calls 97541->97542 97543 d12cc3 97542->97543 97544 d12ccf 97543->97544 97546 cd4f39 68 API calls 97543->97546 97549 cd4f39 68 API calls 97544->97549 97547 cd2ec3 97545->97547 97546->97544 97622 cd6f88 22 API calls 97547->97622 97551 d12ce5 97549->97551 97550 cd2ecf 97552 cd9cb3 22 API calls 97550->97552 97638 cd3084 22 API calls 97551->97638 97553 cd2edc 97552->97553 97623 cda81b 41 API calls 97553->97623 97555 cd2eec 97558 cd9cb3 22 API calls 97555->97558 97557 d12d02 97639 cd3084 22 API calls 97557->97639 97560 cd2f12 97558->97560 97624 cda81b 41 API calls 97560->97624 97562 d12d1e 97563 cd3a5a 24 API calls 97562->97563 97564 d12d44 97563->97564 97640 cd3084 22 API calls 97564->97640 97566 cd2f21 97568 cda961 22 API calls 97566->97568 97567 d12d50 97569 cda8c7 22 API calls 97567->97569 97570 cd2f3f 97568->97570 97571 d12d5e 97569->97571 97625 cd3084 22 API calls 97570->97625 97641 cd3084 22 API calls 97571->97641 97573 cd2f4b 97626 cf4a28 40 API calls 3 library calls 97573->97626 97576 d12d6d 97580 cda8c7 22 API calls 97576->97580 97577 cd2f59 97577->97551 97578 cd2f63 97577->97578 97627 cf4a28 40 API calls 3 library calls 97578->97627 97581 d12d83 97580->97581 97642 cd3084 22 API calls 97581->97642 97582 cd2f6e 97582->97557 97584 cd2f78 97582->97584 97628 cf4a28 40 API calls 3 library calls 97584->97628 97585 d12d90 97587 cd2f83 97587->97562 97588 cd2f8d 97587->97588 97629 cf4a28 40 API calls 3 library calls 97588->97629 97590 cd2f98 97591 cd2fdc 97590->97591 97630 cd3084 22 API calls 97590->97630 97591->97576 97592 cd2fe8 97591->97592 97592->97585 97632 cd63eb 22 API calls 97592->97632 97594 cd2fbf 97596 cda8c7 22 API calls 97594->97596 97598 cd2fcd 97596->97598 97597 cd2ff8 97633 cd6a50 22 API calls 97597->97633 97631 cd3084 22 API calls 97598->97631 97601 cd3006 97634 cd70b0 23 API calls 97601->97634 97605 cd3021 97606 cd3065 97605->97606 97635 cd6f88 22 API calls 97605->97635 97636 cd70b0 23 API calls 97605->97636 97637 cd3084 22 API calls 97605->97637 97609 cd4af0 __wsopen_s 97608->97609 97610 cd6b57 22 API calls 97609->97610 97611 cd4b22 97609->97611 97610->97611 97620 cd4b58 97611->97620 97643 cd4c6d 97611->97643 97613 cd9cb3 22 API calls 97614 cd4c52 97613->97614 97616 cd515f 22 API calls 97614->97616 97615 cd9cb3 22 API calls 97615->97620 97619 cd4c5e 97616->97619 97617 cd4c6d 22 API calls 97617->97620 97618 cd515f 22 API calls 97618->97620 97619->97533 97620->97615 97620->97617 97620->97618 97621 cd4c29 97620->97621 97621->97613 97621->97619 97622->97550 97623->97555 97624->97566 97625->97573 97626->97577 97627->97582 97628->97587 97629->97590 97630->97594 97631->97591 97632->97597 97633->97601 97634->97605 97635->97605 97636->97605 97637->97605 97638->97557 97639->97562 97640->97567 97641->97576 97642->97585 97644 cdaec9 22 API calls 97643->97644 97645 cd4c78 97644->97645 97645->97611 97646 cd3156 97649 cd3170 97646->97649 97650 cd3187 97649->97650 97651 cd31e9 97650->97651 97652 cd318c 97650->97652 97653 cd31eb 97650->97653 97654 cd31d0 DefWindowProcW 97651->97654 97657 cd3199 97652->97657 97658 cd3265 PostQuitMessage 97652->97658 97655 d12dfb 97653->97655 97656 cd31f1 97653->97656 97659 cd316a 97654->97659 97698 cd18e2 10 API calls 97655->97698 97660 cd321d SetTimer RegisterWindowMessageW 97656->97660 97661 cd31f8 97656->97661 97663 cd31a4 97657->97663 97664 d12e7c 97657->97664 97658->97659 97660->97659 97668 cd3246 CreatePopupMenu 97660->97668 97665 cd3201 KillTimer 97661->97665 97666 d12d9c 97661->97666 97669 cd31ae 97663->97669 97670 d12e68 97663->97670 97703 d3bf30 34 API calls ___scrt_fastfail 97664->97703 97694 cd30f2 Shell_NotifyIconW ___scrt_fastfail 97665->97694 97672 d12da1 97666->97672 97673 d12dd7 MoveWindow 97666->97673 97667 d12e1c 97699 cee499 42 API calls 97667->97699 97668->97659 97677 cd31b9 97669->97677 97678 d12e4d 97669->97678 97702 d3c161 27 API calls ___scrt_fastfail 97670->97702 97680 d12da7 97672->97680 97681 d12dc6 SetFocus 97672->97681 97673->97659 97684 cd31c4 97677->97684 97685 cd3253 97677->97685 97678->97654 97701 d30ad7 22 API calls 97678->97701 97679 d12e8e 97679->97654 97679->97659 97680->97684 97686 d12db0 97680->97686 97681->97659 97682 cd3214 97695 cd3c50 DeleteObject DestroyWindow 97682->97695 97683 cd3263 97683->97659 97684->97654 97700 cd30f2 Shell_NotifyIconW ___scrt_fastfail 97684->97700 97696 cd326f 44 API calls ___scrt_fastfail 97685->97696 97697 cd18e2 10 API calls 97686->97697 97692 d12e41 97693 cd3837 49 API calls 97692->97693 97693->97651 97694->97682 97695->97659 97696->97683 97697->97659 97698->97667 97699->97684 97700->97692 97701->97651 97702->97683 97703->97679 97704 cd1033 97709 cd4c91 97704->97709 97708 cd1042 97710 cda961 22 API calls 97709->97710 97711 cd4cff 97710->97711 97717 cd3af0 97711->97717 97713 cd4d9c 97715 cd1038 97713->97715 97720 cd51f7 22 API calls __fread_nolock 97713->97720 97716 cf00a3 29 API calls __onexit 97715->97716 97716->97708 97721 cd3b1c 97717->97721 97720->97713 97722 cd3b0f 97721->97722 97723 cd3b29 97721->97723 97722->97713 97723->97722 97724 cd3b30 RegOpenKeyExW 97723->97724 97724->97722 97725 cd3b4a RegQueryValueExW 97724->97725 97726 cd3b6b 97725->97726 97727 cd3b80 RegCloseKey 97725->97727 97726->97727 97727->97722

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 234 cd42de-cd434d call cda961 GetVersionExW call cd6b57 239 d13617-d1362a 234->239 240 cd4353 234->240 241 d1362b-d1362f 239->241 242 cd4355-cd4357 240->242 243 d13631 241->243 244 d13632-d1363e 241->244 245 cd435d-cd43bc call cd93b2 call cd37a0 242->245 246 d13656 242->246 243->244 244->241 247 d13640-d13642 244->247 263 d137df-d137e6 245->263 264 cd43c2-cd43c4 245->264 250 d1365d-d13660 246->250 247->242 249 d13648-d1364f 247->249 249->239 252 d13651 249->252 253 cd441b-cd4435 GetCurrentProcess IsWow64Process 250->253 254 d13666-d136a8 250->254 252->246 256 cd4494-cd449a 253->256 257 cd4437 253->257 254->253 258 d136ae-d136b1 254->258 260 cd443d-cd4449 256->260 257->260 261 d136b3-d136bd 258->261 262 d136db-d136e5 258->262 270 cd444f-cd445e LoadLibraryA 260->270 271 d13824-d13828 GetSystemInfo 260->271 272 d136ca-d136d6 261->272 273 d136bf-d136c5 261->273 266 d136e7-d136f3 262->266 267 d136f8-d13702 262->267 268 d13806-d13809 263->268 269 d137e8 263->269 264->250 265 cd43ca-cd43dd 264->265 274 d13726-d1372f 265->274 275 cd43e3-cd43e5 265->275 266->253 277 d13715-d13721 267->277 278 d13704-d13710 267->278 279 d137f4-d137fc 268->279 280 d1380b-d1381a 268->280 276 d137ee 269->276 281 cd449c-cd44a6 GetSystemInfo 270->281 282 cd4460-cd446e GetProcAddress 270->282 272->253 273->253 286 d13731-d13737 274->286 287 d1373c-d13748 274->287 284 cd43eb-cd43ee 275->284 285 d1374d-d13762 275->285 276->279 277->253 278->253 279->268 280->276 288 d1381c-d13822 280->288 283 cd4476-cd4478 281->283 282->281 289 cd4470-cd4474 GetNativeSystemInfo 282->289 294 cd447a-cd447b FreeLibrary 283->294 295 cd4481-cd4493 283->295 290 d13791-d13794 284->290 291 cd43f4-cd440f 284->291 292 d13764-d1376a 285->292 293 d1376f-d1377b 285->293 286->253 287->253 288->279 289->283 290->253 298 d1379a-d137c1 290->298 296 d13780-d1378c 291->296 297 cd4415 291->297 292->253 293->253 294->295 296->253 297->253 299 d137c3-d137c9 298->299 300 d137ce-d137da 298->300 299->253 300->253
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 00CD430D
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              • GetCurrentProcess.KERNEL32(?,00D6CB64,00000000,?,?), ref: 00CD4422
                                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00CD4429
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00CD4454
                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00CD4466
                                              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00CD4474
                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 00CD447B
                                              • GetSystemInfo.KERNEL32(?,?,?), ref: 00CD44A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                              • API String ID: 3290436268-3101561225
                                              • Opcode ID: 80dfec20b4fa81460402498e52e4fcf13c61e3c63d5ce1cbb1751e4ed85236c4
                                              • Instruction ID: b46fd253a458dac59ee88dbaa600d5c2b2a5a1938ccf76dd689de014c70c9931
                                              • Opcode Fuzzy Hash: 80dfec20b4fa81460402498e52e4fcf13c61e3c63d5ce1cbb1751e4ed85236c4
                                              • Instruction Fuzzy Hash: 36A19E6E91A3C0EFCF15CF6A78411E97FA46B27340F08589AD281D7B62D6714A8CDB31

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 553 cd42a2-cd42ba CreateStreamOnHGlobal 554 cd42bc-cd42d3 FindResourceExW 553->554 555 cd42da-cd42dd 553->555 556 cd42d9 554->556 557 d135ba-d135c9 LoadResource 554->557 556->555 557->556 558 d135cf-d135dd SizeofResource 557->558 558->556 559 d135e3-d135ee LockResource 558->559 559->556 560 d135f4-d13612 559->560 560->556
                                              APIs
                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00CD50AA,?,?,00000000,00000000), ref: 00CD42B2
                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00CD50AA,?,?,00000000,00000000), ref: 00CD42C9
                                              • LoadResource.KERNEL32(?,00000000,?,?,00CD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00CD4F20), ref: 00D135BE
                                              • SizeofResource.KERNEL32(?,00000000,?,?,00CD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00CD4F20), ref: 00D135D3
                                              • LockResource.KERNEL32(00CD50AA,?,?,00CD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00CD4F20,?), ref: 00D135E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                              • String ID: SCRIPT
                                              • API String ID: 3051347437-3967369404
                                              • Opcode ID: 3f3f850b65794bc9adac9bb646dc32c0445e0685025bcd299cc62555bda5efcc
                                              • Instruction ID: 43674b9a6536694d5425963a8cf310d3c5e6792b40dcb4ac61918330fc9b1e96
                                              • Opcode Fuzzy Hash: 3f3f850b65794bc9adac9bb646dc32c0445e0685025bcd299cc62555bda5efcc
                                              • Instruction Fuzzy Hash: 7B118E70200701BFE7258B65DC48F677BBAEBC9B51F14416AFA56DA350DBB1DC008670

                                              Control-flow Graph

                                              APIs
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00CD2B6B
                                                • Part of subcall function 00CD3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00DA1418,?,00CD2E7F,?,?,?,00000000), ref: 00CD3A78
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00D92224), ref: 00D12C10
                                              • ShellExecuteW.SHELL32(00000000,?,?,00D92224), ref: 00D12C17
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                              • String ID: runas
                                              • API String ID: 448630720-4000483414
                                              • Opcode ID: eba841277abf6f36fc6ba3ee6a46acd5d30f7582163e577f7ab91d33226537e3
                                              • Instruction ID: 51f43e92b72352988b9d6ca8d3d51e7ffcb9a6cfecbeb313c67c7377ceabd0df
                                              • Opcode Fuzzy Hash: eba841277abf6f36fc6ba3ee6a46acd5d30f7582163e577f7ab91d33226537e3
                                              • Instruction Fuzzy Hash: E911B4352083416AC704FF64EC519BEBBA49BA5740F44142FF292523A2CFB19A4AE733
                                              APIs
                                              • GetInputState.USER32 ref: 00CDD807
                                              • timeGetTime.WINMM ref: 00CDDA07
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CDDB28
                                              • TranslateMessage.USER32(?), ref: 00CDDB7B
                                              • DispatchMessageW.USER32(?), ref: 00CDDB89
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CDDB9F
                                              • Sleep.KERNEL32(0000000A), ref: 00CDDBB1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                              • String ID:
                                              • API String ID: 2189390790-0
                                              • Opcode ID: 1c64a15a280db065838261dfea89072d55d344ac892e9a09266ae9ffc10604e4
                                              • Instruction ID: f0e397fbff4a9bcd5bf01abf27a02b195c0f73341613cb25b99d15fcf698fc32
                                              • Opcode Fuzzy Hash: 1c64a15a280db065838261dfea89072d55d344ac892e9a09266ae9ffc10604e4
                                              • Instruction Fuzzy Hash: CC42F130A04341EFD724CF25D894B7AB7E0BF56308F18855AF6A6873A1C771E944DBA2

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00CD2D07
                                              • RegisterClassExW.USER32(00000030), ref: 00CD2D31
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CD2D42
                                              • InitCommonControlsEx.COMCTL32(?), ref: 00CD2D5F
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CD2D6F
                                              • LoadIconW.USER32(000000A9), ref: 00CD2D85
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CD2D94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: 495c6745e9188707336e68dd342e26bd86b1ef910de477db667df667fd89f7f0
                                              • Instruction ID: 0c1e87d98889181d4ddf1afc40619cb0016061dffb9863dfd72cc51ccf17cbe2
                                              • Opcode Fuzzy Hash: 495c6745e9188707336e68dd342e26bd86b1ef910de477db667df667fd89f7f0
                                              • Instruction Fuzzy Hash: E921E2B9911318AFDB00DFA4E849BAEBBB4FB09701F10511AE561E63A0D7B15544CFB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 302 d1065b-d1068b call d1042f 305 d106a6-d106b2 call d05221 302->305 306 d1068d-d10698 call cff2c6 302->306 311 d106b4-d106c9 call cff2c6 call cff2d9 305->311 312 d106cb-d10714 call d1039a 305->312 313 d1069a-d106a1 call cff2d9 306->313 311->313 322 d10781-d1078a GetFileType 312->322 323 d10716-d1071f 312->323 320 d1097d-d10983 313->320 324 d107d3-d107d6 322->324 325 d1078c-d107bd GetLastError call cff2a3 CloseHandle 322->325 327 d10721-d10725 323->327 328 d10756-d1077c GetLastError call cff2a3 323->328 331 d107d8-d107dd 324->331 332 d107df-d107e5 324->332 325->313 341 d107c3-d107ce call cff2d9 325->341 327->328 333 d10727-d10754 call d1039a 327->333 328->313 336 d107e9-d10837 call d0516a 331->336 332->336 337 d107e7 332->337 333->322 333->328 344 d10847-d1086b call d1014d 336->344 345 d10839-d10845 call d105ab 336->345 337->336 341->313 352 d1086d 344->352 353 d1087e-d108c1 344->353 345->344 351 d1086f-d10879 call d086ae 345->351 351->320 352->351 355 d108c3-d108c7 353->355 356 d108e2-d108f0 353->356 355->356 360 d108c9-d108dd 355->360 357 d108f6-d108fa 356->357 358 d1097b 356->358 357->358 361 d108fc-d1092f CloseHandle call d1039a 357->361 358->320 360->356 364 d10931-d1095d GetLastError call cff2a3 call d05333 361->364 365 d10963-d10977 361->365 364->365 365->358
                                              APIs
                                                • Part of subcall function 00D1039A: CreateFileW.KERNELBASE(00000000,00000000,?,00D10704,?,?,00000000,?,00D10704,00000000,0000000C), ref: 00D103B7
                                              • GetLastError.KERNEL32 ref: 00D1076F
                                              • __dosmaperr.LIBCMT ref: 00D10776
                                              • GetFileType.KERNELBASE(00000000), ref: 00D10782
                                              • GetLastError.KERNEL32 ref: 00D1078C
                                              • __dosmaperr.LIBCMT ref: 00D10795
                                              • CloseHandle.KERNEL32(00000000), ref: 00D107B5
                                              • CloseHandle.KERNEL32(?), ref: 00D108FF
                                              • GetLastError.KERNEL32 ref: 00D10931
                                              • __dosmaperr.LIBCMT ref: 00D10938
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                              • String ID: H
                                              • API String ID: 4237864984-2852464175
                                              • Opcode ID: b341944b5a245b2ec50eb7ad9b71712c9c7de9dddbd101e5441e43e200e1eb40
                                              • Instruction ID: fcd834f4982a4a8328e391fd9d768fcaa1b6c2b298014de1300d9dba7becf5b8
                                              • Opcode Fuzzy Hash: b341944b5a245b2ec50eb7ad9b71712c9c7de9dddbd101e5441e43e200e1eb40
                                              • Instruction Fuzzy Hash: D2A1F532A142089FDF19AF68E8517ED3FA0EF06320F180159F815EB3D1DA719892CBB1

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00CD3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00DA1418,?,00CD2E7F,?,?,?,00000000), ref: 00CD3A78
                                                • Part of subcall function 00CD3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00CD3379
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00CD356A
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00D1318D
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00D131CE
                                              • RegCloseKey.ADVAPI32(?), ref: 00D13210
                                              • _wcslen.LIBCMT ref: 00D13277
                                              • _wcslen.LIBCMT ref: 00D13286
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                              • API String ID: 98802146-2727554177
                                              • Opcode ID: 8810874ce41239a90479043bf3b4d37ce6da91ab1fc16e22a9d949c49bc9ae55
                                              • Instruction ID: 62f012326215f97e55fbb1da29cd854e4688971f347dcbfa31ec366b5de1b38f
                                              • Opcode Fuzzy Hash: 8810874ce41239a90479043bf3b4d37ce6da91ab1fc16e22a9d949c49bc9ae55
                                              • Instruction Fuzzy Hash: B7716071514300AEC714EF6AEC819ABB7E8FF96740F40482EF545C32A0EB759A48DB72

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00CD2B8E
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00CD2B9D
                                              • LoadIconW.USER32(00000063), ref: 00CD2BB3
                                              • LoadIconW.USER32(000000A4), ref: 00CD2BC5
                                              • LoadIconW.USER32(000000A2), ref: 00CD2BD7
                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00CD2BEF
                                              • RegisterClassExW.USER32(?), ref: 00CD2C40
                                                • Part of subcall function 00CD2CD4: GetSysColorBrush.USER32(0000000F), ref: 00CD2D07
                                                • Part of subcall function 00CD2CD4: RegisterClassExW.USER32(00000030), ref: 00CD2D31
                                                • Part of subcall function 00CD2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CD2D42
                                                • Part of subcall function 00CD2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00CD2D5F
                                                • Part of subcall function 00CD2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CD2D6F
                                                • Part of subcall function 00CD2CD4: LoadIconW.USER32(000000A9), ref: 00CD2D85
                                                • Part of subcall function 00CD2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CD2D94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 423443420-4155596026
                                              • Opcode ID: 80fdec30061852d443b673ebcfaed090e93f6500feefe22b70f4039f76f73b03
                                              • Instruction ID: 323d27238ad513287e26dca782e086224bbc1595330b4412f3fd505d74215bd8
                                              • Opcode Fuzzy Hash: 80fdec30061852d443b673ebcfaed090e93f6500feefe22b70f4039f76f73b03
                                              • Instruction Fuzzy Hash: 3F210778E10328AFDF109FA5EC55AA97FF4FB49B50F10001AE604E67A0D7B11540DFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 443 cd3170-cd3185 444 cd31e5-cd31e7 443->444 445 cd3187-cd318a 443->445 444->445 446 cd31e9 444->446 447 cd318c-cd3193 445->447 448 cd31eb 445->448 449 cd31d0-cd31d8 DefWindowProcW 446->449 452 cd3199-cd319e 447->452 453 cd3265-cd326d PostQuitMessage 447->453 450 d12dfb-d12e23 call cd18e2 call cee499 448->450 451 cd31f1-cd31f6 448->451 454 cd31de-cd31e4 449->454 489 d12e28-d12e2f 450->489 456 cd321d-cd3244 SetTimer RegisterWindowMessageW 451->456 457 cd31f8-cd31fb 451->457 459 cd31a4-cd31a8 452->459 460 d12e7c-d12e90 call d3bf30 452->460 455 cd3219-cd321b 453->455 455->454 456->455 464 cd3246-cd3251 CreatePopupMenu 456->464 461 cd3201-cd3214 KillTimer call cd30f2 call cd3c50 457->461 462 d12d9c-d12d9f 457->462 465 cd31ae-cd31b3 459->465 466 d12e68-d12e77 call d3c161 459->466 460->455 484 d12e96 460->484 461->455 468 d12da1-d12da5 462->468 469 d12dd7-d12df6 MoveWindow 462->469 464->455 473 cd31b9-cd31be 465->473 474 d12e4d-d12e54 465->474 466->455 476 d12da7-d12daa 468->476 477 d12dc6-d12dd2 SetFocus 468->477 469->455 482 cd31c4-cd31ca 473->482 483 cd3253-cd3263 call cd326f 473->483 474->449 478 d12e5a-d12e63 call d30ad7 474->478 476->482 485 d12db0-d12dc1 call cd18e2 476->485 477->455 478->449 482->449 482->489 483->455 484->449 485->455 489->449 490 d12e35-d12e48 call cd30f2 call cd3837 489->490 490->449
                                              APIs
                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00CD316A,?,?), ref: 00CD31D8
                                              • KillTimer.USER32(?,00000001,?,?,?,?,?,00CD316A,?,?), ref: 00CD3204
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00CD3227
                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00CD316A,?,?), ref: 00CD3232
                                              • CreatePopupMenu.USER32 ref: 00CD3246
                                              • PostQuitMessage.USER32(00000000), ref: 00CD3267
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                              • String ID: TaskbarCreated
                                              • API String ID: 129472671-2362178303
                                              • Opcode ID: 9e98add3ee450b437a3ae6c8021477079860f87d0cab34b5a4fe5eb25fd550bf
                                              • Instruction ID: 10280b4c0327eae82c1d20bb3e4e4e7697e218cc60a45721965f375331e6334e
                                              • Opcode Fuzzy Hash: 9e98add3ee450b437a3ae6c8021477079860f87d0cab34b5a4fe5eb25fd550bf
                                              • Instruction Fuzzy Hash: FE411939610385ABDF155F78AD09BBE3A19E706340F080127F761C53A2CBA1DB40A7B3

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 499 ea3968-ea3a16 call ea13a8 502 ea3a1d-ea3a43 call ea4878 CreateFileW 499->502 505 ea3a4a-ea3a5a 502->505 506 ea3a45 502->506 513 ea3a5c 505->513 514 ea3a61-ea3a7b VirtualAlloc 505->514 507 ea3b95-ea3b99 506->507 508 ea3bdb-ea3bde 507->508 509 ea3b9b-ea3b9f 507->509 515 ea3be1-ea3be8 508->515 511 ea3bab-ea3baf 509->511 512 ea3ba1-ea3ba4 509->512 516 ea3bbf-ea3bc3 511->516 517 ea3bb1-ea3bbb 511->517 512->511 513->507 518 ea3a7d 514->518 519 ea3a82-ea3a99 ReadFile 514->519 520 ea3bea-ea3bf5 515->520 521 ea3c3d-ea3c52 515->521 524 ea3bd3 516->524 525 ea3bc5-ea3bcf 516->525 517->516 518->507 526 ea3a9b 519->526 527 ea3aa0-ea3ae0 VirtualAlloc 519->527 528 ea3bf9-ea3c05 520->528 529 ea3bf7 520->529 522 ea3c62-ea3c6a 521->522 523 ea3c54-ea3c5f VirtualFree 521->523 523->522 524->508 525->524 526->507 532 ea3ae2 527->532 533 ea3ae7-ea3b02 call ea4ac8 527->533 530 ea3c19-ea3c25 528->530 531 ea3c07-ea3c17 528->531 529->521 536 ea3c32-ea3c38 530->536 537 ea3c27-ea3c30 530->537 535 ea3c3b 531->535 532->507 539 ea3b0d-ea3b17 533->539 535->515 536->535 537->535 540 ea3b4a-ea3b5e call ea48d8 539->540 541 ea3b19-ea3b48 call ea4ac8 539->541 547 ea3b62-ea3b66 540->547 548 ea3b60 540->548 541->539 549 ea3b68-ea3b6c CloseHandle 547->549 550 ea3b72-ea3b76 547->550 548->507 549->550 551 ea3b78-ea3b83 VirtualFree 550->551 552 ea3b86-ea3b8f 550->552 551->552 552->502 552->507
                                              APIs
                                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00EA3A39
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00EA3C5F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateFileFreeVirtual
                                              • String ID: SB
                                              • API String ID: 204039940-4240390251
                                              • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                              • Instruction ID: 3f54581787c9a716166c106989bfbae0d9cafb7ae8229480f64c9d05e77aaa20
                                              • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                              • Instruction Fuzzy Hash: 0EA10870E00208EBDB14CFA4C899BEEBBB6BF49304F209559E515BB280D775AE41CB64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 563 cd2c63-cd2cd3 CreateWindowExW * 2 ShowWindow * 2
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00CD2C91
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00CD2CB2
                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00CD1CAD,?), ref: 00CD2CC6
                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00CD1CAD,?), ref: 00CD2CCF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: 5d99a29d1c6c4507ff4dcad067054ff295f07af6cd24ead74a778e32d1ac7748
                                              • Instruction ID: 59d7c05b52c0ef8c2b090d420374e2daefb1c4a8b3a4ecd5e22fd5384b2aa7e8
                                              • Opcode Fuzzy Hash: 5d99a29d1c6c4507ff4dcad067054ff295f07af6cd24ead74a778e32d1ac7748
                                              • Instruction Fuzzy Hash: 99F0DA7A5503A07EEB315B57AC08E772EBDD7C7F61F00105AF900E27A0C6A51850DEB0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 678 ea3758-ea385c call ea13a8 call ea3648 CreateFileW 685 ea385e 678->685 686 ea3863-ea3873 678->686 687 ea3913-ea3918 685->687 689 ea387a-ea3894 VirtualAlloc 686->689 690 ea3875 686->690 691 ea3898-ea38af ReadFile 689->691 692 ea3896 689->692 690->687 693 ea38b3-ea38ed call ea3688 call ea2648 691->693 694 ea38b1 691->694 692->687 699 ea3909-ea3911 ExitProcess 693->699 700 ea38ef-ea3904 call ea36d8 693->700 694->687 699->687 700->699
                                              APIs
                                                • Part of subcall function 00EA3648: Sleep.KERNELBASE(000001F4), ref: 00EA3659
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00EA3852
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateFileSleep
                                              • String ID: OTKRRMQ112Q1B
                                              • API String ID: 2694422964-3008815587
                                              • Opcode ID: 45c13a932a3cf02211c12f1a2088a43bd8227138f0b5d553604c54b85d829788
                                              • Instruction ID: 58eddd16921751a2c509ea214a644e1ce2a3005728104cbc0a3bbabd3f35b7b0
                                              • Opcode Fuzzy Hash: 45c13a932a3cf02211c12f1a2088a43bd8227138f0b5d553604c54b85d829788
                                              • Instruction Fuzzy Hash: 0A518F30D00249EAEF10DBB4C849BEEBBB9AF49300F104199B609BB2C1D7B91B44CB65

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00CD1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00CD1BF4
                                                • Part of subcall function 00CD1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00CD1BFC
                                                • Part of subcall function 00CD1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00CD1C07
                                                • Part of subcall function 00CD1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00CD1C12
                                                • Part of subcall function 00CD1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00CD1C1A
                                                • Part of subcall function 00CD1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00CD1C22
                                                • Part of subcall function 00CD1B4A: RegisterWindowMessageW.USER32(00000004,?,00CD12C4), ref: 00CD1BA2
                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00CD136A
                                              • OleInitialize.OLE32 ref: 00CD1388
                                              • CloseHandle.KERNEL32(00000000,00000000), ref: 00D124AB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                              • String ID: j
                                              • API String ID: 1986988660-1273469241
                                              • Opcode ID: 5f999be50349325a3e35d51de800b8ad60178298fbb04912f5f64ab1ee7d4afb
                                              • Instruction ID: 564c94fec9cee896d68e543f80fc3b82866006991f4a3c7b0b92b7e2d19d5700
                                              • Opcode Fuzzy Hash: 5f999be50349325a3e35d51de800b8ad60178298fbb04912f5f64ab1ee7d4afb
                                              • Instruction Fuzzy Hash: 9071A7BCD153509FC388EF7AA8456653AF0BB8B384F58862AD54AC73A1EB748440DF71

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 781 cd3b1c-cd3b27 782 cd3b99-cd3b9b 781->782 783 cd3b29-cd3b2e 781->783 785 cd3b8c-cd3b8f 782->785 783->782 784 cd3b30-cd3b48 RegOpenKeyExW 783->784 784->782 786 cd3b4a-cd3b69 RegQueryValueExW 784->786 787 cd3b6b-cd3b76 786->787 788 cd3b80-cd3b8b RegCloseKey 786->788 789 cd3b78-cd3b7a 787->789 790 cd3b90-cd3b97 787->790 788->785 791 cd3b7e 789->791 790->791 791->788
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00CD3B0F,SwapMouseButtons,00000004,?), ref: 00CD3B40
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00CD3B0F,SwapMouseButtons,00000004,?), ref: 00CD3B61
                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00CD3B0F,SwapMouseButtons,00000004,?), ref: 00CD3B83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 3677997916-824357125
                                              • Opcode ID: 486e7ce998ffaea0973adaf3da5329ab2295c6ca8397798a7bec10aa448c3237
                                              • Instruction ID: 38df4306f7ba5be89fa7b001ccc46e835548c59c101955c06042827672da9c56
                                              • Opcode Fuzzy Hash: 486e7ce998ffaea0973adaf3da5329ab2295c6ca8397798a7bec10aa448c3237
                                              • Instruction Fuzzy Hash: 8A1127B5620248FFDB20CFA5DC84AAEBBB8EF04744B10846BE945D7210E3719F409BB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 792 ea2648-ea26e8 call ea4aa8 * 3 799 ea26ea-ea26f4 792->799 800 ea26ff 792->800 799->800 801 ea26f6-ea26fd 799->801 802 ea2706-ea270f 800->802 801->802 803 ea2716-ea2dc8 802->803 804 ea2dca-ea2dce 803->804 805 ea2ddb-ea2e08 803->805 806 ea2dd0-ea2dd4 804->806 807 ea2e14-ea2e41 804->807 822 ea2e0a-ea2e0d 805->822 823 ea2e12 805->823 808 ea2e4d-ea2e7a CreateProcessW 806->808 809 ea2dd6 806->809 826 ea2e4b 807->826 827 ea2e43-ea2e46 807->827 812 ea2e84-ea2e9e Wow64GetThreadContext 808->812 818 ea2e7c-ea2e7f 808->818 809->812 814 ea2ea0 812->814 815 ea2ea5-ea2ec0 ReadProcessMemory 812->815 819 ea31b2-ea31b6 814->819 820 ea2ec2 815->820 821 ea2ec7-ea2ed0 815->821 830 ea3209-ea320b 818->830 828 ea31b8-ea31bc 819->828 829 ea3207 819->829 820->819 824 ea2ef9-ea2f18 call ea4128 821->824 825 ea2ed2-ea2ee1 821->825 822->830 823->812 840 ea2f1a 824->840 841 ea2f1f-ea2f3b call ea4268 824->841 825->824 831 ea2ee3-ea2ef2 call ea4078 825->831 826->812 827->830 833 ea31be-ea31ca TerminateProcess 828->833 834 ea31d1-ea31d5 828->834 829->830 831->824 844 ea2ef4 831->844 833->834 837 ea31e1-ea31e5 834->837 838 ea31d7-ea31da 834->838 842 ea31f1-ea31f5 837->842 843 ea31e7-ea31ea 837->843 838->837 840->819 849 ea2f40-ea2f42 841->849 846 ea3202-ea3205 842->846 847 ea31f7-ea31fd call ea4078 842->847 843->842 844->819 846->830 847->846 850 ea2f8c-ea2fad call ea4268 849->850 851 ea2f44-ea2f4b 849->851 857 ea2faf 850->857 858 ea2fb4-ea2fd2 call ea4ac8 850->858 853 ea2f4d-ea2f7e call ea4268 851->853 854 ea2f87 851->854 860 ea2f80 853->860 861 ea2f85 853->861 854->819 857->819 864 ea2fdd-ea2fe7 858->864 860->819 861->850 865 ea2fe9-ea301b call ea4ac8 864->865 866 ea301d-ea3021 864->866 865->864 867 ea310c-ea3129 call ea3c78 866->867 868 ea3027-ea3037 866->868 877 ea312b 867->877 878 ea3130-ea314f 867->878 868->867 870 ea303d-ea304d 868->870 870->867 873 ea3053-ea3077 870->873 876 ea307a-ea307e 873->876 876->867 879 ea3084-ea3099 876->879 877->819 882 ea3153-ea315e call ea3fa8 878->882 883 ea3151 878->883 881 ea30ad-ea30b1 879->881 884 ea30ef-ea3107 881->884 885 ea30b3-ea30bf 881->885 891 ea3162-ea3166 882->891 892 ea3160 882->892 883->819 884->876 887 ea30ed 885->887 888 ea30c1-ea30eb 885->888 887->881 888->887 893 ea3168-ea316b 891->893 894 ea3172-ea3176 891->894 892->819 893->894 895 ea3178-ea317b 894->895 896 ea3182-ea3186 894->896 895->896 897 ea3188-ea318b 896->897 898 ea3192-ea3196 896->898 897->898 899 ea3198-ea319e call ea4078 898->899 900 ea31a3-ea31ac 898->900 899->900 900->803 900->819
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00EA2E75
                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00EA2E99
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00EA2EBB
                                              • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 00EA31C4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                              • String ID:
                                              • API String ID: 572931308-0
                                              • Opcode ID: c5347b81de31fe322318ac143d5ad7503c5525a24d4d98ae8bc56a200060b54f
                                              • Instruction ID: f0a2d50359900fcc92b3f845101580e21bf681d0c25ef0a8b01072aa88743142
                                              • Opcode Fuzzy Hash: c5347b81de31fe322318ac143d5ad7503c5525a24d4d98ae8bc56a200060b54f
                                              • Instruction Fuzzy Hash: 9562FC30A142589BEB24CFA4C851BDEB372EF59304F1091A9E10DFB390E7799E85CB59
                                              Strings
                                              • Variable must be of type 'Object'., xrefs: 00D232B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Variable must be of type 'Object'.
                                              • API String ID: 0-109567571
                                              • Opcode ID: 861020e538e59c3b050849d17238d6aee811214ce93653dc23365ff836e910d2
                                              • Instruction ID: a01fd6d1266f8079beb82185991ac824c7451c81050aad25eb593a6f774ba47f
                                              • Opcode Fuzzy Hash: 861020e538e59c3b050849d17238d6aee811214ce93653dc23365ff836e910d2
                                              • Instruction Fuzzy Hash: CEC29E71A00214CFCB24EF59D880AADB7B1FF19304F24815AEA55AF3A1D375EE42DB61
                                              APIs
                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00D133A2
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00CD3A04
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String_wcslen
                                              • String ID: Line:
                                              • API String ID: 2289894680-1585850449
                                              • Opcode ID: c65a46eeb9337764115bf62fa12ff1876a625e034cf7449d6c5830802d005a48
                                              • Instruction ID: bf741337c105410849822c805a244138056f3d694357eb8ec61e99a9d7f3946f
                                              • Opcode Fuzzy Hash: c65a46eeb9337764115bf62fa12ff1876a625e034cf7449d6c5830802d005a48
                                              • Instruction Fuzzy Hash: FC31C171508344AEC725EB60DC45BEBB7E8AB41710F00452BF6A9822A1EF709A48D7E3
                                              APIs
                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00CF0668
                                                • Part of subcall function 00CF32A4: RaiseException.KERNEL32(?,?,?,00CF068A,?,00DA1444,?,?,?,?,?,?,00CF068A,00CD1129,00D98738,00CD1129), ref: 00CF3304
                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00CF0685
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw$ExceptionRaise
                                              • String ID: Unknown exception
                                              • API String ID: 3476068407-410509341
                                              • Opcode ID: fcb7ff6cac19e0b1ca2098a55da5340ecb0191972ffca3584bd3afdc0d2556c9
                                              • Instruction ID: 60b8a8a2bd045a6b3093cc2ffd1aa55221a92f6559ef505ff3b68c4575380e9e
                                              • Opcode Fuzzy Hash: fcb7ff6cac19e0b1ca2098a55da5340ecb0191972ffca3584bd3afdc0d2556c9
                                              • Instruction Fuzzy Hash: 75F0283090030C778F44BA65DC46C7E7B6C5E00700B704035BA24C5593EF70DB2AD592
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00D582F5
                                              • TerminateProcess.KERNEL32(00000000), ref: 00D582FC
                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 00D584DD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$CurrentFreeLibraryTerminate
                                              • String ID:
                                              • API String ID: 146820519-0
                                              • Opcode ID: a7a670e1d35d77ae36211b6a431bee563b2270189d245b322e83cafa6ce5f13e
                                              • Instruction ID: 566fe035155f63c25b86802e21e429adc94cd4f2e39c72ecdd771133a260fe1e
                                              • Opcode Fuzzy Hash: a7a670e1d35d77ae36211b6a431bee563b2270189d245b322e83cafa6ce5f13e
                                              • Instruction Fuzzy Hash: D3126B719083419FCB14DF28C484B2ABBE1FF84315F14895DED899B392DB31E949CBA2
                                              APIs
                                              • CloseHandle.KERNELBASE(00000000,00000000,?,?,00D085CC,?,00D98CC8,0000000C), ref: 00D08704
                                              • GetLastError.KERNEL32(?,00D085CC,?,00D98CC8,0000000C), ref: 00D0870E
                                              • __dosmaperr.LIBCMT ref: 00D08739
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseErrorHandleLast__dosmaperr
                                              • String ID:
                                              • API String ID: 2583163307-0
                                              • Opcode ID: 2b8f92c77b4a2e96c9e227df2861e26d7cf18e35df64ea7f6e5f8b9a1180e75c
                                              • Instruction ID: e1cb6e150a63bd66fb2e04dec6bc0fff84e1c34afe780a9d0019e6b2b045f2c7
                                              • Opcode Fuzzy Hash: 2b8f92c77b4a2e96c9e227df2861e26d7cf18e35df64ea7f6e5f8b9a1180e75c
                                              • Instruction Fuzzy Hash: 93016B32A043201AC6246334A84577F2B498B92774F3E0119FC8CDB2D2DEA2CC81A670
                                              APIs
                                              • __Init_thread_footer.LIBCMT ref: 00CE17F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Init_thread_footer
                                              • String ID: CALL
                                              • API String ID: 1385522511-4196123274
                                              • Opcode ID: 44a3a74ec9d330c023ad684d1f0fd47bdc0e4ff5d96fd2619bf396dc8a17001d
                                              • Instruction ID: ba47a36492dfb2d22ebdb89469a37af6a49ae58002630bcc73174ca600e69a87
                                              • Opcode Fuzzy Hash: 44a3a74ec9d330c023ad684d1f0fd47bdc0e4ff5d96fd2619bf396dc8a17001d
                                              • Instruction Fuzzy Hash: 69229C706083819FC714DF16C480A2ABBF1FF99314F28895DF8968B3A1D731E955DBA2
                                              APIs
                                              • GetOpenFileNameW.COMDLG32(?), ref: 00D12C8C
                                                • Part of subcall function 00CD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CD3A97,?,?,00CD2E7F,?,?,?,00000000), ref: 00CD3AC2
                                                • Part of subcall function 00CD2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CD2DC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Name$Path$FileFullLongOpen
                                              • String ID: X
                                              • API String ID: 779396738-3081909835
                                              • Opcode ID: 7114e9b38725a083a916218bda24f8d5b5e2ce6076348800cc3eadbf9013bb0f
                                              • Instruction ID: 82855e2e10c10f17cf0b97923345f875e113766bd9597aadafa8be235ef88fa4
                                              • Opcode Fuzzy Hash: 7114e9b38725a083a916218bda24f8d5b5e2ce6076348800cc3eadbf9013bb0f
                                              • Instruction Fuzzy Hash: 3E219371A00298ABCF41EF94D845BEE7BF9AF49305F00405AE605E7341DBB49A899BB1
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 00EA3732
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID: D
                                              • API String ID: 963392458-2746444292
                                              • Opcode ID: a782293119ad2c684ee7f4e1b7c6ce7e54987cc35907e67b60f32668cf9ab6a9
                                              • Instruction ID: b78d0e4dd2da3b2cef97be78b6422dec3b94734e6b826ed0990f863b01f954af
                                              • Opcode Fuzzy Hash: a782293119ad2c684ee7f4e1b7c6ce7e54987cc35907e67b60f32668cf9ab6a9
                                              • Instruction Fuzzy Hash: 0C01FFB1540208ABDB20DBF0CC49FEF777CAB49701F508509BA15AA184EA74A7088B51
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00EA2E75
                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00EA2E99
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00EA2EBB
                                              • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 00EA31C4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                              • String ID:
                                              • API String ID: 572931308-0
                                              • Opcode ID: 1410da97c1c912e366cdd2316cb6e2da26cba2f02901dc8eb5c106db15075d5a
                                              • Instruction ID: 945e236f1a7ed1bcb9552d7850e0bf4adacb3cdd4bdb6d5cba9bbad8b235be27
                                              • Opcode Fuzzy Hash: 1410da97c1c912e366cdd2316cb6e2da26cba2f02901dc8eb5c106db15075d5a
                                              • Instruction Fuzzy Hash: F312EF20E14658C6EB24DF64D8507DEB232EF69300F10A0E9910DEB7A5E77A5F81CF5A
                                              APIs
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00CD3908
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_
                                              • String ID:
                                              • API String ID: 1144537725-0
                                              • Opcode ID: 8df4cd2c610201132298f235d6f60d00b97aa70db01cadf3cef4aa58834315bb
                                              • Instruction ID: 0c88ee52a5f4b2a31e88e292fb51deab60119d2554cc9f8584a71ac3346cb14f
                                              • Opcode Fuzzy Hash: 8df4cd2c610201132298f235d6f60d00b97aa70db01cadf3cef4aa58834315bb
                                              • Instruction Fuzzy Hash: C6316BB46043419FD720DF64D884797BBE8FB49718F00092FF6A997390E7B1AA44DB62
                                              APIs
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00CD949C,?,00008000), ref: 00CD5773
                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00CD949C,?,00008000), ref: 00D14052
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: bba779d6188c0e820f18c60438f841bf18eb8b093e28674ebe0f22ff229bff25
                                              • Instruction ID: 0d763e19688a3c89845804d1ec7bea70eb0e3f235c161fcd83d2ccd5a931d89f
                                              • Opcode Fuzzy Hash: bba779d6188c0e820f18c60438f841bf18eb8b093e28674ebe0f22ff229bff25
                                              • Instruction Fuzzy Hash: 4B014431145325BAE3305A26DC0EF977F54DF06770F158211BBAC5A2E0DBB45854CBA0
                                              APIs
                                              • __Init_thread_footer.LIBCMT ref: 00CDBB4E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Init_thread_footer
                                              • String ID:
                                              • API String ID: 1385522511-0
                                              • Opcode ID: 2a1f536d068e787efc9aebd19d36956b8242c495aa1a0f0887eb21930f756031
                                              • Instruction ID: c3ce92ecbe9b2a0cb24729f76d4acb388efd724013ceff43e1735a4ecda284e7
                                              • Opcode Fuzzy Hash: 2a1f536d068e787efc9aebd19d36956b8242c495aa1a0f0887eb21930f756031
                                              • Instruction Fuzzy Hash: 7A32D334A00219DFCF10CF59C894ABEBBB5EF45304F1A805AEA15AB352C775EE41DB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LoadString
                                              • String ID:
                                              • API String ID: 2948472770-0
                                              • Opcode ID: 28e287f9e7fea0a1856bd347c8e6bd724a9258e37f0f301c11677243195a6809
                                              • Instruction ID: 26ae1d65817bda400a403a0bab083b8129866e05f44d3e98cf53873557387e74
                                              • Opcode Fuzzy Hash: 28e287f9e7fea0a1856bd347c8e6bd724a9258e37f0f301c11677243195a6809
                                              • Instruction Fuzzy Hash: 10D13A75A04209DFCF14EF98D8819ADBBB5FF48310F24415AED15AB391EB30AD85DBA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: 64bd3df52009a97f3b60f01565756086e754a5a88435a81db260d8e626afd1fc
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: BD310675A00149DBD728CF5AD480969FBA1FF49310B7486A9E81ACF655E731EEC2CBC0
                                              APIs
                                                • Part of subcall function 00CD4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00CD4EDD,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4E9C
                                                • Part of subcall function 00CD4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00CD4EAE
                                                • Part of subcall function 00CD4E90: FreeLibrary.KERNEL32(00000000,?,?,00CD4EDD,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4EC0
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4EFD
                                                • Part of subcall function 00CD4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D13CDE,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4E62
                                                • Part of subcall function 00CD4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00CD4E74
                                                • Part of subcall function 00CD4E59: FreeLibrary.KERNEL32(00000000,?,?,00D13CDE,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4E87
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Library$Load$AddressFreeProc
                                              • String ID:
                                              • API String ID: 2632591731-0
                                              • Opcode ID: 3311da86032d7473e08d06ce74de6196b6472a699e4fd4585e3a48d940c3661d
                                              • Instruction ID: a942e10263ef204adb7066d186cb659dad294a06d6ab0409c5e818e00dbd04b4
                                              • Opcode Fuzzy Hash: 3311da86032d7473e08d06ce74de6196b6472a699e4fd4585e3a48d940c3661d
                                              • Instruction Fuzzy Hash: 8F11A731610205BBDB18AFA4DC16FAD77A59F44710F10442FF742A62E1DE719A45A760
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: __wsopen_s
                                              • String ID:
                                              • API String ID: 3347428461-0
                                              • Opcode ID: 645f9773a96254c3cdf76261c5d0eba454edd27d10875d2abd56b0188c39d9d3
                                              • Instruction ID: 4fae533f5aeac01e3ececaff51eff89c751bacf5e3cd762c76a1a7092b1bd272
                                              • Opcode Fuzzy Hash: 645f9773a96254c3cdf76261c5d0eba454edd27d10875d2abd56b0188c39d9d3
                                              • Instruction Fuzzy Hash: 2811187590420AAFCB05DF58E941ADE7BF5EF48314F144059F808AB352DB31DA11DBB5
                                              APIs
                                                • Part of subcall function 00D04C7D: RtlAllocateHeap.NTDLL(00000008,00CD1129,00000000,?,00D02E29,00000001,00000364,?,?,?,00CFF2DE,00D03863,00DA1444,?,00CEFDF5,?), ref: 00D04CBE
                                              • _free.LIBCMT ref: 00D0506C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AllocateHeap_free
                                              • String ID:
                                              • API String ID: 614378929-0
                                              • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                              • Instruction ID: 9db193d66c3407be0e405b8ab6c236afc71bfe7a52e23469160d438c4e6589f3
                                              • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                              • Instruction Fuzzy Hash: DB012B722047045BE3318E55E845B5EFBECFB85370F25051DE588832C0E630A805CB74
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                              • Instruction ID: 44509f5848c98f4d540b4bea8f318510aee70950809a6afafe2b4575c0af0f46
                                              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                              • Instruction Fuzzy Hash: 24F0F432511A1CD6CA723E6A9C09B7A33A8DF52330F100715F629D61E2DF70990296B7
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID:
                                              • API String ID: 176396367-0
                                              • Opcode ID: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                              • Instruction ID: 542de00fdf152cd66aaacc1d06e05f6f46a3316660cc1ad8e4b8b10cd94425d8
                                              • Opcode Fuzzy Hash: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                              • Instruction Fuzzy Hash: D9F0C8B36006046ED7149F29DC06AA7BBA8EB44760F10852EF719CB2D1DB71E51097A0
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000008,00CD1129,00000000,?,00D02E29,00000001,00000364,?,?,?,00CFF2DE,00D03863,00DA1444,?,00CEFDF5,?), ref: 00D04CBE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: 77f8e6a99ea0565e60d818ad7c0be39d32101efa9e26663f065bb731bfc5298c
                                              • Instruction ID: 7d5d05a289ba2df07037eadee66177a20ef8ab7fa083e80e027c2d249fb6789a
                                              • Opcode Fuzzy Hash: 77f8e6a99ea0565e60d818ad7c0be39d32101efa9e26663f065bb731bfc5298c
                                              • Instruction Fuzzy Hash: BBF0B47160222867FB255F669D09F6B3788AF817A0F184115FA1DE62C0CA70D81156F9
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,?,00DA1444,?,00CEFDF5,?,?,00CDA976,00000010,00DA1440,00CD13FC,?,00CD13C6,?,00CD1129), ref: 00D03852
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: 15f5e085aa3c75986edacf8489fb292fb147cd61bc1226cdcf042b1ba7ef021b
                                              • Instruction ID: e31c325e41b42407d48fb79ced213df6939870f51bb4df72f020a9e6db2e1333
                                              • Opcode Fuzzy Hash: 15f5e085aa3c75986edacf8489fb292fb147cd61bc1226cdcf042b1ba7ef021b
                                              • Instruction Fuzzy Hash: C2E0ED31200328A6EB252AA69C00BAB364CAF437B0F0980A4FD4DD26C0CB21DE0192F2
                                              APIs
                                              • FreeLibrary.KERNEL32(?,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4F6D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: 7403f215c89fd9e5e205656cfdbf7619a1da323891b491fa4c6c5f78338d1aa9
                                              • Instruction ID: 8e8e8ef46ad18dd4fcee02bc2c96853de1b49cff98874b1b0312bf659c31473f
                                              • Opcode Fuzzy Hash: 7403f215c89fd9e5e205656cfdbf7619a1da323891b491fa4c6c5f78338d1aa9
                                              • Instruction Fuzzy Hash: 91F01571105752CFDB389FA5D490822BBE4AF14329320896FE3EA82621CB319844DB10
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,00D1EE51,00D93630,00000002), ref: 00D3CD26
                                                • Part of subcall function 00D3CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,00D3CD19,?,?,?), ref: 00D3CC59
                                                • Part of subcall function 00D3CC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,00D3CD19,?,?,?,?,00D1EE51,00D93630,00000002), ref: 00D3CC6E
                                                • Part of subcall function 00D3CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,00D3CD19,?,?,?,?,00D1EE51,00D93630,00000002), ref: 00D3CC7A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: File$Pointer$Write
                                              • String ID:
                                              • API String ID: 3847668363-0
                                              • Opcode ID: 3be3f8939b446a7b9ebc3344ac02b51e85d6c1494dbeba2b0cc3e963a5662370
                                              • Instruction ID: 6c10f7cfd5d2d6db8091cb7ec9e90ba2ec11bae9c1470fb3ae15fbef3b495fa7
                                              • Opcode Fuzzy Hash: 3be3f8939b446a7b9ebc3344ac02b51e85d6c1494dbeba2b0cc3e963a5662370
                                              • Instruction Fuzzy Hash: CDE0397A400704EFC7219F8AE9008AABBF8FF85260710852FE996D2110D3B5AA14DB70
                                              APIs
                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CD2DC4
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LongNamePath_wcslen
                                              • String ID:
                                              • API String ID: 541455249-0
                                              • Opcode ID: 15a36d8815446ee40e5a6df15bd01cfb61dbcbc38fa6ec9e6c0627a8881ef69c
                                              • Instruction ID: 14c7381097f798291764dac787612eba7f6190e59c1ae83da4202bbbc3669ea3
                                              • Opcode Fuzzy Hash: 15a36d8815446ee40e5a6df15bd01cfb61dbcbc38fa6ec9e6c0627a8881ef69c
                                              • Instruction Fuzzy Hash: EBE0CD766042246BC710A2589C05FEA77DDDFC8790F040072FD09D7348D960AD80C570
                                              APIs
                                                • Part of subcall function 00CD3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00CD3908
                                                • Part of subcall function 00CDD730: GetInputState.USER32 ref: 00CDD807
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00CD2B6B
                                                • Part of subcall function 00CD30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00CD314E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                              • String ID:
                                              • API String ID: 3667716007-0
                                              • Opcode ID: 6887261a1b9a2c18630f2c07ee5fb3440ec1509d4511e28c0ce027ce2463f0b2
                                              • Instruction ID: c86266d8c015db11726de6e52b1d25e1ad535033d464684533a2a66cce7c9b88
                                              • Opcode Fuzzy Hash: 6887261a1b9a2c18630f2c07ee5fb3440ec1509d4511e28c0ce027ce2463f0b2
                                              • Instruction Fuzzy Hash: CEE0862570428417C604BB75AC5257DB7599BD6351F40153FF353873A2CEA44A456272
                                              APIs
                                              • CreateFileW.KERNELBASE(00000000,00000000,?,00D10704,?,?,00000000,?,00D10704,00000000,0000000C), ref: 00D103B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 1d123f75d51e07dd70c1374a2cf1b7c06a64e83986f3257589855148198f424f
                                              • Instruction ID: 4a853cd32282d243fa286a87316884af2f164476964e4faac110f6be11f8eac5
                                              • Opcode Fuzzy Hash: 1d123f75d51e07dd70c1374a2cf1b7c06a64e83986f3257589855148198f424f
                                              • Instruction Fuzzy Hash: 43D06C3205020DBBDF028F84DD06EDA3BAAFB48714F014000FE5896120C776E821ABA0
                                              APIs
                                              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00CD1CBC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: InfoParametersSystem
                                              • String ID:
                                              • API String ID: 3098949447-0
                                              • Opcode ID: 3092ac6a44a65d90b577edaaf7a8e534bbe6e24802bf98095a64879d27cd3af9
                                              • Instruction ID: e6a1f0b191b9a7c9e13acebbcc41f430bf4ba226849545c22a6ee9e390b96e56
                                              • Opcode Fuzzy Hash: 3092ac6a44a65d90b577edaaf7a8e534bbe6e24802bf98095a64879d27cd3af9
                                              • Instruction Fuzzy Hash: 2BC09B352803049FF6144B84BC4AF207764B349B10F044001F649D57E3C3E16410DA70
                                              APIs
                                                • Part of subcall function 00CD5745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00CD949C,?,00008000), ref: 00CD5773
                                              • GetLastError.KERNEL32(00000002,00000000), ref: 00D476DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateErrorFileLast
                                              • String ID:
                                              • API String ID: 1214770103-0
                                              • Opcode ID: 6fb7032599c09e42be9959fa63b7770b2d1942e576d3c8abd614725ffff5ad36
                                              • Instruction ID: 999e285151d280b8c1a4994b8b78a8a4a0aa4f85d51e0190be742ea9ea2a07c9
                                              • Opcode Fuzzy Hash: 6fb7032599c09e42be9959fa63b7770b2d1942e576d3c8abd614725ffff5ad36
                                              • Instruction Fuzzy Hash: 3E8170306087019FCB14EF28C491B6AB7E1EF89314F09455EF9865B3A2DB30ED45DBA2
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 00EA3659
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction ID: 749ec635e1b1cd8303fd032061a7ebfdf6d840be21c374a8855237a68e42a86b
                                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction Fuzzy Hash: 6CE09A7494010DAFDB00DFB4D54969D7BB4EF05301F1006A1FD05A6680DA309A548A66
                                              APIs
                                              • CloseHandle.KERNELBASE(?,?,00000000,00D124E0), ref: 00CD6266
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 9feb34fd03582a7ed06fb0c2ff26587b37493150998d3fe9ebfb839a90f54ab5
                                              • Instruction ID: d544757be7a36d1dd645d36e7a4ddb64cffa61d1a81b80dfdf9a90e640ac869a
                                              • Opcode Fuzzy Hash: 9feb34fd03582a7ed06fb0c2ff26587b37493150998d3fe9ebfb839a90f54ab5
                                              • Instruction Fuzzy Hash: 05E09275400B01CEC3314F1AE804412FBE5FFE13613204A2FD1E592664D3B05986CB60
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 00EA3659
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction ID: a4f72ee5141017a64c27125a9d693175e746a0aa5d3224052e41ee861f88417f
                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction Fuzzy Hash: 8BE0E67494010DEFDB00DFB4D54D69D7BB4EF04301F100261FD01E2280D6309E508A62
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00D6961A
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D6965B
                                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00D6969F
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D696C9
                                              • SendMessageW.USER32 ref: 00D696F2
                                              • GetKeyState.USER32(00000011), ref: 00D6978B
                                              • GetKeyState.USER32(00000009), ref: 00D69798
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D697AE
                                              • GetKeyState.USER32(00000010), ref: 00D697B8
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D697E9
                                              • SendMessageW.USER32 ref: 00D69810
                                              • SendMessageW.USER32(?,00001030,?,00D67E95), ref: 00D69918
                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00D6992E
                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00D69941
                                              • SetCapture.USER32(?), ref: 00D6994A
                                              • ClientToScreen.USER32(?,?), ref: 00D699AF
                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00D699BC
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D699D6
                                              • ReleaseCapture.USER32 ref: 00D699E1
                                              • GetCursorPos.USER32(?), ref: 00D69A19
                                              • ScreenToClient.USER32(?,?), ref: 00D69A26
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D69A80
                                              • SendMessageW.USER32 ref: 00D69AAE
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D69AEB
                                              • SendMessageW.USER32 ref: 00D69B1A
                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00D69B3B
                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00D69B4A
                                              • GetCursorPos.USER32(?), ref: 00D69B68
                                              • ScreenToClient.USER32(?,?), ref: 00D69B75
                                              • GetParent.USER32(?), ref: 00D69B93
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D69BFA
                                              • SendMessageW.USER32 ref: 00D69C2B
                                              • ClientToScreen.USER32(?,?), ref: 00D69C84
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00D69CB4
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D69CDE
                                              • SendMessageW.USER32 ref: 00D69D01
                                              • ClientToScreen.USER32(?,?), ref: 00D69D4E
                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00D69D82
                                                • Part of subcall function 00CE9944: GetWindowLongW.USER32(?,000000EB), ref: 00CE9952
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D69E05
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                              • String ID: @GUI_DRAGID$F
                                              • API String ID: 3429851547-4164748364
                                              • Opcode ID: 2b532722e903d2b6fa58b178980d4190cb5c3226511063260276eed38294d6d5
                                              • Instruction ID: 5f32dd5f659f20d38f2731d4ee8eaea8dcf658cb2140b868763473dc4df98322
                                              • Opcode Fuzzy Hash: 2b532722e903d2b6fa58b178980d4190cb5c3226511063260276eed38294d6d5
                                              • Instruction Fuzzy Hash: 86427D34204341AFDB24CF68CC64AAABBE9FF59310F140619F699C72A1D771E854DF62
                                              APIs
                                              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00D648F3
                                              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00D64908
                                              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00D64927
                                              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00D6494B
                                              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00D6495C
                                              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00D6497B
                                              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00D649AE
                                              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00D649D4
                                              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00D64A0F
                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00D64A56
                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00D64A7E
                                              • IsMenu.USER32(?), ref: 00D64A97
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D64AF2
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D64B20
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D64B94
                                              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00D64BE3
                                              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00D64C82
                                              • wsprintfW.USER32 ref: 00D64CAE
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D64CC9
                                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00D64CF1
                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00D64D13
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D64D33
                                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00D64D5A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                              • String ID: %d/%02d/%02d
                                              • API String ID: 4054740463-328681919
                                              • Opcode ID: d8a0a9ca94d2c119d1736215cf410a42ab7b1d5c9785c3273fce37dab2b2f081
                                              • Instruction ID: 18a13c67d7e1dcfbb3451bf22023ee57fde85a1aac8ab0ced18fe2684f28e703
                                              • Opcode Fuzzy Hash: d8a0a9ca94d2c119d1736215cf410a42ab7b1d5c9785c3273fce37dab2b2f081
                                              • Instruction Fuzzy Hash: 1812FC71600344ABEB248F68DC49FBE7BB8EF45710F14412AF556EB2A1DBB4D941CB60
                                              APIs
                                              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00CEF998
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D2F474
                                              • IsIconic.USER32(00000000), ref: 00D2F47D
                                              • ShowWindow.USER32(00000000,00000009), ref: 00D2F48A
                                              • SetForegroundWindow.USER32(00000000), ref: 00D2F494
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D2F4AA
                                              • GetCurrentThreadId.KERNEL32 ref: 00D2F4B1
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D2F4BD
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00D2F4CE
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00D2F4D6
                                              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00D2F4DE
                                              • SetForegroundWindow.USER32(00000000), ref: 00D2F4E1
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F4F6
                                              • keybd_event.USER32(00000012,00000000), ref: 00D2F501
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F50B
                                              • keybd_event.USER32(00000012,00000000), ref: 00D2F510
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F519
                                              • keybd_event.USER32(00000012,00000000), ref: 00D2F51E
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F528
                                              • keybd_event.USER32(00000012,00000000), ref: 00D2F52D
                                              • SetForegroundWindow.USER32(00000000), ref: 00D2F530
                                              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00D2F557
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 4125248594-2988720461
                                              • Opcode ID: 4ee3a01a00a5d36cec2cc241926d270338ee3aef9c776f93b188d55f848404e4
                                              • Instruction ID: 59967874f922e2078a83e8526c8f940710f4959fb2bb7337dc98df1c4f276256
                                              • Opcode Fuzzy Hash: 4ee3a01a00a5d36cec2cc241926d270338ee3aef9c776f93b188d55f848404e4
                                              • Instruction Fuzzy Hash: CF316371A50328BBEB206BB59C4AFBF7E7CEB44B54F141426F641E62D1C6F19D00AA70
                                              APIs
                                                • Part of subcall function 00D316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D3170D
                                                • Part of subcall function 00D316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D3173A
                                                • Part of subcall function 00D316C3: GetLastError.KERNEL32 ref: 00D3174A
                                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00D31286
                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00D312A8
                                              • CloseHandle.KERNEL32(?), ref: 00D312B9
                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00D312D1
                                              • GetProcessWindowStation.USER32 ref: 00D312EA
                                              • SetProcessWindowStation.USER32(00000000), ref: 00D312F4
                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00D31310
                                                • Part of subcall function 00D310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D311FC), ref: 00D310D4
                                                • Part of subcall function 00D310BF: CloseHandle.KERNEL32(?,?,00D311FC), ref: 00D310E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                              • String ID: $default$winsta0
                                              • API String ID: 22674027-1027155976
                                              • Opcode ID: c2817edda5077b1aa5a281e930a7423a92edd8f4651be5e752eacd56b13e396f
                                              • Instruction ID: 7bee96669c9857ff3bfec7e6d78da55da1dbfa2ea1376ab23e9083e5d8f5705b
                                              • Opcode Fuzzy Hash: c2817edda5077b1aa5a281e930a7423a92edd8f4651be5e752eacd56b13e396f
                                              • Instruction Fuzzy Hash: C081787590034AABDF219FA4DC49BFE7BB9EF04704F184129F911E62A0CBB59944CB35
                                              APIs
                                                • Part of subcall function 00D310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D31114
                                                • Part of subcall function 00D310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D31120
                                                • Part of subcall function 00D310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D3112F
                                                • Part of subcall function 00D310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D31136
                                                • Part of subcall function 00D310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D3114D
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D30BCC
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D30C00
                                              • GetLengthSid.ADVAPI32(?), ref: 00D30C17
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00D30C51
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D30C6D
                                              • GetLengthSid.ADVAPI32(?), ref: 00D30C84
                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00D30C8C
                                              • HeapAlloc.KERNEL32(00000000), ref: 00D30C93
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D30CB4
                                              • CopySid.ADVAPI32(00000000), ref: 00D30CBB
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D30CEA
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D30D0C
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D30D1E
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D30D45
                                              • HeapFree.KERNEL32(00000000), ref: 00D30D4C
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D30D55
                                              • HeapFree.KERNEL32(00000000), ref: 00D30D5C
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D30D65
                                              • HeapFree.KERNEL32(00000000), ref: 00D30D6C
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00D30D78
                                              • HeapFree.KERNEL32(00000000), ref: 00D30D7F
                                                • Part of subcall function 00D31193: GetProcessHeap.KERNEL32(00000008,00D30BB1,?,00000000,?,00D30BB1,?), ref: 00D311A1
                                                • Part of subcall function 00D31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00D30BB1,?), ref: 00D311A8
                                                • Part of subcall function 00D31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00D30BB1,?), ref: 00D311B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                              • String ID:
                                              • API String ID: 4175595110-0
                                              • Opcode ID: 89c31e884f8428034809e8eda5ed7ba825a966f7ed560a0f2f08813a35f3072b
                                              • Instruction ID: 81fcfa88cf78c58eb9ce7a20da1c80e03aaf1f5867ceb25d80df95b2ac527d2a
                                              • Opcode Fuzzy Hash: 89c31e884f8428034809e8eda5ed7ba825a966f7ed560a0f2f08813a35f3072b
                                              • Instruction Fuzzy Hash: 63715976A0020AABDF10DFA4EC44BEEBBBCBF05300F084555E954E6291D7B5AA05CBB0
                                              APIs
                                              • OpenClipboard.USER32(00D6CC08), ref: 00D4EB29
                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00D4EB37
                                              • GetClipboardData.USER32(0000000D), ref: 00D4EB43
                                              • CloseClipboard.USER32 ref: 00D4EB4F
                                              • GlobalLock.KERNEL32(00000000), ref: 00D4EB87
                                              • CloseClipboard.USER32 ref: 00D4EB91
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00D4EBBC
                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00D4EBC9
                                              • GetClipboardData.USER32(00000001), ref: 00D4EBD1
                                              • GlobalLock.KERNEL32(00000000), ref: 00D4EBE2
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00D4EC22
                                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 00D4EC38
                                              • GetClipboardData.USER32(0000000F), ref: 00D4EC44
                                              • GlobalLock.KERNEL32(00000000), ref: 00D4EC55
                                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00D4EC77
                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00D4EC94
                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00D4ECD2
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00D4ECF3
                                              • CountClipboardFormats.USER32 ref: 00D4ED14
                                              • CloseClipboard.USER32 ref: 00D4ED59
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                              • String ID:
                                              • API String ID: 420908878-0
                                              • Opcode ID: e5f8d6e6ed20fcd1aa4b31865172c86daf49c3af27874e712681f9fb415c8b14
                                              • Instruction ID: 89c9ca43f49ff5f8675d5a78892d7c8db5145a54837cf4c06dc83b8286c5f297
                                              • Opcode Fuzzy Hash: e5f8d6e6ed20fcd1aa4b31865172c86daf49c3af27874e712681f9fb415c8b14
                                              • Instruction Fuzzy Hash: 04618A34204301AFD300EF64D894E7AB7A4FF88704F18551AF996D72A2DB71E909DBB2
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00D469BE
                                              • FindClose.KERNEL32(00000000), ref: 00D46A12
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D46A4E
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D46A75
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D46AB2
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D46ADF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                              • API String ID: 3830820486-3289030164
                                              • Opcode ID: 278cd875e664fec620e67bb27ed38855af1486fc265e91fcd3f307d82073cd83
                                              • Instruction ID: 223468c03fc7ae7fe4885d12de44ef94c5261057cdf4b398343b45ce2c6823da
                                              • Opcode Fuzzy Hash: 278cd875e664fec620e67bb27ed38855af1486fc265e91fcd3f307d82073cd83
                                              • Instruction Fuzzy Hash: 65D14171508340AFC710EBA4C891EABB7ECEF89704F44491EF685D7291EB74DA44DB62
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00D49663
                                              • GetFileAttributesW.KERNEL32(?), ref: 00D496A1
                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00D496BB
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00D496D3
                                              • FindClose.KERNEL32(00000000), ref: 00D496DE
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00D496FA
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D4974A
                                              • SetCurrentDirectoryW.KERNEL32(00D96B7C), ref: 00D49768
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D49772
                                              • FindClose.KERNEL32(00000000), ref: 00D4977F
                                              • FindClose.KERNEL32(00000000), ref: 00D4978F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                              • String ID: *.*
                                              • API String ID: 1409584000-438819550
                                              • Opcode ID: 3ea838df9452796a9b28565e2dcfc99d01d4191d011fc277e5c983accd54e830
                                              • Instruction ID: 21a0b8d73ee4407063995c228b9361707aab0baec9b582d185a1cc1f697248c5
                                              • Opcode Fuzzy Hash: 3ea838df9452796a9b28565e2dcfc99d01d4191d011fc277e5c983accd54e830
                                              • Instruction Fuzzy Hash: 2331BF326002196FDF14AFB5DC18AEFB7AC9F09320F184156F955E2190EB70DD448B34
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00D497BE
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00D49819
                                              • FindClose.KERNEL32(00000000), ref: 00D49824
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00D49840
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D49890
                                              • SetCurrentDirectoryW.KERNEL32(00D96B7C), ref: 00D498AE
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D498B8
                                              • FindClose.KERNEL32(00000000), ref: 00D498C5
                                              • FindClose.KERNEL32(00000000), ref: 00D498D5
                                                • Part of subcall function 00D3DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00D3DB00
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                              • String ID: *.*
                                              • API String ID: 2640511053-438819550
                                              • Opcode ID: 043e016888fb795a9ecb1213f85f9fefb6ae27ff2adf2867136fbb750683ca1f
                                              • Instruction ID: f4f6f9f4779ab5fa6410fcf7e470c21f07438bf067780997bd6c3da8aeb3bfb5
                                              • Opcode Fuzzy Hash: 043e016888fb795a9ecb1213f85f9fefb6ae27ff2adf2867136fbb750683ca1f
                                              • Instruction Fuzzy Hash: F031C1315002196FDF14EFB9EC58AEFB7AC9F0A320F184156E954E2190DB70DA498F74
                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 00D48257
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D48267
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00D48273
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D48310
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D48324
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D48356
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00D4838C
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D48395
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryTime$File$Local$System
                                              • String ID: *.*
                                              • API String ID: 1464919966-438819550
                                              • Opcode ID: 72d626871d5a7e136622f3bdd8eef77e5d929d5ee5bc25baf030506805b442af
                                              • Instruction ID: 32aecd7db967b3d44ea8539579662ee46624788f927b577952ed63a4b6f668b7
                                              • Opcode Fuzzy Hash: 72d626871d5a7e136622f3bdd8eef77e5d929d5ee5bc25baf030506805b442af
                                              • Instruction Fuzzy Hash: 4C617A725043059FCB10EF64D8849AEB3E8FF89354F04891EFA89C7251EB31E945DBA2
                                              APIs
                                                • Part of subcall function 00CD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CD3A97,?,?,00CD2E7F,?,?,?,00000000), ref: 00CD3AC2
                                                • Part of subcall function 00D3E199: GetFileAttributesW.KERNEL32(?,00D3CF95), ref: 00D3E19A
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00D3D122
                                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00D3D1DD
                                              • MoveFileW.KERNEL32(?,?), ref: 00D3D1F0
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00D3D20D
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D3D237
                                                • Part of subcall function 00D3D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00D3D21C,?,?), ref: 00D3D2B2
                                              • FindClose.KERNEL32(00000000,?,?,?), ref: 00D3D253
                                              • FindClose.KERNEL32(00000000), ref: 00D3D264
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 1946585618-1173974218
                                              • Opcode ID: 2cc50ca38d927dbcb33f92b54a283cb818ba8dc99b8bcc5bf7d7e45c84a3c895
                                              • Instruction ID: b96fff554dfaa5e5d86d99fff505c36c1c3aa3d05a5271661a196e91d5de587c
                                              • Opcode Fuzzy Hash: 2cc50ca38d927dbcb33f92b54a283cb818ba8dc99b8bcc5bf7d7e45c84a3c895
                                              • Instruction Fuzzy Hash: F1616C3590124D9BCF05EBE0EA929EEB776AF55300F244166E501772A1EB309F09EF71
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: 2fe4af62ff86d137e1b4fdf242fc121cf339bb7d6b386fb875089bc624f415eb
                                              • Instruction ID: 2f61a8c0e72a6e467b7b76d4f2c95d652e1281e350a55186d3136b36568b3ac1
                                              • Opcode Fuzzy Hash: 2fe4af62ff86d137e1b4fdf242fc121cf339bb7d6b386fb875089bc624f415eb
                                              • Instruction Fuzzy Hash: 2C418D35604611AFE720DF55D888B29BBE5FF48318F18C099E856CB762D775EC41CBA0
                                              APIs
                                                • Part of subcall function 00D316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D3170D
                                                • Part of subcall function 00D316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D3173A
                                                • Part of subcall function 00D316C3: GetLastError.KERNEL32 ref: 00D3174A
                                              • ExitWindowsEx.USER32(?,00000000), ref: 00D3E932
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                              • String ID: $ $@$SeShutdownPrivilege
                                              • API String ID: 2234035333-3163812486
                                              • Opcode ID: 70cf34ce9833f9aa8149497a7d55bf23dae724f76eb56a798d5d009905b76eb3
                                              • Instruction ID: f4c2ac6b7ab1c75e53a729e9babde8569372a9ea3607dc330aa3a6f61a9c4b80
                                              • Opcode Fuzzy Hash: 70cf34ce9833f9aa8149497a7d55bf23dae724f76eb56a798d5d009905b76eb3
                                              • Instruction Fuzzy Hash: F801D172620311ABEB6467B49C8ABBB736CAB14750F194822FC43F21D2D6A09C408BB4
                                              APIs
                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00D51276
                                              • WSAGetLastError.WSOCK32 ref: 00D51283
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00D512BA
                                              • WSAGetLastError.WSOCK32 ref: 00D512C5
                                              • closesocket.WSOCK32(00000000), ref: 00D512F4
                                              • listen.WSOCK32(00000000,00000005), ref: 00D51303
                                              • WSAGetLastError.WSOCK32 ref: 00D5130D
                                              • closesocket.WSOCK32(00000000), ref: 00D5133C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast$closesocket$bindlistensocket
                                              • String ID:
                                              • API String ID: 540024437-0
                                              • Opcode ID: 757fdee47c43909b53b5952c2abe288f3358b39eaecc670f0bb12c46ffecbd73
                                              • Instruction ID: d8ae15c184913831143f8c591f1efcf58e448b497b0767f59e3b418d9fd2bf70
                                              • Opcode Fuzzy Hash: 757fdee47c43909b53b5952c2abe288f3358b39eaecc670f0bb12c46ffecbd73
                                              • Instruction Fuzzy Hash: 234190356002019FDB20DF68C489B29BBE5AF86319F188199ED568F392C775EC85CBF1
                                              APIs
                                              • _free.LIBCMT ref: 00D0B9D4
                                              • _free.LIBCMT ref: 00D0B9F8
                                              • _free.LIBCMT ref: 00D0BB7F
                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00D73700), ref: 00D0BB91
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00DA121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00D0BC09
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00DA1270,000000FF,?,0000003F,00000000,?), ref: 00D0BC36
                                              • _free.LIBCMT ref: 00D0BD4B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                              • String ID:
                                              • API String ID: 314583886-0
                                              • Opcode ID: 2f76b75bf0821af5d7619bcd7d5cbc97f653e2219c29fcd1d45a8519ef5afb04
                                              • Instruction ID: 8191ac8abb85fb08195b1b1de2c20883bf279dc3c89f2c3c00c33c5145a39781
                                              • Opcode Fuzzy Hash: 2f76b75bf0821af5d7619bcd7d5cbc97f653e2219c29fcd1d45a8519ef5afb04
                                              • Instruction Fuzzy Hash: 13C12975A082059FDB109F789C41BBABBA8EF42330F28415BE499D72D1E7709E41CB74
                                              APIs
                                                • Part of subcall function 00CD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CD3A97,?,?,00CD2E7F,?,?,?,00000000), ref: 00CD3AC2
                                                • Part of subcall function 00D3E199: GetFileAttributesW.KERNEL32(?,00D3CF95), ref: 00D3E19A
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00D3D420
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00D3D470
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D3D481
                                              • FindClose.KERNEL32(00000000), ref: 00D3D498
                                              • FindClose.KERNEL32(00000000), ref: 00D3D4A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 2649000838-1173974218
                                              • Opcode ID: 19f4ddd23cd3348beefb2cca2cd733b71eac6bdd96ed967dbf93144df22860a7
                                              • Instruction ID: 1cfa19e03cbcd0775fd9a9b29004776924e7dbaa2b1e059fb36f6d8ad4238594
                                              • Opcode Fuzzy Hash: 19f4ddd23cd3348beefb2cca2cd733b71eac6bdd96ed967dbf93144df22860a7
                                              • Instruction Fuzzy Hash: 143180310183459FC301EF64D8918AFB7A8AE95304F444A1EF5D1932A1EB30EA09EB73
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: __floor_pentium4
                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                              • API String ID: 4168288129-2761157908
                                              • Opcode ID: a156f4dfd2f9e75f4d1c435d94239f48f5965935a49f306a9e3fc6eb67516df6
                                              • Instruction ID: 70819cce7f6c64eb95664c73d3916005380f4592405a6a503e601904536f379c
                                              • Opcode Fuzzy Hash: a156f4dfd2f9e75f4d1c435d94239f48f5965935a49f306a9e3fc6eb67516df6
                                              • Instruction Fuzzy Hash: 39C22A71E046288FDB65CF28DD407EAB7B5EB84304F2845EAD84DE7280E775AE818F51
                                              APIs
                                              • _wcslen.LIBCMT ref: 00D464DC
                                              • CoInitialize.OLE32(00000000), ref: 00D46639
                                              • CoCreateInstance.OLE32(00D6FCF8,00000000,00000001,00D6FB68,?), ref: 00D46650
                                              • CoUninitialize.OLE32 ref: 00D468D4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 886957087-24824748
                                              • Opcode ID: 3143aacc16a2772844292d21587c768ee44ad4d64b942575705cf6d1197aaa7e
                                              • Instruction ID: 168c7315943bd0f3d7bbc1d509e16d13e070181ef44c2a8d26e4936d852e772d
                                              • Opcode Fuzzy Hash: 3143aacc16a2772844292d21587c768ee44ad4d64b942575705cf6d1197aaa7e
                                              • Instruction Fuzzy Hash: ADD14B716083419FC314DF24C881A6BB7E9FF95704F44496DF5968B291EB70ED05CBA2
                                              APIs
                                              • GetForegroundWindow.USER32(?,?,00000000), ref: 00D522E8
                                                • Part of subcall function 00D4E4EC: GetWindowRect.USER32(?,?), ref: 00D4E504
                                              • GetDesktopWindow.USER32 ref: 00D52312
                                              • GetWindowRect.USER32(00000000), ref: 00D52319
                                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00D52355
                                              • GetCursorPos.USER32(?), ref: 00D52381
                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00D523DF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                              • String ID:
                                              • API String ID: 2387181109-0
                                              • Opcode ID: 413a10d434751369585bbcdba64063250235d0453b818befeb69599756c79143
                                              • Instruction ID: 00123f9dc7cd3708b1268cb047720b92463ba755cd9b0924666ca7f4caf18c00
                                              • Opcode Fuzzy Hash: 413a10d434751369585bbcdba64063250235d0453b818befeb69599756c79143
                                              • Instruction Fuzzy Hash: BE31BC72504315ABDB20DF54CC49B6BBBA9FB85314F04091DF985D7291DB74EA08CBB2
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00D49B78
                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00D49C8B
                                                • Part of subcall function 00D43874: GetInputState.USER32 ref: 00D438CB
                                                • Part of subcall function 00D43874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D43966
                                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00D49BA8
                                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00D49C75
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                              • String ID: *.*
                                              • API String ID: 1972594611-438819550
                                              • Opcode ID: 1e152b7ebe68b30fa3975c9fa3aa817f9decfead3f93dfcaa447a23b2c196119
                                              • Instruction ID: 3fd2ec3768b2cdac429899c1ee1969f6436c2770ace6eb4f1a0afbc85ed03d15
                                              • Opcode Fuzzy Hash: 1e152b7ebe68b30fa3975c9fa3aa817f9decfead3f93dfcaa447a23b2c196119
                                              • Instruction Fuzzy Hash: C141907194020AAFCF14DF65C995AEFBBB8EF05300F284156E945A3291EB309E44DF71
                                              Strings
                                              • VUUU, xrefs: 00CD83E8
                                              • VUUU, xrefs: 00D15DF0
                                              • VUUU, xrefs: 00CD843C
                                              • 84f544bba202baeceba32696cbe3b53c01faace3041cc6d0f6a8b8c6fb8266076aa461dda0357bdb03e690c011e026262bb61d984c2abb4d19659696ccd3dd548b, xrefs: 00D15D0F
                                              • VUUU, xrefs: 00CD83FA
                                              • ERCP, xrefs: 00CD813C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 84f544bba202baeceba32696cbe3b53c01faace3041cc6d0f6a8b8c6fb8266076aa461dda0357bdb03e690c011e026262bb61d984c2abb4d19659696ccd3dd548b$ERCP$VUUU$VUUU$VUUU$VUUU
                                              • API String ID: 0-5007346
                                              • Opcode ID: 260696269eaa2141fcf581c223390a372dc7c568392f10200bedd6fcd98a9844
                                              • Instruction ID: 19777d4a2cba1b7fdd09f645a4dd5a33f32da511beb82243a46780076a9b7833
                                              • Opcode Fuzzy Hash: 260696269eaa2141fcf581c223390a372dc7c568392f10200bedd6fcd98a9844
                                              • Instruction Fuzzy Hash: E8A26E70A0061ADBDF24CF59D8407EEB7B1BB54310F28819AE915A7385EB74DEC5CBA0
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00CE9A4E
                                              • GetSysColor.USER32(0000000F), ref: 00CE9B23
                                              • SetBkColor.GDI32(?,00000000), ref: 00CE9B36
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Color$LongProcWindow
                                              • String ID:
                                              • API String ID: 3131106179-0
                                              • Opcode ID: 52bdccd63dfafe6f08c63e18d21975ec022d2b98ce4f27dee26aff4c55f1eb13
                                              • Instruction ID: dc0b9a938d729b37378c5ba8a6964cf1e73c73293ffe05b57767a2882b096e0f
                                              • Opcode Fuzzy Hash: 52bdccd63dfafe6f08c63e18d21975ec022d2b98ce4f27dee26aff4c55f1eb13
                                              • Instruction Fuzzy Hash: D0A12A702086A4BFE738AA3F9C59E7B365DDF56308F140229F412C6691CA35DE01E276
                                              APIs
                                                • Part of subcall function 00D5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00D5307A
                                                • Part of subcall function 00D5304E: _wcslen.LIBCMT ref: 00D5309B
                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00D5185D
                                              • WSAGetLastError.WSOCK32 ref: 00D51884
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00D518DB
                                              • WSAGetLastError.WSOCK32 ref: 00D518E6
                                              • closesocket.WSOCK32(00000000), ref: 00D51915
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 1601658205-0
                                              • Opcode ID: 230a9aaf0b48216830891ee598c92fb0ccaf3080027907b75445d057887f8c7a
                                              • Instruction ID: 20b0328621884323e4440deb8df15e48ad1be9e55a2062833fbbb0d129a6179e
                                              • Opcode Fuzzy Hash: 230a9aaf0b48216830891ee598c92fb0ccaf3080027907b75445d057887f8c7a
                                              • Instruction Fuzzy Hash: D151D275A00200AFDB20AF64C886F6A77E5AB44718F188159FE459F3C3D771AD41DBE1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                              • String ID:
                                              • API String ID: 292994002-0
                                              • Opcode ID: 3ea3dd3df86cc72ea51ab66845a3952ebec2481626bbdfdcdfc23483ce6118ce
                                              • Instruction ID: fe145e58f5571a5ac671f85d57644775574cbc110ee5dd4f732b2737014d9ab6
                                              • Opcode Fuzzy Hash: 3ea3dd3df86cc72ea51ab66845a3952ebec2481626bbdfdcdfc23483ce6118ce
                                              • Instruction Fuzzy Hash: 5721B2357406115FD7209F2AC884B6ABBE5EF95315F1E9069E886CB351CBB1EC42CBB0
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00D5A6AC
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00D5A6BA
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • Process32NextW.KERNEL32(00000000,?), ref: 00D5A79C
                                              • CloseHandle.KERNEL32(00000000), ref: 00D5A7AB
                                                • Part of subcall function 00CECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00D13303,?), ref: 00CECE8A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                              • String ID:
                                              • API String ID: 1991900642-0
                                              • Opcode ID: 89984a72b51b44f3e5123b1ec05aae0c97496ec918e27914d3ffdcb4d12aabb7
                                              • Instruction ID: 9e5647c83707908a81b9bbfcd66da9ebc6ef838d42fe9102eb0b8d99c03c52d0
                                              • Opcode Fuzzy Hash: 89984a72b51b44f3e5123b1ec05aae0c97496ec918e27914d3ffdcb4d12aabb7
                                              • Instruction Fuzzy Hash: DC514B715083109FD710EF24D886A6BBBE8FF89754F00491EF985973A1EB70D904DBA2
                                              APIs
                                              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00D3AAAC
                                              • SetKeyboardState.USER32(00000080), ref: 00D3AAC8
                                              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00D3AB36
                                              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00D3AB88
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: f0ae9f6070b0f3ef2e9e94245c02f5d8e66a75fae2a0937034861b587526cc72
                                              • Instruction ID: 01a656aa6afc5be41a2e609d02f22d528e913e972ab03ef03b96feceedf1f3d9
                                              • Opcode Fuzzy Hash: f0ae9f6070b0f3ef2e9e94245c02f5d8e66a75fae2a0937034861b587526cc72
                                              • Instruction Fuzzy Hash: AF311631B40248AEFB35CB6CCC05BFAFBAAAB55310F08421AF1D1961E1D3748981C776
                                              APIs
                                              • InternetReadFile.WININET(?,?,00000400,?), ref: 00D4CE89
                                              • GetLastError.KERNEL32(?,00000000), ref: 00D4CEEA
                                              • SetEvent.KERNEL32(?,?,00000000), ref: 00D4CEFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorEventFileInternetLastRead
                                              • String ID:
                                              • API String ID: 234945975-0
                                              • Opcode ID: 7851093cff8d060f6c016a5db7b4b5384786457294f9df035eb80b3838755299
                                              • Instruction ID: 039dead9e4bfaff765efcdf4476700ba41cda5b599106567b9864285063cf127
                                              • Opcode Fuzzy Hash: 7851093cff8d060f6c016a5db7b4b5384786457294f9df035eb80b3838755299
                                              • Instruction Fuzzy Hash: 0E21BD715123059BDB60DFA5C948BA677F8EF00314F14542EE686D2251E774EE089B74
                                              APIs
                                              • lstrlenW.KERNEL32(?,00D15222), ref: 00D3DBCE
                                              • GetFileAttributesW.KERNEL32(?), ref: 00D3DBDD
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00D3DBEE
                                              • FindClose.KERNEL32(00000000), ref: 00D3DBFA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirstlstrlen
                                              • String ID:
                                              • API String ID: 2695905019-0
                                              • Opcode ID: 53400322efeb415d456e71052ee70e80299a6822d9266a300c87c73cfaa72401
                                              • Instruction ID: 4a6929b73a437db84aa830a6b6455584569169de1956f7e785f4dcd2710c96e7
                                              • Opcode Fuzzy Hash: 53400322efeb415d456e71052ee70e80299a6822d9266a300c87c73cfaa72401
                                              • Instruction Fuzzy Hash: 85F0A070830A105782206B78AC0D8BA777D9E0A334F146702F8B6C22E0EBF099548AB9
                                              APIs
                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00D382AA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: ($|
                                              • API String ID: 1659193697-1631851259
                                              • Opcode ID: a8d6bd7e81685027b398cbc99aa73a67dc5eed0036e30943fd4632a18624bad6
                                              • Instruction ID: 2016d4d7b080f07ea18b613f12af6b2504f4dc8e8570b07e8e602c7f36932c73
                                              • Opcode Fuzzy Hash: a8d6bd7e81685027b398cbc99aa73a67dc5eed0036e30943fd4632a18624bad6
                                              • Instruction Fuzzy Hash: 58323475A007059FCB28CF69C481A6AB7F0FF48710B15846EE49ADB3A1EB70E941CB54
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00D45CC1
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00D45D17
                                              • FindClose.KERNEL32(?), ref: 00D45D5F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseFirstNext
                                              • String ID:
                                              • API String ID: 3541575487-0
                                              • Opcode ID: ad77d2eb135e8be4d5e8003d36e9804ab5885d7f9091fece88e2e1160ce1a65f
                                              • Instruction ID: b2c9df2713a000bc65ae1be089883e34e48bc089f4e036f33c215a46e6216e58
                                              • Opcode Fuzzy Hash: ad77d2eb135e8be4d5e8003d36e9804ab5885d7f9091fece88e2e1160ce1a65f
                                              • Instruction Fuzzy Hash: 3D518C34A046019FC714DF28D494A96B7E4FF49314F18855EE99A8B3A2DB30ED45CFA1
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 00D0271A
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D02724
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00D02731
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: d080d02999b31a44f06e44187dbc2b0d02881191579e7efdb4fc4d0a8361f8eb
                                              • Instruction ID: e0fe37015dfed7ffbea1668fe664e2c62115474c0edc18fa00eb9358ee987735
                                              • Opcode Fuzzy Hash: d080d02999b31a44f06e44187dbc2b0d02881191579e7efdb4fc4d0a8361f8eb
                                              • Instruction Fuzzy Hash: AC31C47491131C9BCB61DF64DC88798B7B8BF08710F5041EAE90CA6261E7709F859F55
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00D451DA
                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00D45238
                                              • SetErrorMode.KERNEL32(00000000), ref: 00D452A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DiskFreeSpace
                                              • String ID:
                                              • API String ID: 1682464887-0
                                              • Opcode ID: 0c6f8290782a287118b04da808718c9ff59023d19302078b0e1c31a84e5f05e8
                                              • Instruction ID: 0e142e2aed1294b59164255d2bb96f8af9fb4cd8f979c6b0a796131263c0da64
                                              • Opcode Fuzzy Hash: 0c6f8290782a287118b04da808718c9ff59023d19302078b0e1c31a84e5f05e8
                                              • Instruction Fuzzy Hash: 1D318075A00608DFDB00DF94D8C4EADBBB4FF09314F08809AE945AB356DB71E845CB60
                                              APIs
                                                • Part of subcall function 00CEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00CF0668
                                                • Part of subcall function 00CEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00CF0685
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D3170D
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D3173A
                                              • GetLastError.KERNEL32 ref: 00D3174A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 577356006-0
                                              • Opcode ID: 1c316048f61cee67eb5e0f1d5aa20194d1b414f965e582b9974ba5e382ec3558
                                              • Instruction ID: 048607d7c075e77b41e2d18d27f8cf8aea7f63d850b565fa76f752c3b04b0d21
                                              • Opcode Fuzzy Hash: 1c316048f61cee67eb5e0f1d5aa20194d1b414f965e582b9974ba5e382ec3558
                                              • Instruction Fuzzy Hash: 1911CEB2414305AFD728AF54DC86E6ABBBDEB04754B24852EE09693241EB70FC428A30
                                              APIs
                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00D3D608
                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00D3D645
                                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00D3D650
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseControlCreateDeviceFileHandle
                                              • String ID:
                                              • API String ID: 33631002-0
                                              • Opcode ID: 3c09d281cbcb304194f778610d25a62f64d1b49fad9e316201811dd2735e805f
                                              • Instruction ID: 4e9164ca4c80e9ff5fa75513057c4600dce7c879d362c13679717bf2136a4a8b
                                              • Opcode Fuzzy Hash: 3c09d281cbcb304194f778610d25a62f64d1b49fad9e316201811dd2735e805f
                                              • Instruction Fuzzy Hash: E3113C75E05328BBDB108F95EC45FAFBBBCEB45B50F108115F914E7290D6B05A058BA1
                                              APIs
                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00D3168C
                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00D316A1
                                              • FreeSid.ADVAPI32(?), ref: 00D316B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                              • String ID:
                                              • API String ID: 3429775523-0
                                              • Opcode ID: 834d50565676eb72b7cbaf4eef415f534fa7aacba3eabb7902f1b19ea1a332a3
                                              • Instruction ID: 47c71c9bdbd6ac73debc1d93d0415997e4fe46de5efc11ae6df0f2645c49bfc4
                                              • Opcode Fuzzy Hash: 834d50565676eb72b7cbaf4eef415f534fa7aacba3eabb7902f1b19ea1a332a3
                                              • Instruction Fuzzy Hash: 24F0F475960309FBDB00DFE49D8AAAEBBBCEB08604F505565E501E2281E7B4AA448A60
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00D028E9,?,00CF4CBE,00D028E9,00D988B8,0000000C,00CF4E15,00D028E9,00000002,00000000,?,00D028E9), ref: 00CF4D09
                                              • TerminateProcess.KERNEL32(00000000,?,00CF4CBE,00D028E9,00D988B8,0000000C,00CF4E15,00D028E9,00000002,00000000,?,00D028E9), ref: 00CF4D10
                                              • ExitProcess.KERNEL32 ref: 00CF4D22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$CurrentExitTerminate
                                              • String ID:
                                              • API String ID: 1703294689-0
                                              • Opcode ID: d2c78a65b44c951d0197fb99d0b36d8761e7ab1713cab6e51a8ffe1f91e8e25c
                                              • Instruction ID: 4a27a58c5b573ef2272194a450013f84632ab92743d574ac91a29c086ead0df2
                                              • Opcode Fuzzy Hash: d2c78a65b44c951d0197fb99d0b36d8761e7ab1713cab6e51a8ffe1f91e8e25c
                                              • Instruction Fuzzy Hash: 69E04631010248ABCF11AF10DD09A6A3F29EB82781B004014FD58CA322CB75DE42CAA0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: /
                                              • API String ID: 0-2043925204
                                              • Opcode ID: c49ff5560df38828faebfc5892ad76d66daf5346c22cda1589b39a8e736f11cd
                                              • Instruction ID: bf665a7ebf4c91118c665de50e4ee056edf65d6a8eaa33f907704f33915b9f74
                                              • Opcode Fuzzy Hash: c49ff5560df38828faebfc5892ad76d66daf5346c22cda1589b39a8e736f11cd
                                              • Instruction Fuzzy Hash: D4412772910219AFCB209FB9DC89FBB77B8EB84314F144269F909D72C0E6719D818B74
                                              APIs
                                              • GetUserNameW.ADVAPI32(?,?), ref: 00D2D28C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: NameUser
                                              • String ID: X64
                                              • API String ID: 2645101109-893830106
                                              • Opcode ID: 5434b883eb43b8a932e92d9e175f4898333ce367204ab5431c4d6c574328ec12
                                              • Instruction ID: e5b6b05dbb9ebcbf2804813761f4b892e442bf002d69a0df1077e6b2bd648489
                                              • Opcode Fuzzy Hash: 5434b883eb43b8a932e92d9e175f4898333ce367204ab5431c4d6c574328ec12
                                              • Instruction Fuzzy Hash: 59D0CAB481122DFACB90CBA0ECC8DEAB3BCBB14309F100292F146E2100DB7096488F30
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                              • Instruction ID: 3bbc76cbcae2444bb561cc24157592e706e7032f1201e423bc4ab4f7e9d89b1d
                                              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                              • Instruction Fuzzy Hash: 93022A71E0021D9BDF54CFA9C9806ADFBF1EF88314F25816AD929E7380D731AA418B91
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00D46918
                                              • FindClose.KERNEL32(00000000), ref: 00D46961
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: f8e6e84f287037931b7cf0574e91376dacb36cb116d8c58db110c0b855930202
                                              • Instruction ID: aa777d8f30386c2cca74a8d17083e497ceb42db6ef7afdd254f4d9d1b5da8d91
                                              • Opcode Fuzzy Hash: f8e6e84f287037931b7cf0574e91376dacb36cb116d8c58db110c0b855930202
                                              • Instruction Fuzzy Hash: C91193316142019FC710DF69D4C4A16BBE5FF89328F18C69AE9698F3A2D770EC05CBA1
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00D54891,?,?,00000035,?), ref: 00D437E4
                                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00D54891,?,?,00000035,?), ref: 00D437F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorFormatLastMessage
                                              • String ID:
                                              • API String ID: 3479602957-0
                                              • Opcode ID: a6700b69dbcd1902334d296030d49cfb187dbe7fb9b577220296d2caa9917f0f
                                              • Instruction ID: 8dd8f75f7866c7aff00786a0c55c4fdeeb7dbcdfe99232b5b3fada39b146a17a
                                              • Opcode Fuzzy Hash: a6700b69dbcd1902334d296030d49cfb187dbe7fb9b577220296d2caa9917f0f
                                              • Instruction Fuzzy Hash: 63F0E5B57053282BE720176A9C4DFEB3AAEEFC5761F000165F609D2391D9A09944C7B0
                                              APIs
                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00D3B25D
                                              • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 00D3B270
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: InputSendkeybd_event
                                              • String ID:
                                              • API String ID: 3536248340-0
                                              • Opcode ID: f782242bf5b9ee6d7851b2e4f7967e5a2db5a68e7a7a89b15a4e0b8ad42d9667
                                              • Instruction ID: 86d660cc87678e52afb2a4cb1a8d6634ab8ec9f293d903a4f37c76574aa57d3b
                                              • Opcode Fuzzy Hash: f782242bf5b9ee6d7851b2e4f7967e5a2db5a68e7a7a89b15a4e0b8ad42d9667
                                              • Instruction Fuzzy Hash: 2DF01D7581428DAFDB059FA1C806BBE7BB4FF04319F04900AF965A5192C7B9C6119FA4
                                              APIs
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D311FC), ref: 00D310D4
                                              • CloseHandle.KERNEL32(?,?,00D311FC), ref: 00D310E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AdjustCloseHandlePrivilegesToken
                                              • String ID:
                                              • API String ID: 81990902-0
                                              • Opcode ID: e7ba6ffdb91090bbb319f0ca3ffd06b106b027b24334c5c45f9df8872dffb63e
                                              • Instruction ID: e99c4685b22d5e2e512210a128ac4eb45aa6b2c859a17c7ce518a5e8921e20d3
                                              • Opcode Fuzzy Hash: e7ba6ffdb91090bbb319f0ca3ffd06b106b027b24334c5c45f9df8872dffb63e
                                              • Instruction Fuzzy Hash: E1E0BF72018751AEE7252B52FC05E777BA9EB04310F14882DF5A5815B1DBA26C91EB70
                                              Strings
                                              • Variable is not of type 'Object'., xrefs: 00D20C40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Variable is not of type 'Object'.
                                              • API String ID: 0-1840281001
                                              • Opcode ID: e3d35a10fe788e709ea83001b15038ba6fda535055318e44bb7a620841b9401a
                                              • Instruction ID: d6092653fc448d6c8d25c2f9567f7cf3e74a09e6bf62076f0fab7aac08de2a02
                                              • Opcode Fuzzy Hash: e3d35a10fe788e709ea83001b15038ba6fda535055318e44bb7a620841b9401a
                                              • Instruction Fuzzy Hash: B9329C70900229DBCF14DF94D8C0AEDBBB5FF15308F24805AEA16AB392D775AE45DB60
                                              APIs
                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D06766,?,?,00000008,?,?,00D0FEFE,00000000), ref: 00D06998
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ExceptionRaise
                                              • String ID:
                                              • API String ID: 3997070919-0
                                              • Opcode ID: 045bf92b5bfcc9276e1cf34d4de2ac85eefc64213dd434aa8f328d26de81ab8a
                                              • Instruction ID: b50a5930e9c06529890fcd4cc5e6967e6e6e45c9fd44c4fe099e5950c8e80872
                                              • Opcode Fuzzy Hash: 045bf92b5bfcc9276e1cf34d4de2ac85eefc64213dd434aa8f328d26de81ab8a
                                              • Instruction Fuzzy Hash: F4B107316106099FD719CF28C48AB657BE0FF45364F29C658E899CF2E2C735E9A1CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3916222277
                                              • Opcode ID: 9470ec0a2f20f08605e867d3aad6ae2fa0d6345cbea86141e1a3f2521b6e876c
                                              • Instruction ID: 88125a70bc37c7b04a78e18206107b506ebe1bd69202dd126c86f1df1af2bc1b
                                              • Opcode Fuzzy Hash: 9470ec0a2f20f08605e867d3aad6ae2fa0d6345cbea86141e1a3f2521b6e876c
                                              • Instruction Fuzzy Hash: 06126E719002299BCB24CF59D8816FEB7F5FF58710F14819AE849EB255EB309E81DFA0
                                              APIs
                                              • BlockInput.USER32(00000001), ref: 00D4EABD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: BlockInput
                                              • String ID:
                                              • API String ID: 3456056419-0
                                              • Opcode ID: 54ef1e057cb78fab933c58a2eff859236db39f1e5b30a64f103e1fbc779b68a8
                                              • Instruction ID: 445cb493a9facf9ea56e57676e87d6596b14709e5b729c679ef0a0212b7dd139
                                              • Opcode Fuzzy Hash: 54ef1e057cb78fab933c58a2eff859236db39f1e5b30a64f103e1fbc779b68a8
                                              • Instruction Fuzzy Hash: 9BE01A31210205AFC710EF99D845E9AB7E9BF98760F008416FE49C7361DAB0E8408BA0
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00CF03EE), ref: 00CF09DA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: ae98ae2c71543d8d408b405650e3104e14dd08f39df6289eef4d64738b1fc837
                                              • Instruction ID: 428e978235ed27b55504e71674b82797a2a3004736587255302cae46befc25cb
                                              • Opcode Fuzzy Hash: ae98ae2c71543d8d408b405650e3104e14dd08f39df6289eef4d64738b1fc837
                                              • Instruction Fuzzy Hash:
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0
                                              • API String ID: 0-4108050209
                                              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                              • Instruction ID: d952601aeb7275b1b7dbc867a2384808b30029783c87dbd3fc5e73fbdd5cb7a8
                                              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                              • Instruction Fuzzy Hash: D151876160C60D5BDFF88B69895D7BE27959B02380F180709EBA2EB2C2C655DF06E353
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ab5750a965cc4250147ce37899d39c187de997c2727d7b8da3e738b8f27130c5
                                              • Instruction ID: c135be8a44e6dc449688141f732544cc7cf5e47c80a987540580cc49f4173b9e
                                              • Opcode Fuzzy Hash: ab5750a965cc4250147ce37899d39c187de997c2727d7b8da3e738b8f27130c5
                                              • Instruction Fuzzy Hash: DD321221D29F414DD7239634DC223356289AFB73C5F15D727F81EB9AA5EB29D4C34110
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d602b0222a16a96665c3d66c1bcd962e8a502398b8176de80ba4daef5fe7e3ed
                                              • Instruction ID: 68e0e82a031443f89c5598161f8be8f007d56ca3776e7c384dba304d0e8ebf75
                                              • Opcode Fuzzy Hash: d602b0222a16a96665c3d66c1bcd962e8a502398b8176de80ba4daef5fe7e3ed
                                              • Instruction Fuzzy Hash: 15323731A101A58BCF28CF2DE4D0A7D77A1EF55308F3C956AE499DB291D230DD82DB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7d0b10a3e4615f15a26f1ebce4830d01e8a81f3ef33e901b6578a08fe08a427d
                                              • Instruction ID: 312269a1a64c06019cefa895912f0bd6a337342762d41d48ac8757dc04338441
                                              • Opcode Fuzzy Hash: 7d0b10a3e4615f15a26f1ebce4830d01e8a81f3ef33e901b6578a08fe08a427d
                                              • Instruction Fuzzy Hash: 2122A170A00609EFDF14CF65E881AEEB3F1FF44300F14462AE916A7395EB39A951DB60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 461aabd6c1df1450ed637b61de1882bcbca5524c9f528270721f04f9b6da2281
                                              • Instruction ID: e208a4aea6d32c29aa4e896a6ad9bb8233b782dee3e5ac753f6518cf48518894
                                              • Opcode Fuzzy Hash: 461aabd6c1df1450ed637b61de1882bcbca5524c9f528270721f04f9b6da2281
                                              • Instruction Fuzzy Hash: 5602B3B1A00209FBDB04DF55E881AAEB7B1FF44300F148169E956DB391EB31EE51DBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2205fab4d5b3fa9c6163587416ee59ad611766e357d76d35684c234db342a76
                                              • Instruction ID: 9899b5de8db1f15c60a4f3caf29984ff02fd773daa80d3c615706b1a8b89763c
                                              • Opcode Fuzzy Hash: d2205fab4d5b3fa9c6163587416ee59ad611766e357d76d35684c234db342a76
                                              • Instruction Fuzzy Hash: 46B1DF20D2AF414DD32396398821336B65CAFBB6D5B91D71BFC1AB4E62FB2286C35141
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f1d0b2682c71f6960c46cfe9b1390b8f6fa34e1af9f72877861fd72665a12a62
                                              • Instruction ID: 15791960d7d5653e69d61f8427ca2b5e126ad3a1640bfc9334f16f07ab21ae84
                                              • Opcode Fuzzy Hash: f1d0b2682c71f6960c46cfe9b1390b8f6fa34e1af9f72877861fd72665a12a62
                                              • Instruction Fuzzy Hash: 1761477120870D97EEF89B288D95BBE2394DF42700F101B1AEB53DB281DA519F46E357
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d1027cb868dee1e14c20e1c76070bd5bf7604678351415d01a915be00dd7de7e
                                              • Instruction ID: 23699eb154f9cb2ecc99cc4bd675d4776d063f1ae958e43b8fd0f4cb838cf988
                                              • Opcode Fuzzy Hash: d1027cb868dee1e14c20e1c76070bd5bf7604678351415d01a915be00dd7de7e
                                              • Instruction Fuzzy Hash: BD61AA3160870D5BDEF84B285895BBF2399EF42704F900B5AEB53CB281DA529F46D313
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                              • Instruction ID: bc716b249208d9c7067d396c55a572ca19e6da8a0b7001216b1a51c95b1aad86
                                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                              • Instruction Fuzzy Hash: DB41B571D1051CDBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2f1fe0e2cd635ae132a79d3665ef9b1a5ffd125dbbdfeaa0298f7eac09020d0
                                              • Instruction ID: 2777cac83e6870fe3e81ecbec8c01c38d7208aca8f2b6f901bc9f7f2212088a3
                                              • Opcode Fuzzy Hash: d2f1fe0e2cd635ae132a79d3665ef9b1a5ffd125dbbdfeaa0298f7eac09020d0
                                              • Instruction Fuzzy Hash: DD21BB326216158BD728CF79C81367E77E5A754310F59862EE4A7C37D0DE39A904C750
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                              • Instruction ID: 17d36aef37f2e694e29fa12ce0e2709c698ff1e06931b28730f33d4de4d84c16
                                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                              • Instruction Fuzzy Hash: CC01C474A01108EFCB48DF98D5809AEF7F5FF89310F208199E809AB341D770AE41DB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                              • Instruction ID: ab8823e5b27bdfcef6d2ff7c8d690a2b42bdccbc48526fa3d25d2958470a7fe7
                                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                              • Instruction Fuzzy Hash: DE018078A01109EFCB48DF98D5909AEF7F5FB89310F208599E819AB741D734AE41DB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188529548.0000000000EA1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA1000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ea1000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00D52B30
                                              • DeleteObject.GDI32(00000000), ref: 00D52B43
                                              • DestroyWindow.USER32 ref: 00D52B52
                                              • GetDesktopWindow.USER32 ref: 00D52B6D
                                              • GetWindowRect.USER32(00000000), ref: 00D52B74
                                              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00D52CA3
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00D52CB1
                                              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52CF8
                                              • GetClientRect.USER32(00000000,?), ref: 00D52D04
                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00D52D40
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52D62
                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52D75
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52D80
                                              • GlobalLock.KERNEL32(00000000), ref: 00D52D89
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52D98
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00D52DA1
                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52DA8
                                              • GlobalFree.KERNEL32(00000000), ref: 00D52DB3
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52DC5
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00D6FC38,00000000), ref: 00D52DDB
                                              • GlobalFree.KERNEL32(00000000), ref: 00D52DEB
                                              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00D52E11
                                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00D52E30
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D52E52
                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D5303F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                              • String ID: $AutoIt v3$DISPLAY$static
                                              • API String ID: 2211948467-2373415609
                                              • Opcode ID: b0a5b8345d97fa459c7ee89eefb15e72f3efc86c40b7b12fdd549b60a1b38905
                                              • Instruction ID: e39f4824ad590bb70d3a279bb2e6a8345cba8021ad494cdd197486690f842729
                                              • Opcode Fuzzy Hash: b0a5b8345d97fa459c7ee89eefb15e72f3efc86c40b7b12fdd549b60a1b38905
                                              • Instruction Fuzzy Hash: B5028975A10205AFDB14DFA8DC89EBE7BB9EB49311F048109F915EB2A1DB74AD04CB70
                                              APIs
                                              • SetTextColor.GDI32(?,00000000), ref: 00D6712F
                                              • GetSysColorBrush.USER32(0000000F), ref: 00D67160
                                              • GetSysColor.USER32(0000000F), ref: 00D6716C
                                              • SetBkColor.GDI32(?,000000FF), ref: 00D67186
                                              • SelectObject.GDI32(?,?), ref: 00D67195
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00D671C0
                                              • GetSysColor.USER32(00000010), ref: 00D671C8
                                              • CreateSolidBrush.GDI32(00000000), ref: 00D671CF
                                              • FrameRect.USER32(?,?,00000000), ref: 00D671DE
                                              • DeleteObject.GDI32(00000000), ref: 00D671E5
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00D67230
                                              • FillRect.USER32(?,?,?), ref: 00D67262
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D67284
                                                • Part of subcall function 00D673E8: GetSysColor.USER32(00000012), ref: 00D67421
                                                • Part of subcall function 00D673E8: SetTextColor.GDI32(?,?), ref: 00D67425
                                                • Part of subcall function 00D673E8: GetSysColorBrush.USER32(0000000F), ref: 00D6743B
                                                • Part of subcall function 00D673E8: GetSysColor.USER32(0000000F), ref: 00D67446
                                                • Part of subcall function 00D673E8: GetSysColor.USER32(00000011), ref: 00D67463
                                                • Part of subcall function 00D673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D67471
                                                • Part of subcall function 00D673E8: SelectObject.GDI32(?,00000000), ref: 00D67482
                                                • Part of subcall function 00D673E8: SetBkColor.GDI32(?,00000000), ref: 00D6748B
                                                • Part of subcall function 00D673E8: SelectObject.GDI32(?,?), ref: 00D67498
                                                • Part of subcall function 00D673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00D674B7
                                                • Part of subcall function 00D673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D674CE
                                                • Part of subcall function 00D673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00D674DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                              • String ID:
                                              • API String ID: 4124339563-0
                                              • Opcode ID: 3f49f52b83b15a0a51cd933688f166c2cb8a8a03de14058c618e5b58cde3c134
                                              • Instruction ID: 7786b7b73b08ec0a5aa2a06d0e09e82c961ebce6700cc19ed7d042fe989b8c13
                                              • Opcode Fuzzy Hash: 3f49f52b83b15a0a51cd933688f166c2cb8a8a03de14058c618e5b58cde3c134
                                              • Instruction Fuzzy Hash: B5A19072018305AFDB00DF60DC48E6B7BA9FB49324F141A19F9A2D62E1D7B9E944CB71
                                              APIs
                                              • DestroyWindow.USER32(00000000), ref: 00D5273E
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00D5286A
                                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00D528A9
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00D528B9
                                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00D52900
                                              • GetClientRect.USER32(00000000,?), ref: 00D5290C
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00D52955
                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00D52964
                                              • GetStockObject.GDI32(00000011), ref: 00D52974
                                              • SelectObject.GDI32(00000000,00000000), ref: 00D52978
                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00D52988
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D52991
                                              • DeleteDC.GDI32(00000000), ref: 00D5299A
                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00D529C6
                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00D529DD
                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00D52A1D
                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00D52A31
                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00D52A42
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00D52A77
                                              • GetStockObject.GDI32(00000011), ref: 00D52A82
                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00D52A8D
                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00D52A97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                              • API String ID: 2910397461-517079104
                                              • Opcode ID: 1fd162f6a6c3fffd9754bc32f9add98159f361aae1cff56d578fa086853dc2aa
                                              • Instruction ID: 4c69cbcdf590f3fab9d13cfda372d745238a12554412cb741e77bf121a4cf455
                                              • Opcode Fuzzy Hash: 1fd162f6a6c3fffd9754bc32f9add98159f361aae1cff56d578fa086853dc2aa
                                              • Instruction Fuzzy Hash: 54B16C75A10315AFEB14DFA8DC45FAE7BA9EB09711F008215FA14E72A0D7B4ED44CBA0
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00D44AED
                                              • GetDriveTypeW.KERNEL32(?,00D6CB68,?,\\.\,00D6CC08), ref: 00D44BCA
                                              • SetErrorMode.KERNEL32(00000000,00D6CB68,?,\\.\,00D6CC08), ref: 00D44D36
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DriveType
                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                              • API String ID: 2907320926-4222207086
                                              • Opcode ID: cc77c025645c2d0f7c51ae72e7b9dd6b03c98a7c88a83009ef2d5fd822a28cb4
                                              • Instruction ID: 000524abf504c806b6a4acbbfc9371995e0bcdbc7249cf8bda74b6c615d0e427
                                              • Opcode Fuzzy Hash: cc77c025645c2d0f7c51ae72e7b9dd6b03c98a7c88a83009ef2d5fd822a28cb4
                                              • Instruction Fuzzy Hash: 3B61BE307052069FCF04DF24CAC2A79B7A1EF44341B288016F846AB391DB35ED85EB71
                                              APIs
                                              • GetSysColor.USER32(00000012), ref: 00D67421
                                              • SetTextColor.GDI32(?,?), ref: 00D67425
                                              • GetSysColorBrush.USER32(0000000F), ref: 00D6743B
                                              • GetSysColor.USER32(0000000F), ref: 00D67446
                                              • CreateSolidBrush.GDI32(?), ref: 00D6744B
                                              • GetSysColor.USER32(00000011), ref: 00D67463
                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D67471
                                              • SelectObject.GDI32(?,00000000), ref: 00D67482
                                              • SetBkColor.GDI32(?,00000000), ref: 00D6748B
                                              • SelectObject.GDI32(?,?), ref: 00D67498
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00D674B7
                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D674CE
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D674DB
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D6752A
                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00D67554
                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00D67572
                                              • DrawFocusRect.USER32(?,?), ref: 00D6757D
                                              • GetSysColor.USER32(00000011), ref: 00D6758E
                                              • SetTextColor.GDI32(?,00000000), ref: 00D67596
                                              • DrawTextW.USER32(?,00D670F5,000000FF,?,00000000), ref: 00D675A8
                                              • SelectObject.GDI32(?,?), ref: 00D675BF
                                              • DeleteObject.GDI32(?), ref: 00D675CA
                                              • SelectObject.GDI32(?,?), ref: 00D675D0
                                              • DeleteObject.GDI32(?), ref: 00D675D5
                                              • SetTextColor.GDI32(?,?), ref: 00D675DB
                                              • SetBkColor.GDI32(?,?), ref: 00D675E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 1996641542-0
                                              • Opcode ID: 70944d8e982afabeaeef995bcfeed3f06b5eb0af473bf06f295de12b1c3cfba1
                                              • Instruction ID: 6ca124b3e5ce1de4be2363cbd1b330c63dc923253efe343e54ff0527c08eaba7
                                              • Opcode Fuzzy Hash: 70944d8e982afabeaeef995bcfeed3f06b5eb0af473bf06f295de12b1c3cfba1
                                              • Instruction Fuzzy Hash: CF615D72900318AFDF01DFA4DC49AAE7FB9EB09320F155125F955EB2A1D7B4A940CBB0
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00D61128
                                              • GetDesktopWindow.USER32 ref: 00D6113D
                                              • GetWindowRect.USER32(00000000), ref: 00D61144
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D61199
                                              • DestroyWindow.USER32(?), ref: 00D611B9
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00D611ED
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D6120B
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00D6121D
                                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00D61232
                                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00D61245
                                              • IsWindowVisible.USER32(00000000), ref: 00D612A1
                                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00D612BC
                                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00D612D0
                                              • GetWindowRect.USER32(00000000,?), ref: 00D612E8
                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00D6130E
                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00D61328
                                              • CopyRect.USER32(?,?), ref: 00D6133F
                                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 00D613AA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                              • String ID: ($0$tooltips_class32
                                              • API String ID: 698492251-4156429822
                                              • Opcode ID: 6cab83744641fd48d63c28dd2ee59ce9165fc0f3bffbd9f1a1bed7c67885a071
                                              • Instruction ID: bf0781316e216b300793a865cacf1d529cbf5624cb670c68076c6d347c747ae4
                                              • Opcode Fuzzy Hash: 6cab83744641fd48d63c28dd2ee59ce9165fc0f3bffbd9f1a1bed7c67885a071
                                              • Instruction Fuzzy Hash: 8EB1AC75604341AFDB10DF64C885B6ABBE4FF88340F04891DF99A9B2A1D771EC44CBA6
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00D602E5
                                              • _wcslen.LIBCMT ref: 00D6031F
                                              • _wcslen.LIBCMT ref: 00D60389
                                              • _wcslen.LIBCMT ref: 00D603F1
                                              • _wcslen.LIBCMT ref: 00D60475
                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00D604C5
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D60504
                                                • Part of subcall function 00CEF9F2: _wcslen.LIBCMT ref: 00CEF9FD
                                                • Part of subcall function 00D3223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D32258
                                                • Part of subcall function 00D3223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D3228A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                              • API String ID: 1103490817-719923060
                                              • Opcode ID: d7ccf1084ec3c479cb1d610aa5b72f0c6a7872903902371797d6f1455f3e0353
                                              • Instruction ID: 3900fbc2ae407dba9906eb0cb9841af4d93db834ed659320744707f64afd61d2
                                              • Opcode Fuzzy Hash: d7ccf1084ec3c479cb1d610aa5b72f0c6a7872903902371797d6f1455f3e0353
                                              • Instruction Fuzzy Hash: A9E18C312182418FCB24DF24C59183BBBE6BF98314F18495DF9969B3A1DB30ED45DBA1
                                              APIs
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00CE8968
                                              • GetSystemMetrics.USER32(00000007), ref: 00CE8970
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00CE899B
                                              • GetSystemMetrics.USER32(00000008), ref: 00CE89A3
                                              • GetSystemMetrics.USER32(00000004), ref: 00CE89C8
                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00CE89E5
                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00CE89F5
                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00CE8A28
                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00CE8A3C
                                              • GetClientRect.USER32(00000000,000000FF), ref: 00CE8A5A
                                              • GetStockObject.GDI32(00000011), ref: 00CE8A76
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00CE8A81
                                                • Part of subcall function 00CE912D: GetCursorPos.USER32(?), ref: 00CE9141
                                                • Part of subcall function 00CE912D: ScreenToClient.USER32(00000000,?), ref: 00CE915E
                                                • Part of subcall function 00CE912D: GetAsyncKeyState.USER32(00000001), ref: 00CE9183
                                                • Part of subcall function 00CE912D: GetAsyncKeyState.USER32(00000002), ref: 00CE919D
                                              • SetTimer.USER32(00000000,00000000,00000028,00CE90FC), ref: 00CE8AA8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                              • String ID: AutoIt v3 GUI
                                              • API String ID: 1458621304-248962490
                                              • Opcode ID: 9b75d663ce5336fca04c6e33f6f74ae65a40376a83b520b77747eba892a11859
                                              • Instruction ID: 0552e6a2b5825b6ff0290d7249d0c219d21a73486a4490ac2fda0d369eef6759
                                              • Opcode Fuzzy Hash: 9b75d663ce5336fca04c6e33f6f74ae65a40376a83b520b77747eba892a11859
                                              • Instruction Fuzzy Hash: DBB15735A0034AAFDB14DFA9DC45BAE7BB5EB48314F144229FA16E7290DB74E940CF60
                                              APIs
                                                • Part of subcall function 00D310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D31114
                                                • Part of subcall function 00D310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D31120
                                                • Part of subcall function 00D310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D3112F
                                                • Part of subcall function 00D310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D31136
                                                • Part of subcall function 00D310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D3114D
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D30DF5
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D30E29
                                              • GetLengthSid.ADVAPI32(?), ref: 00D30E40
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00D30E7A
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D30E96
                                              • GetLengthSid.ADVAPI32(?), ref: 00D30EAD
                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00D30EB5
                                              • HeapAlloc.KERNEL32(00000000), ref: 00D30EBC
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D30EDD
                                              • CopySid.ADVAPI32(00000000), ref: 00D30EE4
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D30F13
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D30F35
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D30F47
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D30F6E
                                              • HeapFree.KERNEL32(00000000), ref: 00D30F75
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D30F7E
                                              • HeapFree.KERNEL32(00000000), ref: 00D30F85
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D30F8E
                                              • HeapFree.KERNEL32(00000000), ref: 00D30F95
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00D30FA1
                                              • HeapFree.KERNEL32(00000000), ref: 00D30FA8
                                                • Part of subcall function 00D31193: GetProcessHeap.KERNEL32(00000008,00D30BB1,?,00000000,?,00D30BB1,?), ref: 00D311A1
                                                • Part of subcall function 00D31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00D30BB1,?), ref: 00D311A8
                                                • Part of subcall function 00D31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00D30BB1,?), ref: 00D311B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                              • String ID:
                                              • API String ID: 4175595110-0
                                              • Opcode ID: 3b579c138c573c8d2cf6d65abf48165dba01b107640b8b5b600bf668b937b495
                                              • Instruction ID: c030b2047d29c2a8ed3e858602ded87c85f30d6073b8330e1cf2c016c00e2c86
                                              • Opcode Fuzzy Hash: 3b579c138c573c8d2cf6d65abf48165dba01b107640b8b5b600bf668b937b495
                                              • Instruction Fuzzy Hash: 25715B72A0430AABDF209FA4DC44BAEBBB8BF05300F084115F959E6291D7759905CB70
                                              APIs
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D5C4BD
                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00D6CC08,00000000,?,00000000,?,?), ref: 00D5C544
                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00D5C5A4
                                              • _wcslen.LIBCMT ref: 00D5C5F4
                                              • _wcslen.LIBCMT ref: 00D5C66F
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00D5C6B2
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00D5C7C1
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00D5C84D
                                              • RegCloseKey.ADVAPI32(?), ref: 00D5C881
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00D5C88E
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00D5C960
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                              • API String ID: 9721498-966354055
                                              • Opcode ID: c1a0bc03f2a3cbfa4854a057904ba18f38a5e9c084574db5d26c36e57ca2f047
                                              • Instruction ID: ecc08411a57565afc202e08288472e22925367e97f00fdec5e2d6ca4d8867766
                                              • Opcode Fuzzy Hash: c1a0bc03f2a3cbfa4854a057904ba18f38a5e9c084574db5d26c36e57ca2f047
                                              • Instruction Fuzzy Hash: F3127B352143019FCB14DF14C881A2ABBE5EF88715F08895DF98A9B3A2DB31FD45DB91
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00D609C6
                                              • _wcslen.LIBCMT ref: 00D60A01
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D60A54
                                              • _wcslen.LIBCMT ref: 00D60A8A
                                              • _wcslen.LIBCMT ref: 00D60B06
                                              • _wcslen.LIBCMT ref: 00D60B81
                                                • Part of subcall function 00CEF9F2: _wcslen.LIBCMT ref: 00CEF9FD
                                                • Part of subcall function 00D32BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D32BFA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                              • API String ID: 1103490817-4258414348
                                              • Opcode ID: b390d4cc7d045dcbc11dc52ee30bf1f36bb7b0e090dbcccf5e671b64bfc47020
                                              • Instruction ID: 7662a65bdd06d2f599f4feb3ff9f4793c4249f688e7a676fbd5868365806fba9
                                              • Opcode Fuzzy Hash: b390d4cc7d045dcbc11dc52ee30bf1f36bb7b0e090dbcccf5e671b64bfc47020
                                              • Instruction Fuzzy Hash: 38E17A312083019FCB14DF28C45192BBBE1FF98354B188A5DF8969B7A2D731ED45DBA2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharUpper
                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                              • API String ID: 1256254125-909552448
                                              • Opcode ID: 7f20ea987e095c6d7bd7f09b30438222ca4c80157bc566899da4ec5718fe5c04
                                              • Instruction ID: db907150860b3d1d51d6ce3776e132df087686dba10bfaac7d906f09fae76767
                                              • Opcode Fuzzy Hash: 7f20ea987e095c6d7bd7f09b30438222ca4c80157bc566899da4ec5718fe5c04
                                              • Instruction Fuzzy Hash: B871D43262026A8FCF20DE68CD415BF37A5AB60756F192528FC6697285E631CD49D3B0
                                              APIs
                                              • _wcslen.LIBCMT ref: 00D6835A
                                              • _wcslen.LIBCMT ref: 00D6836E
                                              • _wcslen.LIBCMT ref: 00D68391
                                              • _wcslen.LIBCMT ref: 00D683B4
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00D683F2
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00D65BF2), ref: 00D6844E
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D68487
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00D684CA
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D68501
                                              • FreeLibrary.KERNEL32(?), ref: 00D6850D
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00D6851D
                                              • DestroyIcon.USER32(?,?,?,?,?,00D65BF2), ref: 00D6852C
                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00D68549
                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00D68555
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                              • String ID: .dll$.exe$.icl
                                              • API String ID: 799131459-1154884017
                                              • Opcode ID: a05b7571d83ff3901891535ca5c9c73326030fa134879c977ef558ceb088dd5e
                                              • Instruction ID: 65fe8072672d3a3fcf2c0092c1d6701392cc60f2d75012be1b9201f2b3c2d32e
                                              • Opcode Fuzzy Hash: a05b7571d83ff3901891535ca5c9c73326030fa134879c977ef558ceb088dd5e
                                              • Instruction Fuzzy Hash: C561AF71550219BBEB14DF64CC81BBF77A8BB08711F10460AF956D61D1EFB4AA80E7B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 0-1645009161
                                              • Opcode ID: a78d993ab241c2425407bab9cb472b3a6b89114f6efa9bec9c8aaa00bad07a5b
                                              • Instruction ID: 8fc16734a69acb3b920160d8f8ff7ad155fbcc5e6e6671ba5f083cb8e36dc7be
                                              • Opcode Fuzzy Hash: a78d993ab241c2425407bab9cb472b3a6b89114f6efa9bec9c8aaa00bad07a5b
                                              • Instruction Fuzzy Hash: 5A811671600605BBDB21AF60EC82FFE37A4AF55300F044526FA05AB296FB74DA45D7B1
                                              APIs
                                              • LoadIconW.USER32(00000063), ref: 00D35A2E
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00D35A40
                                              • SetWindowTextW.USER32(?,?), ref: 00D35A57
                                              • GetDlgItem.USER32(?,000003EA), ref: 00D35A6C
                                              • SetWindowTextW.USER32(00000000,?), ref: 00D35A72
                                              • GetDlgItem.USER32(?,000003E9), ref: 00D35A82
                                              • SetWindowTextW.USER32(00000000,?), ref: 00D35A88
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00D35AA9
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00D35AC3
                                              • GetWindowRect.USER32(?,?), ref: 00D35ACC
                                              • _wcslen.LIBCMT ref: 00D35B33
                                              • SetWindowTextW.USER32(?,?), ref: 00D35B6F
                                              • GetDesktopWindow.USER32 ref: 00D35B75
                                              • GetWindowRect.USER32(00000000), ref: 00D35B7C
                                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00D35BD3
                                              • GetClientRect.USER32(?,?), ref: 00D35BE0
                                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 00D35C05
                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00D35C2F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                              • String ID:
                                              • API String ID: 895679908-0
                                              • Opcode ID: bfc6a50111b16176c2b68a42ab7937984d1e2460b779440433d64701ddb362f4
                                              • Instruction ID: 6faa5163b4cda30d1b1e6f73cecb5eedede0e815431804e3dbc01c0464295868
                                              • Opcode Fuzzy Hash: bfc6a50111b16176c2b68a42ab7937984d1e2460b779440433d64701ddb362f4
                                              • Instruction Fuzzy Hash: F7716C31900B09AFDB20DFA8DE85BAEBBF5FF48704F144518E582A26A4D775E944CB70
                                              APIs
                                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00CF00C6
                                                • Part of subcall function 00CF00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00DA070C,00000FA0,65D17C8B,?,?,?,?,00D123B3,000000FF), ref: 00CF011C
                                                • Part of subcall function 00CF00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00D123B3,000000FF), ref: 00CF0127
                                                • Part of subcall function 00CF00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00D123B3,000000FF), ref: 00CF0138
                                                • Part of subcall function 00CF00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00CF014E
                                                • Part of subcall function 00CF00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00CF015C
                                                • Part of subcall function 00CF00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00CF016A
                                                • Part of subcall function 00CF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00CF0195
                                                • Part of subcall function 00CF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00CF01A0
                                              • ___scrt_fastfail.LIBCMT ref: 00CF00E7
                                                • Part of subcall function 00CF00A3: __onexit.LIBCMT ref: 00CF00A9
                                              Strings
                                              • WakeAllConditionVariable, xrefs: 00CF0162
                                              • SleepConditionVariableCS, xrefs: 00CF0154
                                              • kernel32.dll, xrefs: 00CF0133
                                              • InitializeConditionVariable, xrefs: 00CF0148
                                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00CF0122
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                              • API String ID: 66158676-1714406822
                                              • Opcode ID: 624603cb7e4f1481a3c0e9e3ace5d29b61a9e28a47fd8f2316b9681f9be76b59
                                              • Instruction ID: fd3a8217ac2f345e8f9d27d98c357b840cc10381ec929b2535d5577ca4bb20b9
                                              • Opcode Fuzzy Hash: 624603cb7e4f1481a3c0e9e3ace5d29b61a9e28a47fd8f2316b9681f9be76b59
                                              • Instruction Fuzzy Hash: E621F9326447156FD7506BA4AC06B7E3794DB06F51F20413AF951E3392DFB4A8008AB2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                              • API String ID: 176396367-1603158881
                                              • Opcode ID: 38fa75a8823b8ede536a4b130b7c3f21a1e6f41862cd93cafdee194560332ef3
                                              • Instruction ID: 9e12816b79db6841f0c1fbb9f0f5ceae7d7a0acb4599771759575f17b1735142
                                              • Opcode Fuzzy Hash: 38fa75a8823b8ede536a4b130b7c3f21a1e6f41862cd93cafdee194560332ef3
                                              • Instruction Fuzzy Hash: B7E1D532A00616ABCF18DFA8C9517FEFBB4BF44710F588129E556E7240DB30AE8597B0
                                              APIs
                                              • CharLowerBuffW.USER32(00000000,00000000,00D6CC08), ref: 00D44527
                                              • _wcslen.LIBCMT ref: 00D4453B
                                              • _wcslen.LIBCMT ref: 00D44599
                                              • _wcslen.LIBCMT ref: 00D445F4
                                              • _wcslen.LIBCMT ref: 00D4463F
                                              • _wcslen.LIBCMT ref: 00D446A7
                                                • Part of subcall function 00CEF9F2: _wcslen.LIBCMT ref: 00CEF9FD
                                              • GetDriveTypeW.KERNEL32(?,00D96BF0,00000061), ref: 00D44743
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharDriveLowerType
                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                              • API String ID: 2055661098-1000479233
                                              • Opcode ID: 8548bd3e2e0d946f3e8667f1cc5b48944d2e24eb8f4b765f7e20bbd0ef5fc6f9
                                              • Instruction ID: 3812d6648bfdcffa2115fb48f507dbc9bce284e3152b4a89e1429f484dedb26b
                                              • Opcode Fuzzy Hash: 8548bd3e2e0d946f3e8667f1cc5b48944d2e24eb8f4b765f7e20bbd0ef5fc6f9
                                              • Instruction Fuzzy Hash: C2B100316083029FCB10DF28C890A7AB7E5BFA5764F548A1DF596C7291E730D985CBB2
                                              APIs
                                              • _wcslen.LIBCMT ref: 00D5B198
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D5B1B0
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D5B1D4
                                              • _wcslen.LIBCMT ref: 00D5B200
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D5B214
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D5B236
                                              • _wcslen.LIBCMT ref: 00D5B332
                                                • Part of subcall function 00D405A7: GetStdHandle.KERNEL32(000000F6), ref: 00D405C6
                                              • _wcslen.LIBCMT ref: 00D5B34B
                                              • _wcslen.LIBCMT ref: 00D5B366
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D5B3B6
                                              • GetLastError.KERNEL32(00000000), ref: 00D5B407
                                              • CloseHandle.KERNEL32(?), ref: 00D5B439
                                              • CloseHandle.KERNEL32(00000000), ref: 00D5B44A
                                              • CloseHandle.KERNEL32(00000000), ref: 00D5B45C
                                              • CloseHandle.KERNEL32(00000000), ref: 00D5B46E
                                              • CloseHandle.KERNEL32(?), ref: 00D5B4E3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                              • String ID:
                                              • API String ID: 2178637699-0
                                              • Opcode ID: 340e5481ba172879e0141603558719439b957626626a87e40f3e436bf26770c9
                                              • Instruction ID: 58c9a6be3fe5c350a56d40aea8d7be4b42752d2e61cf8a0ebb991fa0a17111f5
                                              • Opcode Fuzzy Hash: 340e5481ba172879e0141603558719439b957626626a87e40f3e436bf26770c9
                                              • Instruction Fuzzy Hash: 56F18D316043409FCB14EF24C891B6EBBE5AF85324F18855EFD959B2A2DB31EC45CB62
                                              APIs
                                              • GetMenuItemCount.USER32(00DA1990), ref: 00D12F8D
                                              • GetMenuItemCount.USER32(00DA1990), ref: 00D1303D
                                              • GetCursorPos.USER32(?), ref: 00D13081
                                              • SetForegroundWindow.USER32(00000000), ref: 00D1308A
                                              • TrackPopupMenuEx.USER32(00DA1990,00000000,?,00000000,00000000,00000000), ref: 00D1309D
                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00D130A9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                              • String ID: 0
                                              • API String ID: 36266755-4108050209
                                              • Opcode ID: 9e5fcbf5a2667c4b9e5a97e2c71a0a74ea5f5221f9ffffa1e7b9e3684e04c132
                                              • Instruction ID: 163253ab12ae2c63b42fd3457e3ae9d156262626ffe5d0d065c8d0dd05286338
                                              • Opcode Fuzzy Hash: 9e5fcbf5a2667c4b9e5a97e2c71a0a74ea5f5221f9ffffa1e7b9e3684e04c132
                                              • Instruction Fuzzy Hash: 98710730644245BEEB218F65DC49FFABF64FF04324F240206F615A62E1CBB2A964D771
                                              APIs
                                              • DestroyWindow.USER32(?,?), ref: 00D66DEB
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00D66E5F
                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00D66E81
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D66E94
                                              • DestroyWindow.USER32(?), ref: 00D66EB5
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00CD0000,00000000), ref: 00D66EE4
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D66EFD
                                              • GetDesktopWindow.USER32 ref: 00D66F16
                                              • GetWindowRect.USER32(00000000), ref: 00D66F1D
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00D66F35
                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00D66F4D
                                                • Part of subcall function 00CE9944: GetWindowLongW.USER32(?,000000EB), ref: 00CE9952
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                              • String ID: 0$tooltips_class32
                                              • API String ID: 2429346358-3619404913
                                              • Opcode ID: 3c0073f135154bbc8da23b97e7c25a3d67e4d41f85b135386177c5a7f4cc564e
                                              • Instruction ID: 5cd3993390faddec504b3b5092f08e75cbe48568509e87d7806a371754a057c3
                                              • Opcode Fuzzy Hash: 3c0073f135154bbc8da23b97e7c25a3d67e4d41f85b135386177c5a7f4cc564e
                                              • Instruction Fuzzy Hash: 04715474108341AFDB21CF18D844ABABBE9EB99304F08441EF99987361D771E906DB26
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • DragQueryPoint.SHELL32(?,?), ref: 00D69147
                                                • Part of subcall function 00D67674: ClientToScreen.USER32(?,?), ref: 00D6769A
                                                • Part of subcall function 00D67674: GetWindowRect.USER32(?,?), ref: 00D67710
                                                • Part of subcall function 00D67674: PtInRect.USER32(?,?,00D68B89), ref: 00D67720
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00D691B0
                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00D691BB
                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00D691DE
                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00D69225
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00D6923E
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00D69255
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00D69277
                                              • DragFinish.SHELL32(?), ref: 00D6927E
                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00D69371
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                              • API String ID: 221274066-3440237614
                                              • Opcode ID: 51050abd475079ea3c1b6cfc99255df1e73801f26256c37d338861ab8c729b5a
                                              • Instruction ID: 8066b35941bbc219fdf15ca57c33d7c4a75d75ee4d2b8b98b6aa94df257362ca
                                              • Opcode Fuzzy Hash: 51050abd475079ea3c1b6cfc99255df1e73801f26256c37d338861ab8c729b5a
                                              • Instruction Fuzzy Hash: 00615A71108301AFC701DFA4DC95DAFBBE8EF99750F40091EF695922A1DB70AA49CB62
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D4C4B0
                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00D4C4C3
                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00D4C4D7
                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00D4C4F0
                                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00D4C533
                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00D4C549
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D4C554
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D4C584
                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00D4C5DC
                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00D4C5F0
                                              • InternetCloseHandle.WININET(00000000), ref: 00D4C5FB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                              • String ID:
                                              • API String ID: 3800310941-3916222277
                                              • Opcode ID: 3df1193001b64f14f6ef55abdc912f372221148c1a54b3c6b3729558c1497a65
                                              • Instruction ID: 089e1adb533bbe0494c5793fc2add4b0452dfcf0ea270957a27af3dffba1cea0
                                              • Opcode Fuzzy Hash: 3df1193001b64f14f6ef55abdc912f372221148c1a54b3c6b3729558c1497a65
                                              • Instruction Fuzzy Hash: AB515AB0511348BFDB619FA0C988ABB7BBCFF08754F04A41AF985D6210EB74E9449B70
                                              APIs
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00D68592
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00D685A2
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00D685AD
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00D685BA
                                              • GlobalLock.KERNEL32(00000000), ref: 00D685C8
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00D685D7
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00D685E0
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00D685E7
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00D685F8
                                              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00D6FC38,?), ref: 00D68611
                                              • GlobalFree.KERNEL32(00000000), ref: 00D68621
                                              • GetObjectW.GDI32(?,00000018,?), ref: 00D68641
                                              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00D68671
                                              • DeleteObject.GDI32(?), ref: 00D68699
                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00D686AF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                              • String ID:
                                              • API String ID: 3840717409-0
                                              • Opcode ID: 261be4795c6981101c6ca62ac4e81ae01e3d9fba31503ee5008e597c3aaa3ade
                                              • Instruction ID: 8ef7d9b76d62f14592e796abb466affae16dc9106eeb1cb37712b20f22827b94
                                              • Opcode Fuzzy Hash: 261be4795c6981101c6ca62ac4e81ae01e3d9fba31503ee5008e597c3aaa3ade
                                              • Instruction Fuzzy Hash: 0E412875600308AFDB119FA5CC88EAA7BB8EF89B11F144159F946E7260DB70A901DB30
                                              APIs
                                              • VariantInit.OLEAUT32(00000000), ref: 00D41502
                                              • VariantCopy.OLEAUT32(?,?), ref: 00D4150B
                                              • VariantClear.OLEAUT32(?), ref: 00D41517
                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00D415FB
                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00D41657
                                              • VariantInit.OLEAUT32(?), ref: 00D41708
                                              • SysFreeString.OLEAUT32(?), ref: 00D4178C
                                              • VariantClear.OLEAUT32(?), ref: 00D417D8
                                              • VariantClear.OLEAUT32(?), ref: 00D417E7
                                              • VariantInit.OLEAUT32(00000000), ref: 00D41823
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                              • API String ID: 1234038744-3931177956
                                              • Opcode ID: f8505d329c420788bb665d66f67f4866e57a573a1a6089858b33cf72a70e5e97
                                              • Instruction ID: 26453119a93adf28d319cb79887ae7f1595f99401e11b8e20a1d4776e637a338
                                              • Opcode Fuzzy Hash: f8505d329c420788bb665d66f67f4866e57a573a1a6089858b33cf72a70e5e97
                                              • Instruction Fuzzy Hash: E7D1FF35A00209EBDB00AF65D885BBDB7B5FF44700F14855AF486AB280DB30ED85EBB1
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D5B6AE,?,?), ref: 00D5C9B5
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5C9F1
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5CA68
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5CA9E
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D5B6F4
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D5B772
                                              • RegDeleteValueW.ADVAPI32(?,?), ref: 00D5B80A
                                              • RegCloseKey.ADVAPI32(?), ref: 00D5B87E
                                              • RegCloseKey.ADVAPI32(?), ref: 00D5B89C
                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00D5B8F2
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D5B904
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D5B922
                                              • FreeLibrary.KERNEL32(00000000), ref: 00D5B983
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00D5B994
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 146587525-4033151799
                                              • Opcode ID: 183aa0a9cdfc975081d362cbb12702c14db5a53a338910245fce2d7d813b4820
                                              • Instruction ID: 7193094b11e375de39cc28fc95652cc2f87f7ab639686ee5759dc673c68fbcb6
                                              • Opcode Fuzzy Hash: 183aa0a9cdfc975081d362cbb12702c14db5a53a338910245fce2d7d813b4820
                                              • Instruction Fuzzy Hash: 46C16D34204201AFDB14DF14C495B2ABBE5FF84319F18855EE9958B3A2CB71EC49DFA1
                                              APIs
                                              • GetDC.USER32(00000000), ref: 00D525D8
                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00D525E8
                                              • CreateCompatibleDC.GDI32(?), ref: 00D525F4
                                              • SelectObject.GDI32(00000000,?), ref: 00D52601
                                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00D5266D
                                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00D526AC
                                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00D526D0
                                              • SelectObject.GDI32(?,?), ref: 00D526D8
                                              • DeleteObject.GDI32(?), ref: 00D526E1
                                              • DeleteDC.GDI32(?), ref: 00D526E8
                                              • ReleaseDC.USER32(00000000,?), ref: 00D526F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                              • String ID: (
                                              • API String ID: 2598888154-3887548279
                                              • Opcode ID: 0e8251598208b8f9696c49a840982c0c2e52fedabcacc543b5330c901c9b4d93
                                              • Instruction ID: a6f3b75c989d966e40172d500d81946eea8d572b41ed1a55319e3f060166fd6b
                                              • Opcode Fuzzy Hash: 0e8251598208b8f9696c49a840982c0c2e52fedabcacc543b5330c901c9b4d93
                                              • Instruction Fuzzy Hash: E061D275D00219EFCF04CFA8D884AAEBBB5FF48310F20852AE995A7350D774A955CFA0
                                              APIs
                                              • ___free_lconv_mon.LIBCMT ref: 00D0DAA1
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D659
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D66B
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D67D
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D68F
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D6A1
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D6B3
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D6C5
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D6D7
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D6E9
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D6FB
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D70D
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D71F
                                                • Part of subcall function 00D0D63C: _free.LIBCMT ref: 00D0D731
                                              • _free.LIBCMT ref: 00D0DA96
                                                • Part of subcall function 00D029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000), ref: 00D029DE
                                                • Part of subcall function 00D029C8: GetLastError.KERNEL32(00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000,00000000), ref: 00D029F0
                                              • _free.LIBCMT ref: 00D0DAB8
                                              • _free.LIBCMT ref: 00D0DACD
                                              • _free.LIBCMT ref: 00D0DAD8
                                              • _free.LIBCMT ref: 00D0DAFA
                                              • _free.LIBCMT ref: 00D0DB0D
                                              • _free.LIBCMT ref: 00D0DB1B
                                              • _free.LIBCMT ref: 00D0DB26
                                              • _free.LIBCMT ref: 00D0DB5E
                                              • _free.LIBCMT ref: 00D0DB65
                                              • _free.LIBCMT ref: 00D0DB82
                                              • _free.LIBCMT ref: 00D0DB9A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                              • String ID:
                                              • API String ID: 161543041-0
                                              • Opcode ID: 49de185e68bb7cbecc0115b8a7f1d4b84895ca077101ff63bd49f0cc5074a095
                                              • Instruction ID: 017054ca1c5034f3d419abc1ecb2ff8934b8d8edc7911f5196dbcf6b48900d04
                                              • Opcode Fuzzy Hash: 49de185e68bb7cbecc0115b8a7f1d4b84895ca077101ff63bd49f0cc5074a095
                                              • Instruction Fuzzy Hash: 27312A31A447059FEB21AAB9E849B6A77EAFF10310F69441AE45DD71D1DB35EC40CB30
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00D3369C
                                              • _wcslen.LIBCMT ref: 00D336A7
                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00D33797
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00D3380C
                                              • GetDlgCtrlID.USER32(?), ref: 00D3385D
                                              • GetWindowRect.USER32(?,?), ref: 00D33882
                                              • GetParent.USER32(?), ref: 00D338A0
                                              • ScreenToClient.USER32(00000000), ref: 00D338A7
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00D33921
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00D3395D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                              • String ID: %s%u
                                              • API String ID: 4010501982-679674701
                                              • Opcode ID: 05f36278d48aa7ffb6c86795a0f2d7b883224b62e75156157ae4ceaf6c4aa7be
                                              • Instruction ID: 26265317d69cc2ae33c9ad233343448455d30582ac1b1a3cb103b4131f1e1ca3
                                              • Opcode Fuzzy Hash: 05f36278d48aa7ffb6c86795a0f2d7b883224b62e75156157ae4ceaf6c4aa7be
                                              • Instruction Fuzzy Hash: B791AC71204706EFD719DF64C985BAAF7A8FF44350F048629FA99C21A0DB70EA45CBB1
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00D34994
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00D349DA
                                              • _wcslen.LIBCMT ref: 00D349EB
                                              • CharUpperBuffW.USER32(?,00000000), ref: 00D349F7
                                              • _wcsstr.LIBVCRUNTIME ref: 00D34A2C
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00D34A64
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00D34A9D
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00D34AE6
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00D34B20
                                              • GetWindowRect.USER32(?,?), ref: 00D34B8B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                              • String ID: ThumbnailClass
                                              • API String ID: 1311036022-1241985126
                                              • Opcode ID: 04614deb0c8c49593b5c9c3381b10f1902d8f0e182c806666bbfd097bb36eb71
                                              • Instruction ID: d1bc5a7a68ee461bb0a82296a1702a6f52be55bb4fb152ed779a853fc38df3a6
                                              • Opcode Fuzzy Hash: 04614deb0c8c49593b5c9c3381b10f1902d8f0e182c806666bbfd097bb36eb71
                                              • Instruction Fuzzy Hash: 7491AD711042099FDB04DF14C985BBAB7E8FF84314F08846AFE859A1A6DB78ED45CBB1
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00D68D5A
                                              • GetFocus.USER32 ref: 00D68D6A
                                              • GetDlgCtrlID.USER32(00000000), ref: 00D68D75
                                              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00D68E1D
                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00D68ECF
                                              • GetMenuItemCount.USER32(?), ref: 00D68EEC
                                              • GetMenuItemID.USER32(?,00000000), ref: 00D68EFC
                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00D68F2E
                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00D68F70
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00D68FA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                              • String ID: 0
                                              • API String ID: 1026556194-4108050209
                                              • Opcode ID: 7a743441eec934d16ba842555cf9efa574fd4b23de78bad7cef070fd7595e8b0
                                              • Instruction ID: 92a6708919badb3792cadeb83e9983d8c16c635090176f1548efbc140bcbe8cf
                                              • Opcode Fuzzy Hash: 7a743441eec934d16ba842555cf9efa574fd4b23de78bad7cef070fd7595e8b0
                                              • Instruction Fuzzy Hash: C3819071508341AFD710CF24C884A6BBBE9FF88354F180A19F995D7292DB72D905EBB2
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00D3DC20
                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00D3DC46
                                              • _wcslen.LIBCMT ref: 00D3DC50
                                              • _wcsstr.LIBVCRUNTIME ref: 00D3DCA0
                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00D3DCBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                              • API String ID: 1939486746-1459072770
                                              • Opcode ID: 328691ac653cc6add769d58bd76853e461d715e6722e1c9c873066dcb2605421
                                              • Instruction ID: 26d0c96bec605261c0626b0116c386456baba224bba31f41666c99c79965b9b6
                                              • Opcode Fuzzy Hash: 328691ac653cc6add769d58bd76853e461d715e6722e1c9c873066dcb2605421
                                              • Instruction Fuzzy Hash: DC4106329403047BDB14AB75AC43EBF776CEF46750F14006AFA00A7182EB75DA01ABB5
                                              APIs
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00D5CC64
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00D5CC8D
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00D5CD48
                                                • Part of subcall function 00D5CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00D5CCAA
                                                • Part of subcall function 00D5CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00D5CCBD
                                                • Part of subcall function 00D5CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D5CCCF
                                                • Part of subcall function 00D5CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00D5CD05
                                                • Part of subcall function 00D5CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00D5CD28
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D5CCF3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 2734957052-4033151799
                                              • Opcode ID: dae972794bca71f4514f7a3fc9c9ac6caaa48e9b9c21600f9e5324979484ceaa
                                              • Instruction ID: 6de774ce538a3e5d91767d281e230b7e46566954abd25418e6811a8502ccdba8
                                              • Opcode Fuzzy Hash: dae972794bca71f4514f7a3fc9c9ac6caaa48e9b9c21600f9e5324979484ceaa
                                              • Instruction Fuzzy Hash: 74318E71911328BFDB219B90DC88EFFBB7CEF16741F041166ED45E2240DAB49A499AB0
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D43D40
                                              • _wcslen.LIBCMT ref: 00D43D6D
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D43D9D
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00D43DBE
                                              • RemoveDirectoryW.KERNEL32(?), ref: 00D43DCE
                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00D43E55
                                              • CloseHandle.KERNEL32(00000000), ref: 00D43E60
                                              • CloseHandle.KERNEL32(00000000), ref: 00D43E6B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                              • String ID: :$\$\??\%s
                                              • API String ID: 1149970189-3457252023
                                              • Opcode ID: 07fd645ded90cd5ff21b1b2b5953d666b5b37de296299ff172b34dd5b37ca60f
                                              • Instruction ID: 8c48934873466593513d00f3d66bf20e3037346280f5a849832045037d77b75f
                                              • Opcode Fuzzy Hash: 07fd645ded90cd5ff21b1b2b5953d666b5b37de296299ff172b34dd5b37ca60f
                                              • Instruction Fuzzy Hash: 1031B272910249ABDB209BA4DC49FEF37BCEF89700F1441B5F645D6160EBB497448B34
                                              APIs
                                              • timeGetTime.WINMM ref: 00D3E6B4
                                                • Part of subcall function 00CEE551: timeGetTime.WINMM(?,?,00D3E6D4), ref: 00CEE555
                                              • Sleep.KERNEL32(0000000A), ref: 00D3E6E1
                                              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00D3E705
                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00D3E727
                                              • SetActiveWindow.USER32 ref: 00D3E746
                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00D3E754
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00D3E773
                                              • Sleep.KERNEL32(000000FA), ref: 00D3E77E
                                              • IsWindow.USER32 ref: 00D3E78A
                                              • EndDialog.USER32(00000000), ref: 00D3E79B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                              • String ID: BUTTON
                                              • API String ID: 1194449130-3405671355
                                              • Opcode ID: e54b245d4d52083bf1250cc3c8a7c0b5e7571188749a562e67c6d9eee1bdef5b
                                              • Instruction ID: ef251cff985dc2597fe920b885b478592dd5a9f37f973dceaf9e7bdd85e08d72
                                              • Opcode Fuzzy Hash: e54b245d4d52083bf1250cc3c8a7c0b5e7571188749a562e67c6d9eee1bdef5b
                                              • Instruction Fuzzy Hash: 3C2190B0250305AFEB106F66EC9AB363B69FB56348F182425F456C27F1DBB1AC009B34
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00D3EA5D
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00D3EA73
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D3EA84
                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00D3EA96
                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00D3EAA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: SendString$_wcslen
                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                              • API String ID: 2420728520-1007645807
                                              • Opcode ID: a3a05a9669f58805115bf6ec10f869d9cb651c74434ecdb7c175ea506f757fb3
                                              • Instruction ID: ae3db84b31367ba3f20467c8a6d6b4579dbf2e9f516541f5ee6ebe9aa4930cef
                                              • Opcode Fuzzy Hash: a3a05a9669f58805115bf6ec10f869d9cb651c74434ecdb7c175ea506f757fb3
                                              • Instruction Fuzzy Hash: 00118A316902697DDB10A7A2DC4AEFF6B7CEBD1F40F040426B501A21D1EE709D09CAB0
                                              APIs
                                              • GetDlgItem.USER32(?,00000001), ref: 00D35CE2
                                              • GetWindowRect.USER32(00000000,?), ref: 00D35CFB
                                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00D35D59
                                              • GetDlgItem.USER32(?,00000002), ref: 00D35D69
                                              • GetWindowRect.USER32(00000000,?), ref: 00D35D7B
                                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00D35DCF
                                              • GetDlgItem.USER32(?,000003E9), ref: 00D35DDD
                                              • GetWindowRect.USER32(00000000,?), ref: 00D35DEF
                                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00D35E31
                                              • GetDlgItem.USER32(?,000003EA), ref: 00D35E44
                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00D35E5A
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00D35E67
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$ItemMoveRect$Invalidate
                                              • String ID:
                                              • API String ID: 3096461208-0
                                              • Opcode ID: e5c31bff85491489972057293761bf54bc916864733a9c74e3f07ec0ebbc68aa
                                              • Instruction ID: 336c2134383dd4986ada06b11c076e56c7fb17bc76e109a36b7bc9a54d749099
                                              • Opcode Fuzzy Hash: e5c31bff85491489972057293761bf54bc916864733a9c74e3f07ec0ebbc68aa
                                              • Instruction Fuzzy Hash: 05510CB1B10705AFDB18CFA8DD89AAEBBB5EB48301F548129F515E7294D7B09E00CB70
                                              APIs
                                                • Part of subcall function 00CE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00CE8BE8,?,00000000,?,?,?,?,00CE8BBA,00000000,?), ref: 00CE8FC5
                                              • DestroyWindow.USER32(?), ref: 00CE8C81
                                              • KillTimer.USER32(00000000,?,?,?,?,00CE8BBA,00000000,?), ref: 00CE8D1B
                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00D26973
                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00CE8BBA,00000000,?), ref: 00D269A1
                                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00CE8BBA,00000000,?), ref: 00D269B8
                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00CE8BBA,00000000), ref: 00D269D4
                                              • DeleteObject.GDI32(00000000), ref: 00D269E6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                              • String ID:
                                              • API String ID: 641708696-0
                                              • Opcode ID: 7c2e09e6f328e22b8ce4c474c18e5b1f86f924c6dfbc4b915c958341e37c846c
                                              • Instruction ID: 74779474ea4b6352de489e39c89337a635a2c1d823d45bbdb907fb161fbe6100
                                              • Opcode Fuzzy Hash: 7c2e09e6f328e22b8ce4c474c18e5b1f86f924c6dfbc4b915c958341e37c846c
                                              • Instruction Fuzzy Hash: C561EC34002790DFCB219F26D948B2677F1FB56316F24951DE0969BAA0CB71AE84DFB0
                                              APIs
                                                • Part of subcall function 00CE9944: GetWindowLongW.USER32(?,000000EB), ref: 00CE9952
                                              • GetSysColor.USER32(0000000F), ref: 00CE9862
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ColorLongWindow
                                              • String ID:
                                              • API String ID: 259745315-0
                                              • Opcode ID: 2e77e54f95d5c8f1e2fc1f42dcc71afe3766d87ecf5800d3cba85c2d6c79fe59
                                              • Instruction ID: a20d1287cfcb44387228628fc74c7639f9e19d8ccb267c3e1588052d0e0e8f17
                                              • Opcode Fuzzy Hash: 2e77e54f95d5c8f1e2fc1f42dcc71afe3766d87ecf5800d3cba85c2d6c79fe59
                                              • Instruction Fuzzy Hash: 33419E31104790AFDB305B3A9C88BB93BA5EB16320F185615F9B2872F2D7719942DB31
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00D1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00D39717
                                              • LoadStringW.USER32(00000000,?,00D1F7F8,00000001), ref: 00D39720
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00D1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00D39742
                                              • LoadStringW.USER32(00000000,?,00D1F7F8,00000001), ref: 00D39745
                                              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00D39866
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wcslen
                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                              • API String ID: 747408836-2268648507
                                              • Opcode ID: 4c2f96e7d3515fe475d2754553a36fd09b9b83d5152c062a738f3cee2ab90446
                                              • Instruction ID: 06b4d484b6652181daacdc61a20c4cf8f4915e8e9c387ee9e602be78351efa0c
                                              • Opcode Fuzzy Hash: 4c2f96e7d3515fe475d2754553a36fd09b9b83d5152c062a738f3cee2ab90446
                                              • Instruction Fuzzy Hash: DB414E72904209AADF04EBE0DE96DEEB778EF55740F100026F601722A2EB756F49DB71
                                              APIs
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00D307A2
                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00D307BE
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00D307DA
                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00D30804
                                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00D3082C
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00D30837
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00D3083C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                              • API String ID: 323675364-22481851
                                              • Opcode ID: 182765e757257665d88d3fb9a0c766e7694da55caa97d5ced3c888ffcebfd3c1
                                              • Instruction ID: 30bf68a0c732591b5d9ea17c58e81c020ccf1aeb780ba60e43620307fc2ac6d1
                                              • Opcode Fuzzy Hash: 182765e757257665d88d3fb9a0c766e7694da55caa97d5ced3c888ffcebfd3c1
                                              • Instruction Fuzzy Hash: 46410876C10229ABDF11EBA4DC95DEDB778FF44750F04416AEA01A32A1EB709E04DFA0
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00D53C5C
                                              • CoInitialize.OLE32(00000000), ref: 00D53C8A
                                              • CoUninitialize.OLE32 ref: 00D53C94
                                              • _wcslen.LIBCMT ref: 00D53D2D
                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00D53DB1
                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00D53ED5
                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00D53F0E
                                              • CoGetObject.OLE32(?,00000000,00D6FB98,?), ref: 00D53F2D
                                              • SetErrorMode.KERNEL32(00000000), ref: 00D53F40
                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00D53FC4
                                              • VariantClear.OLEAUT32(?), ref: 00D53FD8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                              • String ID:
                                              • API String ID: 429561992-0
                                              • Opcode ID: dab4bd0c3a416e5a6f7cd62d7c022aade36eb352b06d8e032494003b717e27bf
                                              • Instruction ID: 0f7d9a97a5852e508cb35b28993c9d1d2f5b02930b95209230afd255a98e7d17
                                              • Opcode Fuzzy Hash: dab4bd0c3a416e5a6f7cd62d7c022aade36eb352b06d8e032494003b717e27bf
                                              • Instruction Fuzzy Hash: B3C114716083059FDB00DF68C88492BB7E9FF89785F14491DF9899B210D771EE09CB62
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 00D47AF3
                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00D47B8F
                                              • SHGetDesktopFolder.SHELL32(?), ref: 00D47BA3
                                              • CoCreateInstance.OLE32(00D6FD08,00000000,00000001,00D96E6C,?), ref: 00D47BEF
                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00D47C74
                                              • CoTaskMemFree.OLE32(?,?), ref: 00D47CCC
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00D47D57
                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00D47D7A
                                              • CoTaskMemFree.OLE32(00000000), ref: 00D47D81
                                              • CoTaskMemFree.OLE32(00000000), ref: 00D47DD6
                                              • CoUninitialize.OLE32 ref: 00D47DDC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                              • String ID:
                                              • API String ID: 2762341140-0
                                              • Opcode ID: aa57f684f39e52d3da62e0b64330734445d579c16ae95f214d10c7ac71611bc5
                                              • Instruction ID: a1bf347bea0adf2651d0665adcf0cbfe95609a376d9889f9cb4ac64ef28ce880
                                              • Opcode Fuzzy Hash: aa57f684f39e52d3da62e0b64330734445d579c16ae95f214d10c7ac71611bc5
                                              • Instruction Fuzzy Hash: C4C10975A04209AFCB14DFA4C884DAEBBF9FF48304B148599E919DB361DB30ED45CBA0
                                              APIs
                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00D65504
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D65515
                                              • CharNextW.USER32(00000158), ref: 00D65544
                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00D65585
                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00D6559B
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D655AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$CharNext
                                              • String ID:
                                              • API String ID: 1350042424-0
                                              • Opcode ID: ea6e8e5859cef710a1f98aa65d80390e7a5011b25f552f60d530888e1b376f79
                                              • Instruction ID: 1d83b4c40be5f93a1a20dce446a3ef50059ae3af172792a60ee4698725b5bca3
                                              • Opcode Fuzzy Hash: ea6e8e5859cef710a1f98aa65d80390e7a5011b25f552f60d530888e1b376f79
                                              • Instruction Fuzzy Hash: A3618F34900609EFDF108FA4EC849FE7BB9EB1A724F144146F565A62A4DB749AC0DB70
                                              APIs
                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00D2FAAF
                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00D2FB08
                                              • VariantInit.OLEAUT32(?), ref: 00D2FB1A
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D2FB3A
                                              • VariantCopy.OLEAUT32(?,?), ref: 00D2FB8D
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00D2FBA1
                                              • VariantClear.OLEAUT32(?), ref: 00D2FBB6
                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00D2FBC3
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D2FBCC
                                              • VariantClear.OLEAUT32(?), ref: 00D2FBDE
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D2FBE9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                              • String ID:
                                              • API String ID: 2706829360-0
                                              • Opcode ID: ae244d73b572c4e34c4d786eec178046cce5bbd7742fe6951c4a9f92379a7566
                                              • Instruction ID: 35b41331da1343177e47399c41785e43111a854a62daa0e13bb46e2a3b45a0cc
                                              • Opcode Fuzzy Hash: ae244d73b572c4e34c4d786eec178046cce5bbd7742fe6951c4a9f92379a7566
                                              • Instruction Fuzzy Hash: 5D412C35A102199FCB00DF68D8589AEBBB9EF58354F008469E955E7361CB70A945CBB0
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00D39CA1
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00D39D22
                                              • GetKeyState.USER32(000000A0), ref: 00D39D3D
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00D39D57
                                              • GetKeyState.USER32(000000A1), ref: 00D39D6C
                                              • GetAsyncKeyState.USER32(00000011), ref: 00D39D84
                                              • GetKeyState.USER32(00000011), ref: 00D39D96
                                              • GetAsyncKeyState.USER32(00000012), ref: 00D39DAE
                                              • GetKeyState.USER32(00000012), ref: 00D39DC0
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00D39DD8
                                              • GetKeyState.USER32(0000005B), ref: 00D39DEA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 3ac5df52faab5db8037c6010f7aba5f3b82f9640e0db184d7f3a6364654c30a9
                                              • Instruction ID: 2020e56ef6dd31d4430ac6864dac4a0c0eafb37c384e6a536f54559891e4964c
                                              • Opcode Fuzzy Hash: 3ac5df52faab5db8037c6010f7aba5f3b82f9640e0db184d7f3a6364654c30a9
                                              • Instruction Fuzzy Hash: 7A41D6345047CA69FF309765D8253B6FEA06F11344F0C905ADAC7566C2EBE499C8CBB2
                                              APIs
                                              • WSAStartup.WSOCK32(00000101,?), ref: 00D505BC
                                              • inet_addr.WSOCK32(?), ref: 00D5061C
                                              • gethostbyname.WSOCK32(?), ref: 00D50628
                                              • IcmpCreateFile.IPHLPAPI ref: 00D50636
                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00D506C6
                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00D506E5
                                              • IcmpCloseHandle.IPHLPAPI(?), ref: 00D507B9
                                              • WSACleanup.WSOCK32 ref: 00D507BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                              • String ID: Ping
                                              • API String ID: 1028309954-2246546115
                                              • Opcode ID: dde620118f03c5ea4011a39d16d87d7eca4dd74b23c429642fe06d1520a77431
                                              • Instruction ID: 36e46f386d7e97bfba736a0c00fa13d7084aeaaf204221c660b9fe0a6a505431
                                              • Opcode Fuzzy Hash: dde620118f03c5ea4011a39d16d87d7eca4dd74b23c429642fe06d1520a77431
                                              • Instruction Fuzzy Hash: 75918E755043019FDB20DF15C488F1ABBE0EF48319F1885A9E9A98B7A2D770ED49CFA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharLower
                                              • String ID: cdecl$none$stdcall$winapi
                                              • API String ID: 707087890-567219261
                                              • Opcode ID: 784018e0cda190654e8908419e2bc9d36f0438771c94cdb7f90c1464f43db669
                                              • Instruction ID: d6062f35d8325301b000bf021a974e6932f321a8b11c9bf92b7e756f9c9bc96e
                                              • Opcode Fuzzy Hash: 784018e0cda190654e8908419e2bc9d36f0438771c94cdb7f90c1464f43db669
                                              • Instruction Fuzzy Hash: A8519E31A001169ACF14DF68C8419BEB3B5AF64721B24422AFD66F7384DB31DE44E7A0
                                              APIs
                                              • CoInitialize.OLE32 ref: 00D53774
                                              • CoUninitialize.OLE32 ref: 00D5377F
                                              • CoCreateInstance.OLE32(?,00000000,00000017,00D6FB78,?), ref: 00D537D9
                                              • IIDFromString.OLE32(?,?), ref: 00D5384C
                                              • VariantInit.OLEAUT32(?), ref: 00D538E4
                                              • VariantClear.OLEAUT32(?), ref: 00D53936
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 636576611-1287834457
                                              • Opcode ID: 55802a53199fc4fe4431c8d3b85d136a4f05c7d00856c33ae651b92a3bacfb39
                                              • Instruction ID: ce38f02cc3702a98bf081dbf7d1d710d8a13469deac3e2bb68d80f679fbdb625
                                              • Opcode Fuzzy Hash: 55802a53199fc4fe4431c8d3b85d136a4f05c7d00856c33ae651b92a3bacfb39
                                              • Instruction Fuzzy Hash: C461AF70608301AFDB14DF54C849B6ABBE4EF48752F14090AFD859B291D770EE48CBB2
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00D433CF
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00D433F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LoadString$_wcslen
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 4099089115-3080491070
                                              • Opcode ID: 6c826b4465bd25abd664602a63cc1a04e104b397a651623119e8ecfad57be24f
                                              • Instruction ID: 0442414f0e83406aec918ba538d9cb7121b2307a0fb42426eb255a2420f852c3
                                              • Opcode Fuzzy Hash: 6c826b4465bd25abd664602a63cc1a04e104b397a651623119e8ecfad57be24f
                                              • Instruction Fuzzy Hash: B1517D31900209ABDF14EBA0DD42EEEB778EF14340F144066F605722A1EB716F58EB71
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharUpper
                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                              • API String ID: 1256254125-769500911
                                              • Opcode ID: 6ddc99e8856ef091e8bceea37e669e2bb6ea31999f0812e0198d08e4951ac281
                                              • Instruction ID: c27b4b0a91ed1a6b53e51db90fdbe93645ee7281c36888be00e94346eecfca20
                                              • Opcode Fuzzy Hash: 6ddc99e8856ef091e8bceea37e669e2bb6ea31999f0812e0198d08e4951ac281
                                              • Instruction Fuzzy Hash: 5B41C732A001269BCB205F7DC8915BE77A5ABA0774F28412BE665DF285E731CD81C7B0
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D3BCFD
                                              • IsMenu.USER32(00000000), ref: 00D3BD1D
                                              • CreatePopupMenu.USER32 ref: 00D3BD53
                                              • GetMenuItemCount.USER32(PL), ref: 00D3BDA4
                                              • InsertMenuItemW.USER32(PL,?,00000001,00000030), ref: 00D3BDCC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                              • String ID: 0$2$PL$PL
                                              • API String ID: 93392585-3853711096
                                              • Opcode ID: f6d5474a20f23c68c9fca0d957ab0a6acadd20c041c5a04327ddfc055d4a97ab
                                              • Instruction ID: 0ac75a8da77231b9565eb272397e61be1040220988db16114ed2a8adacb38c1f
                                              • Opcode Fuzzy Hash: f6d5474a20f23c68c9fca0d957ab0a6acadd20c041c5a04327ddfc055d4a97ab
                                              • Instruction Fuzzy Hash: C1517D70A043099BDB20DFA8E884BAEBBF4EF45324F18415AE652E7291E7709945CB71
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00D453A0
                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00D45416
                                              • GetLastError.KERNEL32 ref: 00D45420
                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00D454A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Error$Mode$DiskFreeLastSpace
                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                              • API String ID: 4194297153-14809454
                                              • Opcode ID: 1451a8820766d99e23b9b02e561e97ac62e914ae9ebdd6452c3524753eaa2ceb
                                              • Instruction ID: 020eeaf2fac5e81932d66ae857e775e9838a50ff27a10129abae9260a6cddf1a
                                              • Opcode Fuzzy Hash: 1451a8820766d99e23b9b02e561e97ac62e914ae9ebdd6452c3524753eaa2ceb
                                              • Instruction Fuzzy Hash: C0318235A006049FCB10DF68D484AAA7BB4EF45345F188055E509DF397D775DD86CBB0
                                              APIs
                                              • CreateMenu.USER32 ref: 00D63C79
                                              • SetMenu.USER32(?,00000000), ref: 00D63C88
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D63D10
                                              • IsMenu.USER32(?), ref: 00D63D24
                                              • CreatePopupMenu.USER32 ref: 00D63D2E
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D63D5B
                                              • DrawMenuBar.USER32 ref: 00D63D63
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                              • String ID: 0$F
                                              • API String ID: 161812096-3044882817
                                              • Opcode ID: a50a3543e62f0f99b1ee3c52674283ec01e0aa4ad84d4625e8ac23c5acfd48db
                                              • Instruction ID: 76cc5e0adcab0a7c8038252fe1700c539fc7f1670f59ddb3d0694d4db4f6f43f
                                              • Opcode Fuzzy Hash: a50a3543e62f0f99b1ee3c52674283ec01e0aa4ad84d4625e8ac23c5acfd48db
                                              • Instruction Fuzzy Hash: 7F415779A01309AFDB14CF64DC84AAA7BB5FF49350F180029FA46A7360D770AA11CFA4
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D33CCA
                                              • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00D31F64
                                              • GetDlgCtrlID.USER32 ref: 00D31F6F
                                              • GetParent.USER32 ref: 00D31F8B
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00D31F8E
                                              • GetDlgCtrlID.USER32(?), ref: 00D31F97
                                              • GetParent.USER32(?), ref: 00D31FAB
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00D31FAE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 711023334-1403004172
                                              • Opcode ID: 956a2a506ef5857d32e67f573cc80de484804ab6defd9ffeb8fcfd80e4fde0c7
                                              • Instruction ID: f3c40e86c9f57d58cc7f5404c4fdf990895930961a4235f0879a419956fa6726
                                              • Opcode Fuzzy Hash: 956a2a506ef5857d32e67f573cc80de484804ab6defd9ffeb8fcfd80e4fde0c7
                                              • Instruction Fuzzy Hash: AB21B379A00215BBCF05AFA0DC459FEBBB4EF15350F005116FAA1A72A1CBB459089B74
                                              APIs
                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00D63A9D
                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00D63AA0
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D63AC7
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D63AEA
                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00D63B62
                                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00D63BAC
                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00D63BC7
                                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00D63BE2
                                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00D63BF6
                                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00D63C13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$LongWindow
                                              • String ID:
                                              • API String ID: 312131281-0
                                              • Opcode ID: 68c4313a98720755caea922c563c68ee94d171500a478e324764118dc23dafd1
                                              • Instruction ID: 1da28e89af2de7f1a66c7f4474cb6bb1b87c97b50ab0a34d394c0fa924c5dfcd
                                              • Opcode Fuzzy Hash: 68c4313a98720755caea922c563c68ee94d171500a478e324764118dc23dafd1
                                              • Instruction Fuzzy Hash: 2C615775A00248AFDB10DFA8CC81EEE77B8EB09704F14419AFA15E72A1D774AA45DF60
                                              APIs
                                              • _free.LIBCMT ref: 00D02C94
                                                • Part of subcall function 00D029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000), ref: 00D029DE
                                                • Part of subcall function 00D029C8: GetLastError.KERNEL32(00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000,00000000), ref: 00D029F0
                                              • _free.LIBCMT ref: 00D02CA0
                                              • _free.LIBCMT ref: 00D02CAB
                                              • _free.LIBCMT ref: 00D02CB6
                                              • _free.LIBCMT ref: 00D02CC1
                                              • _free.LIBCMT ref: 00D02CCC
                                              • _free.LIBCMT ref: 00D02CD7
                                              • _free.LIBCMT ref: 00D02CE2
                                              • _free.LIBCMT ref: 00D02CED
                                              • _free.LIBCMT ref: 00D02CFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 93fdf1a2ac7496faf14969439dc12249402f4ec1989301636b855e253ad8b7f8
                                              • Instruction ID: 1e0ff701d6759fb46b349c16a8805a305e73c3d862bbbc7203de9f5faa22c4bb
                                              • Opcode Fuzzy Hash: 93fdf1a2ac7496faf14969439dc12249402f4ec1989301636b855e253ad8b7f8
                                              • Instruction Fuzzy Hash: 26119676141108AFCB02EF54E846EED3BA9FF05350F5145A5F94C5B262D731EA509FB0
                                              APIs
                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00CD1459
                                              • OleUninitialize.OLE32(?,00000000), ref: 00CD14F8
                                              • UnregisterHotKey.USER32(?), ref: 00CD16DD
                                              • DestroyWindow.USER32(?), ref: 00D124B9
                                              • FreeLibrary.KERNEL32(?), ref: 00D1251E
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00D1254B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                              • String ID: close all
                                              • API String ID: 469580280-3243417748
                                              • Opcode ID: 81716db5fd13642217cfa9fa787e00800a7356d66c684eb72dcfa5b1adb96a44
                                              • Instruction ID: 3fbe538b1dd37047e9e0556e9138c2bd73694eb2c6633b1ec5d01e52febd55f0
                                              • Opcode Fuzzy Hash: 81716db5fd13642217cfa9fa787e00800a7356d66c684eb72dcfa5b1adb96a44
                                              • Instruction Fuzzy Hash: 78D1AC31701212AFDB19EF15D895A69F7A1FF04700F1841AEE94AAB361CB31ED62CF60
                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D47FAD
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D47FC1
                                              • GetFileAttributesW.KERNEL32(?), ref: 00D47FEB
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00D48005
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D48017
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D48060
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00D480B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$AttributesFile
                                              • String ID: *.*
                                              • API String ID: 769691225-438819550
                                              • Opcode ID: 92b14fe1ca2f9768761b8e2d13205aa1f55f80bf7f707e67c2588ce116c0a51b
                                              • Instruction ID: db4688cfd21baaba4e3cc7c89c36dac34336df301ce15baf39fbfb449415c0b5
                                              • Opcode Fuzzy Hash: 92b14fe1ca2f9768761b8e2d13205aa1f55f80bf7f707e67c2588ce116c0a51b
                                              • Instruction Fuzzy Hash: F481A1715082429BCB20EF14C4849AEB3E8FF88350F184D6EF985D7250EB35DD49DB62
                                              APIs
                                              • SetWindowLongW.USER32(?,000000EB), ref: 00CD5C7A
                                                • Part of subcall function 00CD5D0A: GetClientRect.USER32(?,?), ref: 00CD5D30
                                                • Part of subcall function 00CD5D0A: GetWindowRect.USER32(?,?), ref: 00CD5D71
                                                • Part of subcall function 00CD5D0A: ScreenToClient.USER32(?,?), ref: 00CD5D99
                                              • GetDC.USER32 ref: 00D146F5
                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00D14708
                                              • SelectObject.GDI32(00000000,00000000), ref: 00D14716
                                              • SelectObject.GDI32(00000000,00000000), ref: 00D1472B
                                              • ReleaseDC.USER32(?,00000000), ref: 00D14733
                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00D147C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                              • String ID: U
                                              • API String ID: 4009187628-3372436214
                                              • Opcode ID: e72ff241bf4c256d15de42b4b40b3de8e77ea25ddb9eacc8ef8e6a5a816f5fec
                                              • Instruction ID: dc85c9cb6801af82c2f32e961119e4e702e813076752b38cf77233ade317dfbe
                                              • Opcode Fuzzy Hash: e72ff241bf4c256d15de42b4b40b3de8e77ea25ddb9eacc8ef8e6a5a816f5fec
                                              • Instruction Fuzzy Hash: BB71F534500205EFCF218F64D984AFA7BB1FF4A325F18426AEE555A2A5CB309C81DFB0
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00D435E4
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • LoadStringW.USER32(00DA2390,?,00000FFF,?), ref: 00D4360A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LoadString$_wcslen
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 4099089115-2391861430
                                              • Opcode ID: 494e5457850a8680bce6aa5b69acc8c32a1867df323d0787dbd7e0cd100e392c
                                              • Instruction ID: 3c19f8b4644aae47410e2dfd6a219160b8e28a378006facd67368b725ecd611a
                                              • Opcode Fuzzy Hash: 494e5457850a8680bce6aa5b69acc8c32a1867df323d0787dbd7e0cd100e392c
                                              • Instruction Fuzzy Hash: 81515D71900249BBDF14EBA4DC52EEEBB78EF05340F144126F205722A1EB715A99EF71
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                                • Part of subcall function 00CE912D: GetCursorPos.USER32(?), ref: 00CE9141
                                                • Part of subcall function 00CE912D: ScreenToClient.USER32(00000000,?), ref: 00CE915E
                                                • Part of subcall function 00CE912D: GetAsyncKeyState.USER32(00000001), ref: 00CE9183
                                                • Part of subcall function 00CE912D: GetAsyncKeyState.USER32(00000002), ref: 00CE919D
                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00D68B6B
                                              • ImageList_EndDrag.COMCTL32 ref: 00D68B71
                                              • ReleaseCapture.USER32 ref: 00D68B77
                                              • SetWindowTextW.USER32(?,00000000), ref: 00D68C12
                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00D68C25
                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00D68CFF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                              • API String ID: 1924731296-2107944366
                                              • Opcode ID: c10f234d002abe83b9740b1ecd562984b535ccf1bf84eedc5832b12c5981211b
                                              • Instruction ID: b355b4504f7fe47b0bdc0c125b8fa1572863b58ead20fc23c77127c9db0bf926
                                              • Opcode Fuzzy Hash: c10f234d002abe83b9740b1ecd562984b535ccf1bf84eedc5832b12c5981211b
                                              • Instruction Fuzzy Hash: 0E516975204304AFD704DF24DC9AFAA77E4EB89714F00062AFA96972E1CB709944DB72
                                              APIs
                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D4C272
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D4C29A
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D4C2CA
                                              • GetLastError.KERNEL32 ref: 00D4C322
                                              • SetEvent.KERNEL32(?), ref: 00D4C336
                                              • InternetCloseHandle.WININET(00000000), ref: 00D4C341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                              • String ID:
                                              • API String ID: 3113390036-3916222277
                                              • Opcode ID: 87998924ca3bd14f901d9850d7da7f8e21bf71cc91521c5381bb1553d71d9187
                                              • Instruction ID: 8e7456d2c4fd726710de21ede9905bd0ce8083bae79ea525512f702f0de7cf9f
                                              • Opcode Fuzzy Hash: 87998924ca3bd14f901d9850d7da7f8e21bf71cc91521c5381bb1553d71d9187
                                              • Instruction Fuzzy Hash: A8319FB1622308AFD7619FA48C88ABB7BFCEB49744B14951EF486D2210DB70DD049B70
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00D13AAF,?,?,Bad directive syntax error,00D6CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00D398BC
                                              • LoadStringW.USER32(00000000,?,00D13AAF,?), ref: 00D398C3
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00D39987
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HandleLoadMessageModuleString_wcslen
                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                              • API String ID: 858772685-4153970271
                                              • Opcode ID: 80397a5169cdc0639136086c4e257e62c88ed66004a78178e156ed74a43ae2d2
                                              • Instruction ID: ab56d0d68a65c19387cfb3e7b3a16f7a8045ae1a5e5a2d89bf586e51099c97fa
                                              • Opcode Fuzzy Hash: 80397a5169cdc0639136086c4e257e62c88ed66004a78178e156ed74a43ae2d2
                                              • Instruction Fuzzy Hash: AA21A03190020AAFCF11AF90CC06EFE7735FF18300F04441AF615621A2EB719A28EB31
                                              APIs
                                              • GetParent.USER32 ref: 00D320AB
                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00D320C0
                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00D3214D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameParentSend
                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                              • API String ID: 1290815626-3381328864
                                              • Opcode ID: 0dcab0567d1882e313dbeb32b34c774fa11d232d76383bdabaad5ab434a96257
                                              • Instruction ID: a56c171629ced85925e371e643900b53549f1f4cfbdd3180707d55be1fdd9474
                                              • Opcode Fuzzy Hash: 0dcab0567d1882e313dbeb32b34c774fa11d232d76383bdabaad5ab434a96257
                                              • Instruction Fuzzy Hash: 24112C77A8870BBAFB152220EC07DB7379CCB15328F200166F744E50E5FEB1A8056634
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e1815725160046eb66e9a52532c5743bc8d21c778a1fef621c74b7245ee7190d
                                              • Instruction ID: a76a34758d895d478ef38c6c3e544336493809a8df9120a3d8bfa43d4f5760e7
                                              • Opcode Fuzzy Hash: e1815725160046eb66e9a52532c5743bc8d21c778a1fef621c74b7245ee7190d
                                              • Instruction Fuzzy Hash: DCC1EF74A04349AFDB11DFA8D851BADBFB0AF4A310F184199F998A73D2C7309942DB71
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                              • String ID:
                                              • API String ID: 1282221369-0
                                              • Opcode ID: 3259269a005dce6f2b0aca80daef598bb97aedc2d965226e525202dd394bcb4a
                                              • Instruction ID: f6afa187950116b1cd5240d5725db552aba45bfaf9f98fa919b63efbf8ad6498
                                              • Opcode Fuzzy Hash: 3259269a005dce6f2b0aca80daef598bb97aedc2d965226e525202dd394bcb4a
                                              • Instruction Fuzzy Hash: 9461F572906302ABDF21AFB49885B7D7FA5EF05320F18426EF94D972C1D63199058772
                                              APIs
                                              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00D65186
                                              • ShowWindow.USER32(?,00000000), ref: 00D651C7
                                              • ShowWindow.USER32(?,00000005,?,00000000), ref: 00D651CD
                                              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00D651D1
                                                • Part of subcall function 00D66FBA: DeleteObject.GDI32(00000000), ref: 00D66FE6
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D6520D
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D6521A
                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00D6524D
                                              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00D65287
                                              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00D65296
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                              • String ID:
                                              • API String ID: 3210457359-0
                                              • Opcode ID: 158d9a8a8deee3f7b94a8e83b072c967a6dd469fef45332d4d748344cb2e0f20
                                              • Instruction ID: 873be65583bbf1152abf13872407d6802a3cdc8c10086662c59ec0781640f863
                                              • Opcode Fuzzy Hash: 158d9a8a8deee3f7b94a8e83b072c967a6dd469fef45332d4d748344cb2e0f20
                                              • Instruction Fuzzy Hash: 5B51C370A50B08BFEF209F24EC55BD93B65FB0A320F184012F669962E4C3B999D0DB75
                                              APIs
                                              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00D26890
                                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00D268A9
                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00D268B9
                                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00D268D1
                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00D268F2
                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00CE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00D26901
                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00D2691E
                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00CE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00D2692D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                                              • String ID:
                                              • API String ID: 1268354404-0
                                              • Opcode ID: 0ec2a6c990ef2afaa6144f1765c888ec9b839f33e67c2b5f4b196b76f0b1e8fd
                                              • Instruction ID: 7ccfadde5573d67efab96e1f861b6cca476bb94c0cbfc9d391d840b4b3a2d333
                                              • Opcode Fuzzy Hash: 0ec2a6c990ef2afaa6144f1765c888ec9b839f33e67c2b5f4b196b76f0b1e8fd
                                              • Instruction Fuzzy Hash: FB51A774600309EFDB20CF26CC91BAA7BB5EB58350F144518F956D72E0DBB0E990DB60
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D4C182
                                              • GetLastError.KERNEL32 ref: 00D4C195
                                              • SetEvent.KERNEL32(?), ref: 00D4C1A9
                                                • Part of subcall function 00D4C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D4C272
                                                • Part of subcall function 00D4C253: GetLastError.KERNEL32 ref: 00D4C322
                                                • Part of subcall function 00D4C253: SetEvent.KERNEL32(?), ref: 00D4C336
                                                • Part of subcall function 00D4C253: InternetCloseHandle.WININET(00000000), ref: 00D4C341
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                              • String ID:
                                              • API String ID: 337547030-0
                                              • Opcode ID: 8705217efb8e8ab2ab890539a65db29529d11ac4510d41e49a8da5190507b3e2
                                              • Instruction ID: 8881c089b574c7b206d89d1ccaaa9ab6c29ad4d684e2c6a79df69f29733a2f7d
                                              • Opcode Fuzzy Hash: 8705217efb8e8ab2ab890539a65db29529d11ac4510d41e49a8da5190507b3e2
                                              • Instruction Fuzzy Hash: A631AF71222741AFDB619FB5DC84A76BBF8FF18300B04642DF99AC6620D7B1E8149B74
                                              APIs
                                                • Part of subcall function 00D33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D33A57
                                                • Part of subcall function 00D33A3D: GetCurrentThreadId.KERNEL32 ref: 00D33A5E
                                                • Part of subcall function 00D33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D325B3), ref: 00D33A65
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D325BD
                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00D325DB
                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00D325DF
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D325E9
                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00D32601
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00D32605
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D3260F
                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00D32623
                                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00D32627
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                              • String ID:
                                              • API String ID: 2014098862-0
                                              • Opcode ID: 4db9ba1f0e640d34c83af5101bcbe3631e4bc53323ef56bd3c298513ecbfb44a
                                              • Instruction ID: 81c69266f825deb22a7eb2d2209d07f5bcb120bf016aa70f1f49711d2d3c353a
                                              • Opcode Fuzzy Hash: 4db9ba1f0e640d34c83af5101bcbe3631e4bc53323ef56bd3c298513ecbfb44a
                                              • Instruction Fuzzy Hash: 2C01B1317A0310BBFB106768DC8AF693E59DB5AB12F101001F398EE1E1C9E264448A79
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00D31449,?,?,00000000), ref: 00D3180C
                                              • HeapAlloc.KERNEL32(00000000,?,00D31449,?,?,00000000), ref: 00D31813
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D31449,?,?,00000000), ref: 00D31828
                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00D31449,?,?,00000000), ref: 00D31830
                                              • DuplicateHandle.KERNEL32(00000000,?,00D31449,?,?,00000000), ref: 00D31833
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D31449,?,?,00000000), ref: 00D31843
                                              • GetCurrentProcess.KERNEL32(00D31449,00000000,?,00D31449,?,?,00000000), ref: 00D3184B
                                              • DuplicateHandle.KERNEL32(00000000,?,00D31449,?,?,00000000), ref: 00D3184E
                                              • CreateThread.KERNEL32(00000000,00000000,00D31874,00000000,00000000,00000000), ref: 00D31868
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                              • String ID:
                                              • API String ID: 1957940570-0
                                              • Opcode ID: a57b093ac4eb08c07bbbba01dce74b03d99018b493d30bb3bfb6debb657f798f
                                              • Instruction ID: b60f28874bbbadfd0c76b73f796e9f6cc83116ffe7f2dc4d631c0c0a6468e215
                                              • Opcode Fuzzy Hash: a57b093ac4eb08c07bbbba01dce74b03d99018b493d30bb3bfb6debb657f798f
                                              • Instruction Fuzzy Hash: CD01BF75250344BFE710AB65DC4DF673B6CEB8AB11F005411FA45DB291C6B59800CB30
                                              APIs
                                                • Part of subcall function 00CD7620: _wcslen.LIBCMT ref: 00CD7625
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D3C6EE
                                              • _wcslen.LIBCMT ref: 00D3C735
                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D3C79C
                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00D3C7CA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info_wcslen$Default
                                              • String ID: 0$PL$PL
                                              • API String ID: 1227352736-1160138948
                                              • Opcode ID: 4bffd65764d6d80d9c95a5ae412d6f9c9ef8ff97a7d63d5ff099b0fbb511745a
                                              • Instruction ID: 3af0189883e4adf12ba9bc85e9bd89f3ef3a86b4282af6a2c15119739231ffff
                                              • Opcode Fuzzy Hash: 4bffd65764d6d80d9c95a5ae412d6f9c9ef8ff97a7d63d5ff099b0fbb511745a
                                              • Instruction Fuzzy Hash: DE51A2B26253419BD7149F28CC85B6B77E8AF49310F082A2DF995F32A1DB70D904DB72
                                              APIs
                                                • Part of subcall function 00D3D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00D3D501
                                                • Part of subcall function 00D3D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00D3D50F
                                                • Part of subcall function 00D3D4DC: CloseHandle.KERNEL32(00000000), ref: 00D3D5DC
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D5A16D
                                              • GetLastError.KERNEL32 ref: 00D5A180
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D5A1B3
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00D5A268
                                              • GetLastError.KERNEL32(00000000), ref: 00D5A273
                                              • CloseHandle.KERNEL32(00000000), ref: 00D5A2C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                              • String ID: SeDebugPrivilege
                                              • API String ID: 2533919879-2896544425
                                              • Opcode ID: add2c4c7b022564c50b43741342cac84d4445788fde2d998749c63a6a453a1fb
                                              • Instruction ID: 91da1cf5142787a7bd4e9878062a5a8bddab06829c1031338c0af17672a7a08c
                                              • Opcode Fuzzy Hash: add2c4c7b022564c50b43741342cac84d4445788fde2d998749c63a6a453a1fb
                                              • Instruction Fuzzy Hash: FA619F302047529FDB10DF18C495F25BBE1AF44319F18858CE8668B7A3C776EC49CBA2
                                              APIs
                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00D63925
                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00D6393A
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00D63954
                                              • _wcslen.LIBCMT ref: 00D63999
                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00D639C6
                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00D639F4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window_wcslen
                                              • String ID: SysListView32
                                              • API String ID: 2147712094-78025650
                                              • Opcode ID: 83eebc313f67aae134866396482d82b613b5fdb44380f01b75c0c11444d4ed8f
                                              • Instruction ID: ada462304415eb8b1059388d1da13104f3dcffaee960dee7217ae070fb33bcde
                                              • Opcode Fuzzy Hash: 83eebc313f67aae134866396482d82b613b5fdb44380f01b75c0c11444d4ed8f
                                              • Instruction Fuzzy Hash: C8418171A00319ABEF219F64CC45BEA77A9EF08350F140526F958E7291D7B59A84CBB0
                                              APIs
                                              • LoadIconW.USER32(00000000,00007F03), ref: 00D3C913
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: IconLoad
                                              • String ID: blank$info$question$stop$warning
                                              • API String ID: 2457776203-404129466
                                              • Opcode ID: 94e0c24891c70ebfa88b1eda7614e0170b5aed85d463a1d6137644e3c55ef59c
                                              • Instruction ID: 64f1bcb9d6601eab3c19ebd2651f1b659413a7dc44b96a71b5587dc00c4cf65e
                                              • Opcode Fuzzy Hash: 94e0c24891c70ebfa88b1eda7614e0170b5aed85d463a1d6137644e3c55ef59c
                                              • Instruction Fuzzy Hash: 8111E7326A930ABEAB059B549C82DAB779CDF15355F21106AF500B6282E7B0EF006775
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$LocalTime
                                              • String ID:
                                              • API String ID: 952045576-0
                                              • Opcode ID: ed983ba01f7943323eb508a7dbf5d97ad4509a411820f26d80c0b5e9f8f4c052
                                              • Instruction ID: 791af84188deaa14911b18606270cef697b503022d2ea3172118a9b9280e22fe
                                              • Opcode Fuzzy Hash: ed983ba01f7943323eb508a7dbf5d97ad4509a411820f26d80c0b5e9f8f4c052
                                              • Instruction Fuzzy Hash: ED41BF65D1021C65CB51EBB4C88AADFB3BCAF45700F408466F618F31A1EB34E245C3E6
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00D2682C,00000004,00000000,00000000), ref: 00CEF953
                                              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00D2682C,00000004,00000000,00000000), ref: 00D2F3D1
                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00D2682C,00000004,00000000,00000000), ref: 00D2F454
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: fe5a5de2b3286e39f0fd3502e8e637764ca44b801a1d249afdaa2bf337727186
                                              • Instruction ID: b65e38eabdb75dac609eb4270432dc8592fd460ece179a2c688b861a39e69c10
                                              • Opcode Fuzzy Hash: fe5a5de2b3286e39f0fd3502e8e637764ca44b801a1d249afdaa2bf337727186
                                              • Instruction Fuzzy Hash: 3A412D316087C0BAC735DB3BD88873E7BA1AB56314F15443DE0D797662C676A982CB31
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00D62D1B
                                              • GetDC.USER32(00000000), ref: 00D62D23
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D62D2E
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00D62D3A
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00D62D76
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00D62D87
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00D65A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00D62DC2
                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00D62DE1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                              • String ID:
                                              • API String ID: 3864802216-0
                                              • Opcode ID: dcfc1fa801f2a5506659cf86130030e3cb58ed563d9253cf6ee155b89351e47e
                                              • Instruction ID: fd2255b7a36c2e02b68fd49eef76ef69eeb26ad6bdcaeb1ba5d02a0030b76418
                                              • Opcode Fuzzy Hash: dcfc1fa801f2a5506659cf86130030e3cb58ed563d9253cf6ee155b89351e47e
                                              • Instruction Fuzzy Hash: 1B316B72211614BBEB118F50CC8AFFB3BA9EB09715F085055FE48DA2A1D6B59C50CBB4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 41147f505f687982c2367d318b8023ef5cb365a1151b058788281f25f0c99bb0
                                              • Instruction ID: 9abd1079c4e0bc35e7d60b047fda7ef590b685c65a5ed895954b947cef9b3030
                                              • Opcode Fuzzy Hash: 41147f505f687982c2367d318b8023ef5cb365a1151b058788281f25f0c99bb0
                                              • Instruction Fuzzy Hash: F221A4B1645E09BBD2145720BE83FBA335DAF21384F890030FE059A689F720ED18D2F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: NULL Pointer assignment$Not an Object type
                                              • API String ID: 0-572801152
                                              • Opcode ID: ed57c2b732da734927d0ac681a78a55f41dade8940e51e4436d4f05eef7052bb
                                              • Instruction ID: 087dee8a6f734ff2194d944ff488e2198c96011fccf08eb29ee09d2f8cd6adb2
                                              • Opcode Fuzzy Hash: ed57c2b732da734927d0ac681a78a55f41dade8940e51e4436d4f05eef7052bb
                                              • Instruction Fuzzy Hash: 45D1BF71A0060A9FDF11CF98D890BAEB7B5BF48345F188069ED15AB284D770ED49CBB0
                                              APIs
                                              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00D117FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00D115CE
                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00D117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00D11651
                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00D117FB,?,00D117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00D116E4
                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00D117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00D116FB
                                                • Part of subcall function 00D03820: RtlAllocateHeap.NTDLL(00000000,?,00DA1444,?,00CEFDF5,?,?,00CDA976,00000010,00DA1440,00CD13FC,?,00CD13C6,?,00CD1129), ref: 00D03852
                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00D117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00D11777
                                              • __freea.LIBCMT ref: 00D117A2
                                              • __freea.LIBCMT ref: 00D117AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                              • String ID:
                                              • API String ID: 2829977744-0
                                              • Opcode ID: 05060767e0cbb9105d0958a294f8821e9bf77d12789a63812343cb497a64c8f1
                                              • Instruction ID: b38b81140981240d4482969a5c4d770feff1a6f38bdd87ab644f97c0dd60ea0e
                                              • Opcode Fuzzy Hash: 05060767e0cbb9105d0958a294f8821e9bf77d12789a63812343cb497a64c8f1
                                              • Instruction Fuzzy Hash: BA91C479E04216BAEB208F64E841AEE7BB6DF49310F1C4659EA05E7281DF35CC84C770
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit
                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                              • API String ID: 2610073882-625585964
                                              • Opcode ID: 65a97d0da965b81fa760029962b4d77d7635ef64bc1efd8fc02ff16ee1c36346
                                              • Instruction ID: b47c660b2d10f96d53553fa20e788ea9b4669bd4e5031b826962051184fc30f0
                                              • Opcode Fuzzy Hash: 65a97d0da965b81fa760029962b4d77d7635ef64bc1efd8fc02ff16ee1c36346
                                              • Instruction Fuzzy Hash: 22917171A00215AFDF20CFA5C884FAE7BB8EF45719F148559FD05AB280D7709989CBB1
                                              APIs
                                              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00D4125C
                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00D41284
                                              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00D412A8
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D412D8
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D4135F
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D413C4
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D41430
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                                              • String ID:
                                              • API String ID: 2550207440-0
                                              • Opcode ID: c2edebf6a0ab8a30d2037da61c3e175bb648403fcdbacdd5d68cf6df3e1476dc
                                              • Instruction ID: 309034bc78c8dccd85865e08a458440a3eacc645d4b13215fd6474cb81eb9a29
                                              • Opcode Fuzzy Hash: c2edebf6a0ab8a30d2037da61c3e175bb648403fcdbacdd5d68cf6df3e1476dc
                                              • Instruction Fuzzy Hash: CD91F379A00219AFDB00DFA8C885BBEB7B5FF44315F144029E944EB291D7B4E985CBB4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: 241c08e357ca471b291b0e750504ed560b28a086e918a08da250adfe8802d55f
                                              • Instruction ID: 130c40078fffc2b0e2f6c14facea8124a985ae87f88b652e14ae08ba4f1558d8
                                              • Opcode Fuzzy Hash: 241c08e357ca471b291b0e750504ed560b28a086e918a08da250adfe8802d55f
                                              • Instruction Fuzzy Hash: D1913871D00259EFCB10CFAACC84AEEBBB8FF49320F14855AE515B7251D774AA42DB60
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00D5396B
                                              • CharUpperBuffW.USER32(?,?), ref: 00D53A7A
                                              • _wcslen.LIBCMT ref: 00D53A8A
                                              • VariantClear.OLEAUT32(?), ref: 00D53C1F
                                                • Part of subcall function 00D40CDF: VariantInit.OLEAUT32(00000000), ref: 00D40D1F
                                                • Part of subcall function 00D40CDF: VariantCopy.OLEAUT32(?,?), ref: 00D40D28
                                                • Part of subcall function 00D40CDF: VariantClear.OLEAUT32(?), ref: 00D40D34
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                              • API String ID: 4137639002-1221869570
                                              • Opcode ID: 174f297a943c000078433bcda8ad2502fb4798909e5800a281840a59e1315f93
                                              • Instruction ID: d81c70a4f0d1b3873d50732a670f81a285c9c6d6ab7c41656f5699303bb54123
                                              • Opcode Fuzzy Hash: 174f297a943c000078433bcda8ad2502fb4798909e5800a281840a59e1315f93
                                              • Instruction Fuzzy Hash: F0917A746083459FCB04DF24C48096AB7E4FF88355F14892EF8899B351DB31EE49CBA2
                                              APIs
                                                • Part of subcall function 00D3000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?,?,00D3035E), ref: 00D3002B
                                                • Part of subcall function 00D3000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?), ref: 00D30046
                                                • Part of subcall function 00D3000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?), ref: 00D30054
                                                • Part of subcall function 00D3000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?), ref: 00D30064
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00D54C51
                                              • _wcslen.LIBCMT ref: 00D54D59
                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00D54DCF
                                              • CoTaskMemFree.OLE32(?), ref: 00D54DDA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                              • String ID: NULL Pointer assignment
                                              • API String ID: 614568839-2785691316
                                              • Opcode ID: 23e41c95cc76f682d8f09b87d2a78b9bfea52173f797b23c50729b9844ddc6b2
                                              • Instruction ID: 172eb974db9c977b94126195d2fe5ef1dbb932d6250505bf939c0f5064075f00
                                              • Opcode Fuzzy Hash: 23e41c95cc76f682d8f09b87d2a78b9bfea52173f797b23c50729b9844ddc6b2
                                              • Instruction Fuzzy Hash: F9911671D0021DAFDF14DFA4D891AEEB7B8FF08314F10816AE915A7291DB709A48DFA1
                                              APIs
                                              • GetMenu.USER32(?), ref: 00D62183
                                              • GetMenuItemCount.USER32(00000000), ref: 00D621B5
                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00D621DD
                                              • _wcslen.LIBCMT ref: 00D62213
                                              • GetMenuItemID.USER32(?,?), ref: 00D6224D
                                              • GetSubMenu.USER32(?,?), ref: 00D6225B
                                                • Part of subcall function 00D33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D33A57
                                                • Part of subcall function 00D33A3D: GetCurrentThreadId.KERNEL32 ref: 00D33A5E
                                                • Part of subcall function 00D33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D325B3), ref: 00D33A65
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00D622E3
                                                • Part of subcall function 00D3E97B: Sleep.KERNEL32 ref: 00D3E9F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                              • String ID:
                                              • API String ID: 4196846111-0
                                              • Opcode ID: 30c098b494f97a832fac1a24e67af6ac0f9c639cbd9d9ef8d26d972a18ad3942
                                              • Instruction ID: 9b1bbed6569f29719e381b4b0e181feea34abfb83e32e43a2d1159ca03070df8
                                              • Opcode Fuzzy Hash: 30c098b494f97a832fac1a24e67af6ac0f9c639cbd9d9ef8d26d972a18ad3942
                                              • Instruction Fuzzy Hash: 6D719D75E00605AFCB10DFA8C881ABEB7F5EF88310F148459E956EB351DB74EE418BA0
                                              APIs
                                              • IsWindow.USER32(00E74C00), ref: 00D67F37
                                              • IsWindowEnabled.USER32(00E74C00), ref: 00D67F43
                                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00D6801E
                                              • SendMessageW.USER32(00E74C00,000000B0,?,?), ref: 00D68051
                                              • IsDlgButtonChecked.USER32(?,?), ref: 00D68089
                                              • GetWindowLongW.USER32(00E74C00,000000EC), ref: 00D680AB
                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00D680C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                              • String ID:
                                              • API String ID: 4072528602-0
                                              • Opcode ID: b8a94d3341b54e1f5a64fde143230ddf20181a39cae6d7a5c1a4ce21062a0c51
                                              • Instruction ID: 48af55e73a4ba22b7d4ca953b7ddc90974307be0808a2e84d7988fb221e2b68e
                                              • Opcode Fuzzy Hash: b8a94d3341b54e1f5a64fde143230ddf20181a39cae6d7a5c1a4ce21062a0c51
                                              • Instruction Fuzzy Hash: AF71AD34608208AFEB21DF64CC94FBABBB5EF0A344F184559F995973A1CB71A845DB30
                                              APIs
                                              • GetParent.USER32(?), ref: 00D3AEF9
                                              • GetKeyboardState.USER32(?), ref: 00D3AF0E
                                              • SetKeyboardState.USER32(?), ref: 00D3AF6F
                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00D3AF9D
                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00D3AFBC
                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00D3AFFD
                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00D3B020
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: b570130098237da77fa4d1c001ec11799aeb7ed302fd85fe90fbc58f16e88151
                                              • Instruction ID: bc469434c20831eef6db454192417374a21fb0edf61b4e3682c1e3039e75802b
                                              • Opcode Fuzzy Hash: b570130098237da77fa4d1c001ec11799aeb7ed302fd85fe90fbc58f16e88151
                                              • Instruction Fuzzy Hash: 5D51AFA06147D53DFB364238C845BBABFA95F06314F0C858AF2D9998D2C3D9AC88D771
                                              APIs
                                              • GetParent.USER32(00000000), ref: 00D3AD19
                                              • GetKeyboardState.USER32(?), ref: 00D3AD2E
                                              • SetKeyboardState.USER32(?), ref: 00D3AD8F
                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00D3ADBB
                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00D3ADD8
                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00D3AE17
                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00D3AE38
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 4c4482a50ecb70a75cbe3b7064efbf4ab457fbf3b81b1c52a865a442366c62f2
                                              • Instruction ID: 1cd8403a5442c52a36fcf2310b4c846879f8f7d2adb7867317747301a0c6c85d
                                              • Opcode Fuzzy Hash: 4c4482a50ecb70a75cbe3b7064efbf4ab457fbf3b81b1c52a865a442366c62f2
                                              • Instruction Fuzzy Hash: 0851D3A17047E53DFB368338CC55B7ABEA85B46300F0C8589F1D59A8D2D294EC88D772
                                              APIs
                                              • GetConsoleCP.KERNEL32(00D13CD6,?,?,?,?,?,?,?,?,00D05BA3,?,?,00D13CD6,?,?), ref: 00D05470
                                              • __fassign.LIBCMT ref: 00D054EB
                                              • __fassign.LIBCMT ref: 00D05506
                                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00D13CD6,00000005,00000000,00000000), ref: 00D0552C
                                              • WriteFile.KERNEL32(?,00D13CD6,00000000,00D05BA3,00000000,?,?,?,?,?,?,?,?,?,00D05BA3,?), ref: 00D0554B
                                              • WriteFile.KERNEL32(?,?,00000001,00D05BA3,00000000,?,?,?,?,?,?,?,?,?,00D05BA3,?), ref: 00D05584
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                              • String ID:
                                              • API String ID: 1324828854-0
                                              • Opcode ID: a69a5be2194c18d0d7046b77c7a174624500ad81ff00e2ff196d35c6bc8e590d
                                              • Instruction ID: 076397d6b165e3a9eb0e58b0842830452e0de15e3dcdcd5f352c369faf1cabc9
                                              • Opcode Fuzzy Hash: a69a5be2194c18d0d7046b77c7a174624500ad81ff00e2ff196d35c6bc8e590d
                                              • Instruction Fuzzy Hash: 5E517D71A006499FDB10CFA8EC45BEEBBF9EF09300F14415AE959E7295D6709A41CF70
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00CE9141
                                              • ScreenToClient.USER32(00000000,?), ref: 00CE915E
                                              • GetAsyncKeyState.USER32(00000001), ref: 00CE9183
                                              • GetAsyncKeyState.USER32(00000002), ref: 00CE919D
                                              Strings
                                              • 84f544bba202baeceba32696cbe3b53c01faace3041cc6d0f6a8b8c6fb8266076aa461dda0357bdb03e690c011e026262bb61d984c2abb4d19659696ccd3dd548b, xrefs: 00D27152
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID: 84f544bba202baeceba32696cbe3b53c01faace3041cc6d0f6a8b8c6fb8266076aa461dda0357bdb03e690c011e026262bb61d984c2abb4d19659696ccd3dd548b
                                              • API String ID: 4210589936-1207540932
                                              • Opcode ID: 11c678c080b9d2fcd88466565ba8a23618195be5217e994e397a2d5455f328c1
                                              • Instruction ID: b6563324cbf3c10791dd2eb85f1c60960c48131968ffcb4b488e5068c0ee3f3b
                                              • Opcode Fuzzy Hash: 11c678c080b9d2fcd88466565ba8a23618195be5217e994e397a2d5455f328c1
                                              • Instruction Fuzzy Hash: A3417131A0861AFBDF199F65D844BFEB774FF15324F208219E469A32E0C7706950DBA1
                                              APIs
                                              • _ValidateLocalCookies.LIBCMT ref: 00CF2D4B
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00CF2D53
                                              • _ValidateLocalCookies.LIBCMT ref: 00CF2DE1
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00CF2E0C
                                              • _ValidateLocalCookies.LIBCMT ref: 00CF2E61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                              • String ID: csm
                                              • API String ID: 1170836740-1018135373
                                              • Opcode ID: b7ecbefef0cec783798e125a2eab0bb120d6b197fa3b73787aa05038e01faedc
                                              • Instruction ID: 590607a1ea7cf10befbf589e9b5b4cd7f36757671555bdc78fd31ed24b43c02d
                                              • Opcode Fuzzy Hash: b7ecbefef0cec783798e125a2eab0bb120d6b197fa3b73787aa05038e01faedc
                                              • Instruction Fuzzy Hash: 9941B534A0020DABCF54DF68C845AFEBBB5BF45314F148155EA24AB392D7359A05CBE2
                                              APIs
                                                • Part of subcall function 00D5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00D5307A
                                                • Part of subcall function 00D5304E: _wcslen.LIBCMT ref: 00D5309B
                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00D51112
                                              • WSAGetLastError.WSOCK32 ref: 00D51121
                                              • WSAGetLastError.WSOCK32 ref: 00D511C9
                                              • closesocket.WSOCK32(00000000), ref: 00D511F9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 2675159561-0
                                              • Opcode ID: 4f652b18ce5a899aedbc80ac838d3fbff656533dc82e49d0e602a385bdd02b04
                                              • Instruction ID: 2f26e9fb9089d3fbcba462143f2b703a6dffbb6a5325cbf75a4b20dbea9a7b2f
                                              • Opcode Fuzzy Hash: 4f652b18ce5a899aedbc80ac838d3fbff656533dc82e49d0e602a385bdd02b04
                                              • Instruction Fuzzy Hash: 8341DF35200704AFDB109F64C884BA9BBA9EF44365F188099FD469B391C774AD45CBB0
                                              APIs
                                                • Part of subcall function 00D3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D3CF22,?), ref: 00D3DDFD
                                                • Part of subcall function 00D3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D3CF22,?), ref: 00D3DE16
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00D3CF45
                                              • MoveFileW.KERNEL32(?,?), ref: 00D3CF7F
                                              • _wcslen.LIBCMT ref: 00D3D005
                                              • _wcslen.LIBCMT ref: 00D3D01B
                                              • SHFileOperationW.SHELL32(?), ref: 00D3D061
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                              • String ID: \*.*
                                              • API String ID: 3164238972-1173974218
                                              • Opcode ID: 4b65562e1ab5f0745f2d962b51854b45b050d3dd27ed1b8341069ba4922ea016
                                              • Instruction ID: 448fcf6666f911620a68fab8ac19621fecaf1e7cca69a9919916a0f9b408fb7d
                                              • Opcode Fuzzy Hash: 4b65562e1ab5f0745f2d962b51854b45b050d3dd27ed1b8341069ba4922ea016
                                              • Instruction Fuzzy Hash: 4F4185759062185FDF12EFA0D981AEEB7B9EF48340F0400E6E605EB141EB34A648CF70
                                              APIs
                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00D62E1C
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D62E4F
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D62E84
                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00D62EB6
                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00D62EE0
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D62EF1
                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00D62F0B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LongWindow$MessageSend
                                              • String ID:
                                              • API String ID: 2178440468-0
                                              • Opcode ID: 7fd3a2c185aebd94d12d0dfd0bdb992cd588f7f2bca1ac7d370c1a43ed414d57
                                              • Instruction ID: 8152771b1b8772f8781704f751b5519b3ceaccb027f3f3fca0a4609b5473ea13
                                              • Opcode Fuzzy Hash: 7fd3a2c185aebd94d12d0dfd0bdb992cd588f7f2bca1ac7d370c1a43ed414d57
                                              • Instruction Fuzzy Hash: DC311334644640AFDB20CF58DC84F7637E0EBAA710F180165F950CB2B2CBB2A840DB22
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D37769
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D3778F
                                              • SysAllocString.OLEAUT32(00000000), ref: 00D37792
                                              • SysAllocString.OLEAUT32(?), ref: 00D377B0
                                              • SysFreeString.OLEAUT32(?), ref: 00D377B9
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00D377DE
                                              • SysAllocString.OLEAUT32(?), ref: 00D377EC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 5a5114d4926480d4c4f1df20f5bd2469c8b3d94df232fde020ded77623b8369e
                                              • Instruction ID: 63e5eed821d4494cba59868abf2696e59d25a310b445fc14e169257fdeb2dc67
                                              • Opcode Fuzzy Hash: 5a5114d4926480d4c4f1df20f5bd2469c8b3d94df232fde020ded77623b8369e
                                              • Instruction Fuzzy Hash: 3021A4B6608619AFDF20DFA9CC88CBB77ACEB09764B048025F955DB250D670EC41C7B0
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D37842
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D37868
                                              • SysAllocString.OLEAUT32(00000000), ref: 00D3786B
                                              • SysAllocString.OLEAUT32 ref: 00D3788C
                                              • SysFreeString.OLEAUT32 ref: 00D37895
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00D378AF
                                              • SysAllocString.OLEAUT32(?), ref: 00D378BD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 0cf68edec12d7ed5ff42e1b9c4f1a88a4e84162a200e76840d44e111ec688dc2
                                              • Instruction ID: a87ce86b97ca5874778e1d01bb39fdb5b4ea2cb75f2bb33da8fc8921ffd09063
                                              • Opcode Fuzzy Hash: 0cf68edec12d7ed5ff42e1b9c4f1a88a4e84162a200e76840d44e111ec688dc2
                                              • Instruction Fuzzy Hash: 6721A471604605AFDB209FA9DC88DBA77ECEB09360B148125F955DB2A1DA70EC41CB74
                                              APIs
                                              • GetStdHandle.KERNEL32(0000000C), ref: 00D404F2
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D4052E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateHandlePipe
                                              • String ID: nul
                                              • API String ID: 1424370930-2873401336
                                              • Opcode ID: 6819e6934a4523c2b33d9d6846b138b36190f69d0bc9997181b1d5639678b1c4
                                              • Instruction ID: fbe700e61505ce6592b0f18bf6dc7f3132d2bc5d83ec9c54bf28d1e5170920a7
                                              • Opcode Fuzzy Hash: 6819e6934a4523c2b33d9d6846b138b36190f69d0bc9997181b1d5639678b1c4
                                              • Instruction Fuzzy Hash: BA212C75500305ABDF209F69D844AAA7BB4EF85764F244A19EAA1D72E0D7B0D940CF30
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 00D405C6
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D40601
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateHandlePipe
                                              • String ID: nul
                                              • API String ID: 1424370930-2873401336
                                              • Opcode ID: 7bc48b0dbb679d6cfefcf096cedabb4dc9ae321556d4ea3a11f58e65526a1763
                                              • Instruction ID: 1cc5415b67817ddd247d8ae8b1e5b3cc4940454b35de54a53a0626d8d6cdacfb
                                              • Opcode Fuzzy Hash: 7bc48b0dbb679d6cfefcf096cedabb4dc9ae321556d4ea3a11f58e65526a1763
                                              • Instruction Fuzzy Hash: B62181755003059BDF209F698C04AAA7BE4AF95720F244A19FEE2E72E0D7B09860CB74
                                              APIs
                                                • Part of subcall function 00CD600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00CD604C
                                                • Part of subcall function 00CD600E: GetStockObject.GDI32(00000011), ref: 00CD6060
                                                • Part of subcall function 00CD600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CD606A
                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00D64112
                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00D6411F
                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00D6412A
                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00D64139
                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00D64145
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$CreateObjectStockWindow
                                              • String ID: Msctls_Progress32
                                              • API String ID: 1025951953-3636473452
                                              • Opcode ID: f7cad5cb1769158504def455724b7dcf653d26d329960d85c71b12d846c468b2
                                              • Instruction ID: 48f05f98e28bf9cfbc5070faf1963c73d5d78193651775428f9aa1c8fbbb2e9f
                                              • Opcode Fuzzy Hash: f7cad5cb1769158504def455724b7dcf653d26d329960d85c71b12d846c468b2
                                              • Instruction Fuzzy Hash: 941190B215021ABFEF119E64CC85EE77F5DEF09798F004111BB58A2150C6769C61DBB4
                                              APIs
                                                • Part of subcall function 00D0D7A3: _free.LIBCMT ref: 00D0D7CC
                                              • _free.LIBCMT ref: 00D0D82D
                                                • Part of subcall function 00D029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000), ref: 00D029DE
                                                • Part of subcall function 00D029C8: GetLastError.KERNEL32(00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000,00000000), ref: 00D029F0
                                              • _free.LIBCMT ref: 00D0D838
                                              • _free.LIBCMT ref: 00D0D843
                                              • _free.LIBCMT ref: 00D0D897
                                              • _free.LIBCMT ref: 00D0D8A2
                                              • _free.LIBCMT ref: 00D0D8AD
                                              • _free.LIBCMT ref: 00D0D8B8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                              • Instruction ID: 5ea3f664712414d47c6603feedb3ca04c7fa9d46891a442a6776fb67bd0f96b1
                                              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                              • Instruction Fuzzy Hash: 9B112971581B04AAD621BFF4DC4AFDB7B9DEF80700F404826B29EA60D2DB75A5058A70
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00D3DA74
                                              • LoadStringW.USER32(00000000), ref: 00D3DA7B
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00D3DA91
                                              • LoadStringW.USER32(00000000), ref: 00D3DA98
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00D3DADC
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 00D3DAB9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message
                                              • String ID: %s (%d) : ==> %s: %s %s
                                              • API String ID: 4072794657-3128320259
                                              • Opcode ID: 9a256c5cb553a90708b13a54bcda401c03887a81baf1ebade121a0d44a055b92
                                              • Instruction ID: 37bbc51c4d4d7aa4ef5230a19fb7d5cbe8355154d47831984f623e4d61fb762a
                                              • Opcode Fuzzy Hash: 9a256c5cb553a90708b13a54bcda401c03887a81baf1ebade121a0d44a055b92
                                              • Instruction Fuzzy Hash: F801FFF65103087FE7119BA49D89EF6766CE708701F405496F786E2141E6B49E844F74
                                              APIs
                                              • InterlockedExchange.KERNEL32(00E6E108,00E6E108), ref: 00D4097B
                                              • EnterCriticalSection.KERNEL32(00E6E0E8,00000000), ref: 00D4098D
                                              • TerminateThread.KERNEL32(00000000,000001F6), ref: 00D4099B
                                              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00D409A9
                                              • CloseHandle.KERNEL32(00000000), ref: 00D409B8
                                              • InterlockedExchange.KERNEL32(00E6E108,000001F6), ref: 00D409C8
                                              • LeaveCriticalSection.KERNEL32(00E6E0E8), ref: 00D409CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 3495660284-0
                                              • Opcode ID: c05f1d94e5223fcad4d68c134019e447307a37f3a77dd53317cdb326cfbfb0f5
                                              • Instruction ID: 3808ebc84167c816651607d65d128664d5e0a905d8152d971ee4b41233a2eb4b
                                              • Opcode Fuzzy Hash: c05f1d94e5223fcad4d68c134019e447307a37f3a77dd53317cdb326cfbfb0f5
                                              • Instruction Fuzzy Hash: E5F03C32592B02BBD7415FA4EE9CBE6BB39FF05702F442025F242909A0C7B59465CFB4
                                              APIs
                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00D51DC0
                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00D51DE1
                                              • WSAGetLastError.WSOCK32 ref: 00D51DF2
                                              • htons.WSOCK32(?,?,?,?,?), ref: 00D51EDB
                                              • inet_ntoa.WSOCK32(?), ref: 00D51E8C
                                                • Part of subcall function 00D339E8: _strlen.LIBCMT ref: 00D339F2
                                                • Part of subcall function 00D53224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00D4EC0C), ref: 00D53240
                                              • _strlen.LIBCMT ref: 00D51F35
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                              • String ID:
                                              • API String ID: 3203458085-0
                                              • Opcode ID: ac5dc6c7973e7e5aa1e3ce1b051ab0c650174adf70fb89c1359659a53ee6f5ce
                                              • Instruction ID: 878c32d90d9a6d9363cd447da409fffc6f1bc9f43b747d1bcee818bb8f8929c5
                                              • Opcode Fuzzy Hash: ac5dc6c7973e7e5aa1e3ce1b051ab0c650174adf70fb89c1359659a53ee6f5ce
                                              • Instruction Fuzzy Hash: 63B1E135204340AFC724DF24C885F2AB7A5AF84318F58854DF9565B3E2DB71ED4ACBA1
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 00CD5D30
                                              • GetWindowRect.USER32(?,?), ref: 00CD5D71
                                              • ScreenToClient.USER32(?,?), ref: 00CD5D99
                                              • GetClientRect.USER32(?,?), ref: 00CD5ED7
                                              • GetWindowRect.USER32(?,?), ref: 00CD5EF8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Rect$Client$Window$Screen
                                              • String ID:
                                              • API String ID: 1296646539-0
                                              • Opcode ID: 796c4f43badec5ec0d0e0ee54cd09b81a577cc2ccb5f398f92f1132dbed18e04
                                              • Instruction ID: ddfa80ffe8fe5f056f22ead8b5c807472f227066eb65cdc95b8c3dc051c875f9
                                              • Opcode Fuzzy Hash: 796c4f43badec5ec0d0e0ee54cd09b81a577cc2ccb5f398f92f1132dbed18e04
                                              • Instruction Fuzzy Hash: 83B17974A00B4ADBDB10DFA9C4807EEB7F1FF58310F14841AE9A9D7650DB34AA81DB64
                                              APIs
                                              • __allrem.LIBCMT ref: 00D000BA
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D000D6
                                              • __allrem.LIBCMT ref: 00D000ED
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D0010B
                                              • __allrem.LIBCMT ref: 00D00122
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D00140
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                              • String ID:
                                              • API String ID: 1992179935-0
                                              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                              • Instruction ID: ceef35da0d4b3c485711ef6fe76df3f658402703b131e4c63f59fe758dfe57b2
                                              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                              • Instruction Fuzzy Hash: B0812772A00B06ABE7249E68CC41BAA77E9EF41320F24413EF659D72C1E770D9418BB1
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00CF82D9,00CF82D9,?,?,?,00D0644F,00000001,00000001,8BE85006), ref: 00D06258
                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D0644F,00000001,00000001,8BE85006,?,?,?), ref: 00D062DE
                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D063D8
                                              • __freea.LIBCMT ref: 00D063E5
                                                • Part of subcall function 00D03820: RtlAllocateHeap.NTDLL(00000000,?,00DA1444,?,00CEFDF5,?,?,00CDA976,00000010,00DA1440,00CD13FC,?,00CD13C6,?,00CD1129), ref: 00D03852
                                              • __freea.LIBCMT ref: 00D063EE
                                              • __freea.LIBCMT ref: 00D06413
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                              • String ID:
                                              • API String ID: 1414292761-0
                                              • Opcode ID: 94161cfce51e7aa00c5f11b1da25b4a01088509bdc92bf16023aced5f52269ad
                                              • Instruction ID: 87fbcfeae0183def91d307e8aa428b54cb3c688f8fbddf36df239b0604310ae9
                                              • Opcode Fuzzy Hash: 94161cfce51e7aa00c5f11b1da25b4a01088509bdc92bf16023aced5f52269ad
                                              • Instruction Fuzzy Hash: 8D51AE72A00216ABEB259F64DC81FBF77A9EF44750F194629F809DA1C1EB34DC60C6B0
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D5B6AE,?,?), ref: 00D5C9B5
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5C9F1
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5CA68
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5CA9E
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D5BCCA
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D5BD25
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00D5BD6A
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00D5BD99
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00D5BDF3
                                              • RegCloseKey.ADVAPI32(?), ref: 00D5BDFF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                              • String ID:
                                              • API String ID: 1120388591-0
                                              • Opcode ID: 26954b3b37ac608d0552b075694e067f32721ea8b2ffbdfb2ec21a7da3b7784d
                                              • Instruction ID: 6d84db57d8faeb481eac5544eb5edd9c975c2d503ecbe5959fc02f466c1160d1
                                              • Opcode Fuzzy Hash: 26954b3b37ac608d0552b075694e067f32721ea8b2ffbdfb2ec21a7da3b7784d
                                              • Instruction Fuzzy Hash: F7819130218241AFC714DF24C891E2ABBF5FF84318F18455EF9954B2A2DB31ED49DBA2
                                              APIs
                                              • VariantInit.OLEAUT32(00000035), ref: 00D2F7B9
                                              • SysAllocString.OLEAUT32(00000001), ref: 00D2F860
                                              • VariantCopy.OLEAUT32(00D2FA64,00000000), ref: 00D2F889
                                              • VariantClear.OLEAUT32(00D2FA64), ref: 00D2F8AD
                                              • VariantCopy.OLEAUT32(00D2FA64,00000000), ref: 00D2F8B1
                                              • VariantClear.OLEAUT32(?), ref: 00D2F8BB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCopy$AllocInitString
                                              • String ID:
                                              • API String ID: 3859894641-0
                                              • Opcode ID: b5b3bf594fd14772ad259adc88cc2e4abd98ce91708ae8f161f4ae2a94f243b3
                                              • Instruction ID: f1d1a3f29ba359b1d55279990ba47489de260e6b3263d47e336d7a68fcabce88
                                              • Opcode Fuzzy Hash: b5b3bf594fd14772ad259adc88cc2e4abd98ce91708ae8f161f4ae2a94f243b3
                                              • Instruction Fuzzy Hash: 0B51B535500320BACF24AB65E895B2DB3B4EF65318B24587BE905DF291DB70DC80DB76
                                              APIs
                                                • Part of subcall function 00CD7620: _wcslen.LIBCMT ref: 00CD7625
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00D494E5
                                              • _wcslen.LIBCMT ref: 00D49506
                                              • _wcslen.LIBCMT ref: 00D4952D
                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00D49585
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$FileName$OpenSave
                                              • String ID: X
                                              • API String ID: 83654149-3081909835
                                              • Opcode ID: ad29544666a659bc8f5b0857191835ab27606d1eb3c53d207ae61fed5b877b77
                                              • Instruction ID: 00e6685c1d214f941f1a735234da4ea47ef44ee825f448ff7e75ddbf2cdbcd2e
                                              • Opcode Fuzzy Hash: ad29544666a659bc8f5b0857191835ab27606d1eb3c53d207ae61fed5b877b77
                                              • Instruction Fuzzy Hash: 90E191316043418FC724DF25C891A6BB7E4BF85314F18896DF9899B3A2EB31DD05DBA2
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • BeginPaint.USER32(?,?,?), ref: 00CE9241
                                              • GetWindowRect.USER32(?,?), ref: 00CE92A5
                                              • ScreenToClient.USER32(?,?), ref: 00CE92C2
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00CE92D3
                                              • EndPaint.USER32(?,?,?,?,?), ref: 00CE9321
                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00D271EA
                                                • Part of subcall function 00CE9339: BeginPath.GDI32(00000000), ref: 00CE9357
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                              • String ID:
                                              • API String ID: 3050599898-0
                                              • Opcode ID: 6cb74a87c3f0f6dc324b416eefd941d95566efc12ff8613e34d4bfce1d15c1b4
                                              • Instruction ID: 4043c2ff5fd310d386e71b18e62c97c2694f70e8c0030a887e8cd0a2e190ac56
                                              • Opcode Fuzzy Hash: 6cb74a87c3f0f6dc324b416eefd941d95566efc12ff8613e34d4bfce1d15c1b4
                                              • Instruction Fuzzy Hash: 6A41B874104350AFD721DF26D884FBA7BA8EF5A324F140229FAA4C72B2C7709845DB72
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00D4080C
                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00D40847
                                              • EnterCriticalSection.KERNEL32(?), ref: 00D40863
                                              • LeaveCriticalSection.KERNEL32(?), ref: 00D408DC
                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00D408F3
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D40921
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                              • String ID:
                                              • API String ID: 3368777196-0
                                              • Opcode ID: 80d8fcc5a2e1e06a75e2691ca44e745e668910e39c427777e921921465bc5920
                                              • Instruction ID: b47d6327f43948ddddbe88fc4365b5c152e5d3c92b23a72416e69644937e03f2
                                              • Opcode Fuzzy Hash: 80d8fcc5a2e1e06a75e2691ca44e745e668910e39c427777e921921465bc5920
                                              • Instruction Fuzzy Hash: 2D414971900205ABDF14AF55DC85A6A7BB8FF08710F1480A9EE00DA297DB70EE65DBB4
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00D2F3AB,00000000,?,?,00000000,?,00D2682C,00000004,00000000,00000000), ref: 00D6824C
                                              • EnableWindow.USER32(00000000,00000000), ref: 00D68272
                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00D682D1
                                              • ShowWindow.USER32(00000000,00000004), ref: 00D682E5
                                              • EnableWindow.USER32(00000000,00000001), ref: 00D6830B
                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00D6832F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Show$Enable$MessageSend
                                              • String ID:
                                              • API String ID: 642888154-0
                                              • Opcode ID: adc805d89f546e29cad4d6bec2c7a9a39e7dca59dff472cdaf5f31c30d615a97
                                              • Instruction ID: bc4408f4ccb39f58552fb43134b71ec29550fbdbb327d9a8910f3b51abe709d8
                                              • Opcode Fuzzy Hash: adc805d89f546e29cad4d6bec2c7a9a39e7dca59dff472cdaf5f31c30d615a97
                                              • Instruction Fuzzy Hash: 6441CE34601740AFDB21CF25C8A9BA47BE0FB0A715F1C12A9E5588B3B2CB31A841DF75
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00D34C95
                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00D34CB2
                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D34CEA
                                              • _wcslen.LIBCMT ref: 00D34D08
                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00D34D10
                                              • _wcsstr.LIBVCRUNTIME ref: 00D34D1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                              • String ID:
                                              • API String ID: 72514467-0
                                              • Opcode ID: 8a41d5a6fa894e29a7cf960ef9959576d0b24038743191ff741b720ca12d50a5
                                              • Instruction ID: 2f3e0ab3b823c259f147a93fdad1081bbf93967c3f9064e9e13d86160d459c59
                                              • Opcode Fuzzy Hash: 8a41d5a6fa894e29a7cf960ef9959576d0b24038743191ff741b720ca12d50a5
                                              • Instruction Fuzzy Hash: B3210872204244BBEB255B79EC49E7B7BACDF45750F14803DF805CB2A1EEA5EC0196B0
                                              APIs
                                                • Part of subcall function 00CD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CD3A97,?,?,00CD2E7F,?,?,?,00000000), ref: 00CD3AC2
                                              • _wcslen.LIBCMT ref: 00D4587B
                                              • CoInitialize.OLE32(00000000), ref: 00D45995
                                              • CoCreateInstance.OLE32(00D6FCF8,00000000,00000001,00D6FB68,?), ref: 00D459AE
                                              • CoUninitialize.OLE32 ref: 00D459CC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 3172280962-24824748
                                              • Opcode ID: da3e5033cabd6d9c86e2cc2f5122f6db4d13401b3452a25f839ab5316d90aa37
                                              • Instruction ID: 66186772602ce24d9b894a1f7b3db5b669ded9e12ff499bb8f7955352ec87f28
                                              • Opcode Fuzzy Hash: da3e5033cabd6d9c86e2cc2f5122f6db4d13401b3452a25f839ab5316d90aa37
                                              • Instruction Fuzzy Hash: 31D15275608701DFC714DF24D480A2ABBE1EF89710F14895EF98A9B362DB31ED45CBA2
                                              APIs
                                                • Part of subcall function 00D30FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D30FCA
                                                • Part of subcall function 00D30FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D30FD6
                                                • Part of subcall function 00D30FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D30FE5
                                                • Part of subcall function 00D30FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D30FEC
                                                • Part of subcall function 00D30FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D31002
                                              • GetLengthSid.ADVAPI32(?,00000000,00D31335), ref: 00D317AE
                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00D317BA
                                              • HeapAlloc.KERNEL32(00000000), ref: 00D317C1
                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00D317DA
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00D31335), ref: 00D317EE
                                              • HeapFree.KERNEL32(00000000), ref: 00D317F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                              • String ID:
                                              • API String ID: 3008561057-0
                                              • Opcode ID: 44845c8bc7e9a1cdf94c87c0af7736144659f75746d7a504eebd5dc868468faf
                                              • Instruction ID: cceb637aa4fbdbf6bbc4c41b0dcf1b3f20601fb9fa359198286ba6e60bb54878
                                              • Opcode Fuzzy Hash: 44845c8bc7e9a1cdf94c87c0af7736144659f75746d7a504eebd5dc868468faf
                                              • Instruction Fuzzy Hash: F01179B6610306EFDB209FA4CC49BBE7BA9FB46359F184018F481E7210D776A944CB70
                                              APIs
                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00D314FF
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00D31506
                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00D31515
                                              • CloseHandle.KERNEL32(00000004), ref: 00D31520
                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D3154F
                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00D31563
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                              • String ID:
                                              • API String ID: 1413079979-0
                                              • Opcode ID: ce5565997c8d6700e13c9c867df2c0b25e9470d4e4a159437fea55cbcc4e7e19
                                              • Instruction ID: db55a2cee2ccccd04c1ed2e7cc16b240039fa4fbed10142805db9fa461acb547
                                              • Opcode Fuzzy Hash: ce5565997c8d6700e13c9c867df2c0b25e9470d4e4a159437fea55cbcc4e7e19
                                              • Instruction Fuzzy Hash: B111267650024AABDF118FA8DD49BEE7BA9FF48744F085025FA45E2260C3B5CE61DB70
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00CF3379,00CF2FE5), ref: 00CF3390
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00CF339E
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00CF33B7
                                              • SetLastError.KERNEL32(00000000,?,00CF3379,00CF2FE5), ref: 00CF3409
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: 6c7ed3e1b274eeec8eb36984edbc738cd77243583a94a84d193fa39c0732364e
                                              • Instruction ID: 0f308585e6f41103b9999c4710bc267479842cd9829bd7a65ef1d31a4299818c
                                              • Opcode Fuzzy Hash: 6c7ed3e1b274eeec8eb36984edbc738cd77243583a94a84d193fa39c0732364e
                                              • Instruction Fuzzy Hash: BB016433218359BEEAA423747C85A3B2E84EB0037AB20122AF724C03F0EF114E166166
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00D05686,00D13CD6,?,00000000,?,00D05B6A,?,?,?,?,?,00CFE6D1,?,00D98A48), ref: 00D02D78
                                              • _free.LIBCMT ref: 00D02DAB
                                              • _free.LIBCMT ref: 00D02DD3
                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00CFE6D1,?,00D98A48,00000010,00CD4F4A,?,?,00000000,00D13CD6), ref: 00D02DE0
                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00CFE6D1,?,00D98A48,00000010,00CD4F4A,?,?,00000000,00D13CD6), ref: 00D02DEC
                                              • _abort.LIBCMT ref: 00D02DF2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_free$_abort
                                              • String ID:
                                              • API String ID: 3160817290-0
                                              • Opcode ID: daa2608747bb0f4cce8e5acfe2867bbcfa384ddeb3b4f412f2e25fd895e6635f
                                              • Instruction ID: fb94f37870dad2feaa34df28f708a99740bba7fe3b3849fab746ce884d70c63b
                                              • Opcode Fuzzy Hash: daa2608747bb0f4cce8e5acfe2867bbcfa384ddeb3b4f412f2e25fd895e6635f
                                              • Instruction Fuzzy Hash: 3DF0A43654670067C6123734BC0EF7A2659EFC27B5B294419F86CD22E2EF64CC0141B4
                                              APIs
                                                • Part of subcall function 00CE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CE9693
                                                • Part of subcall function 00CE9639: SelectObject.GDI32(?,00000000), ref: 00CE96A2
                                                • Part of subcall function 00CE9639: BeginPath.GDI32(?), ref: 00CE96B9
                                                • Part of subcall function 00CE9639: SelectObject.GDI32(?,00000000), ref: 00CE96E2
                                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00D68A4E
                                              • LineTo.GDI32(?,00000003,00000000), ref: 00D68A62
                                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00D68A70
                                              • LineTo.GDI32(?,00000000,00000003), ref: 00D68A80
                                              • EndPath.GDI32(?), ref: 00D68A90
                                              • StrokePath.GDI32(?), ref: 00D68AA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                              • String ID:
                                              • API String ID: 43455801-0
                                              • Opcode ID: bd52fe4dadb612297522315be10856b968e09cf74eb26d5d88ed9f3c0ab8b143
                                              • Instruction ID: 43a3945e465bab0534544f6d36a5ace8d2ca9ac0a178600ded1535cf637c43eb
                                              • Opcode Fuzzy Hash: bd52fe4dadb612297522315be10856b968e09cf74eb26d5d88ed9f3c0ab8b143
                                              • Instruction Fuzzy Hash: 3C11C976000249FFDF129F94DC88EAA7F6DEB09394F048012FA599A2A1C7719D55DFB0
                                              APIs
                                              • GetDC.USER32(00000000), ref: 00D35218
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00D35229
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D35230
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00D35238
                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00D3524F
                                              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00D35261
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CapsDevice$Release
                                              • String ID:
                                              • API String ID: 1035833867-0
                                              • Opcode ID: 0ffa1084895a184d1e76830f4371a12ef0f03ed4e93b45d5cfaeb105a73effbe
                                              • Instruction ID: 3a49a019b3fef8e55a3df879bac0c2118d4396422c4e4913236391dbfa2976b2
                                              • Opcode Fuzzy Hash: 0ffa1084895a184d1e76830f4371a12ef0f03ed4e93b45d5cfaeb105a73effbe
                                              • Instruction Fuzzy Hash: 50018F75A00718BBEB109BE59C49A5EBFB8EF48351F045066FA04E7390D6B09800CBB4
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00CD1BF4
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00CD1BFC
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00CD1C07
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00CD1C12
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00CD1C1A
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CD1C22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: 169854244c36fb9c2457809813c0f5caf6b2221ec9393a5f033fd3a395424826
                                              • Instruction ID: a9063fff49a5da19217e6617ce26e228eeb4c4d1279c96e65d495be2e73fa972
                                              • Opcode Fuzzy Hash: 169854244c36fb9c2457809813c0f5caf6b2221ec9393a5f033fd3a395424826
                                              • Instruction Fuzzy Hash: BA016CB090275A7DE3008F5A8C85B52FFA8FF19354F00411BD15C47A41C7F5A864CBE5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00D3EB30
                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00D3EB46
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00D3EB55
                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D3EB64
                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D3EB6E
                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D3EB75
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                              • String ID:
                                              • API String ID: 839392675-0
                                              • Opcode ID: 356489498128cb6f1de23f85eb59bb9f407313f675d880444a509628fff80c3c
                                              • Instruction ID: 9dad31ef970041e92c8dca603768e209e45021a83d97ece591d733bbaac3fddc
                                              • Opcode Fuzzy Hash: 356489498128cb6f1de23f85eb59bb9f407313f675d880444a509628fff80c3c
                                              • Instruction Fuzzy Hash: 9DF01D72250258BBE6216792DC0DEBB7A7CEFCAB11F001158F642D1291D7E45A0186B5
                                              APIs
                                              • GetClientRect.USER32(?), ref: 00D27452
                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00D27469
                                              • GetWindowDC.USER32(?), ref: 00D27475
                                              • GetPixel.GDI32(00000000,?,?), ref: 00D27484
                                              • ReleaseDC.USER32(?,00000000), ref: 00D27496
                                              • GetSysColor.USER32(00000005), ref: 00D274B0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                              • String ID:
                                              • API String ID: 272304278-0
                                              • Opcode ID: 064a6833793bff1e68ad9ac9988c2e4ee78e287a66b08bc439ea8dcf3136dbb3
                                              • Instruction ID: ab73d17628e3c78cb3bb150fca2cef1d8e2fac13aca3416ab5431f686be3367a
                                              • Opcode Fuzzy Hash: 064a6833793bff1e68ad9ac9988c2e4ee78e287a66b08bc439ea8dcf3136dbb3
                                              • Instruction Fuzzy Hash: E5017831410215EFDB206FA4EC08BBA7BB5FB14311F146060F956E22B0CB711E42AB70
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00D3187F
                                              • UnloadUserProfile.USERENV(?,?), ref: 00D3188B
                                              • CloseHandle.KERNEL32(?), ref: 00D31894
                                              • CloseHandle.KERNEL32(?), ref: 00D3189C
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00D318A5
                                              • HeapFree.KERNEL32(00000000), ref: 00D318AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                              • String ID:
                                              • API String ID: 146765662-0
                                              • Opcode ID: 8f99317a12d64bbd893ae243e768d8cbfb3594bd208ebe5ac49c84cbfbda4598
                                              • Instruction ID: 55e40a7ed3e4173f3808f5718329d656ee406caf90319338f1da88e3362ab918
                                              • Opcode Fuzzy Hash: 8f99317a12d64bbd893ae243e768d8cbfb3594bd208ebe5ac49c84cbfbda4598
                                              • Instruction Fuzzy Hash: 6CE0E536154301BBDB016FA2ED0C91ABF39FF5AB22B109221F265C1270CBB29420DF70
                                              APIs
                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00D5AEA3
                                                • Part of subcall function 00CD7620: _wcslen.LIBCMT ref: 00CD7625
                                              • GetProcessId.KERNEL32(00000000), ref: 00D5AF38
                                              • CloseHandle.KERNEL32(00000000), ref: 00D5AF67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseExecuteHandleProcessShell_wcslen
                                              • String ID: <$@
                                              • API String ID: 146682121-1426351568
                                              • Opcode ID: 687e36f50d8d483c0766c325900dca376e7e4ec35f2afb48911fd991b597fad8
                                              • Instruction ID: b6ec3d6d2a6aa0387d3bc1fcad829c3b22de2bc9b93a23a3515a1084aeab1e7a
                                              • Opcode Fuzzy Hash: 687e36f50d8d483c0766c325900dca376e7e4ec35f2afb48911fd991b597fad8
                                              • Instruction Fuzzy Hash: CF714671A00229DFCF14DF58D485A9EBBF0AF08310F04859AEC56AB3A2D774ED45DBA1
                                              APIs
                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D37206
                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00D3723C
                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00D3724D
                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00D372CF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                              • String ID: DllGetClassObject
                                              • API String ID: 753597075-1075368562
                                              • Opcode ID: 6f8b7bfce37dfdd42fc0eb6643308316c56136548cb9032e3f72d12911809881
                                              • Instruction ID: 5cffce37abed0fce35478e1da7af5dd9dbe6153a13c877db79a8a594623b275b
                                              • Opcode Fuzzy Hash: 6f8b7bfce37dfdd42fc0eb6643308316c56136548cb9032e3f72d12911809881
                                              • Instruction Fuzzy Hash: 52416DB5A05A04EFDB25CF54C884A9B7BA9EF48310F1480A9FD059F20AD7B0D944CBB0
                                              APIs
                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00D3C306
                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00D3C34C
                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00DA1990,PL), ref: 00D3C395
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$InfoItem
                                              • String ID: 0$PL
                                              • API String ID: 135850232-886112153
                                              • Opcode ID: 1fcea87c9b51930c7dbfec5d8ed646d074daa9995f6b2025dd645379a5727fa7
                                              • Instruction ID: 93154d592397a8e2712f5468ab5242f146acdbf4aa39efdaadf6e16dfe922f30
                                              • Opcode Fuzzy Hash: 1fcea87c9b51930c7dbfec5d8ed646d074daa9995f6b2025dd645379a5727fa7
                                              • Instruction Fuzzy Hash: 96418D712143019FD720DF25DC84B6ABBE8EF85320F149A1EF9A6A7291D770E904CB72
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D63E35
                                              • IsMenu.USER32(?), ref: 00D63E4A
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D63E92
                                              • DrawMenuBar.USER32 ref: 00D63EA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$Item$DrawInfoInsert
                                              • String ID: 0
                                              • API String ID: 3076010158-4108050209
                                              • Opcode ID: 65aa421368f7b128be343829fdfeb9ba49043cc80926e272e6318c9679d24994
                                              • Instruction ID: b97f26f975de89cf71919d1acf45ec03a5540eab12a5c3e9a10ab48986825fd7
                                              • Opcode Fuzzy Hash: 65aa421368f7b128be343829fdfeb9ba49043cc80926e272e6318c9679d24994
                                              • Instruction Fuzzy Hash: EF4155B5A00249AFDB10DF50D884AAABBF9FF49350F084229F945A7351D735AE44CF70
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D33CCA
                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00D31E66
                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00D31E79
                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00D31EA9
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$_wcslen$ClassName
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 2081771294-1403004172
                                              • Opcode ID: 7ec26358c1784973e29affa7905c83bb627ff41bbd860f6df85d46170e48c9af
                                              • Instruction ID: 5fa6ded94af5975a806ed65b5db50b116293d4acfff17b4702a7e1ba6198001e
                                              • Opcode Fuzzy Hash: 7ec26358c1784973e29affa7905c83bb627ff41bbd860f6df85d46170e48c9af
                                              • Instruction Fuzzy Hash: AC214479A00105BFDB14ABA0DC46CFFB7B8DF42350F14412AF821A32E0DB754D0AA630
                                              APIs
                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00D62F8D
                                              • LoadLibraryW.KERNEL32(?), ref: 00D62F94
                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00D62FA9
                                              • DestroyWindow.USER32(?), ref: 00D62FB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$DestroyLibraryLoadWindow
                                              • String ID: SysAnimate32
                                              • API String ID: 3529120543-1011021900
                                              • Opcode ID: 546844037e5d959209901c663fd802f0404fe9331a4f19cc3e7b6368ce62e046
                                              • Instruction ID: 42b194195bc0fb6a48b03f2a743542451f97145dcc65966338aeca5c73cb5f31
                                              • Opcode Fuzzy Hash: 546844037e5d959209901c663fd802f0404fe9331a4f19cc3e7b6368ce62e046
                                              • Instruction Fuzzy Hash: B121AC71204605ABEB108FA6DC80EBB37B9EF59368F144619FA90D61A0D7B1DC519770
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00CF4D1E,00D028E9,?,00CF4CBE,00D028E9,00D988B8,0000000C,00CF4E15,00D028E9,00000002), ref: 00CF4D8D
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00CF4DA0
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00CF4D1E,00D028E9,?,00CF4CBE,00D028E9,00D988B8,0000000C,00CF4E15,00D028E9,00000002,00000000), ref: 00CF4DC3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: 25a713cdc7d5d95acc73b5f4aca86a72a232e438dd94ed1bfd50f60a5b56e9b2
                                              • Instruction ID: 21226212f2aecc1f297c64904792fbb5ca3fbc6c7ffc80947694e865f449a430
                                              • Opcode Fuzzy Hash: 25a713cdc7d5d95acc73b5f4aca86a72a232e438dd94ed1bfd50f60a5b56e9b2
                                              • Instruction Fuzzy Hash: 61F08C30A10308ABDB149F90DC09BBEBFA4EB44712F0000A5E909E22A0DB705A40DAB1
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00CD4EDD,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4E9C
                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00CD4EAE
                                              • FreeLibrary.KERNEL32(00000000,?,?,00CD4EDD,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4EC0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                              • API String ID: 145871493-3689287502
                                              • Opcode ID: 16e9a493efef1916e186d4eb1232b93475dd279a39e1a94809a74cc2581766ad
                                              • Instruction ID: 1238f4b653fd095e1669c8b528d3291bca002290ffd87529f7e10c627cfcff3a
                                              • Opcode Fuzzy Hash: 16e9a493efef1916e186d4eb1232b93475dd279a39e1a94809a74cc2581766ad
                                              • Instruction Fuzzy Hash: 0BE0CD35A117226FD3311B256C18B7FA754AF82F627090116FF40D2340DFB4CE0540B1
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D13CDE,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4E62
                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00CD4E74
                                              • FreeLibrary.KERNEL32(00000000,?,?,00D13CDE,?,00DA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CD4E87
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                              • API String ID: 145871493-1355242751
                                              • Opcode ID: 50f1f148e9dfa5247ee656009054ec3ad67bef5261e477ad7f808e090d3323dc
                                              • Instruction ID: 043f70ebaf3356612a9469353502cfc2cbdaa26c334b3d09ce024114d1082b88
                                              • Opcode Fuzzy Hash: 50f1f148e9dfa5247ee656009054ec3ad67bef5261e477ad7f808e090d3323dc
                                              • Instruction Fuzzy Hash: 8ED012355127616B5A261B25AC18DABEB18AFC6B513051616FB55E2314CFB4CE0185F0
                                              APIs
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D42C05
                                              • DeleteFileW.KERNEL32(?), ref: 00D42C87
                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D42C9D
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D42CAE
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D42CC0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: File$Delete$Copy
                                              • String ID:
                                              • API String ID: 3226157194-0
                                              • Opcode ID: 676d1c9a69bc4ee3ee8a79bf49dfcde35eb449c794722261e597d3f621254c2e
                                              • Instruction ID: de6f466dd27199cab42719f784e6e9f14783ee9ad303fbdca12319da85512b4f
                                              • Opcode Fuzzy Hash: 676d1c9a69bc4ee3ee8a79bf49dfcde35eb449c794722261e597d3f621254c2e
                                              • Instruction Fuzzy Hash: 57B15D7190011DABDF11DBA4CC85EEEBBBDEF48350F5040A6F609E6241EA319A449F71
                                              APIs
                                              • GetCurrentProcessId.KERNEL32 ref: 00D5A427
                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00D5A435
                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00D5A468
                                              • CloseHandle.KERNEL32(?), ref: 00D5A63D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                              • String ID:
                                              • API String ID: 3488606520-0
                                              • Opcode ID: 3d2e179ede42b437a26752d06fd4e12d593f5e4e54c959bd3aeeeac8c396e461
                                              • Instruction ID: 0cf004065a9233b93881299455552118d6f9239cfe4c0f2929614c665bab7020
                                              • Opcode Fuzzy Hash: 3d2e179ede42b437a26752d06fd4e12d593f5e4e54c959bd3aeeeac8c396e461
                                              • Instruction Fuzzy Hash: FBA18E716043019FD720DF28C886F2AB7E5AF84714F14891DF99A9B392D7B0EC45CBA2
                                              APIs
                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00D73700), ref: 00D0BB91
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00DA121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00D0BC09
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00DA1270,000000FF,?,0000003F,00000000,?), ref: 00D0BC36
                                              • _free.LIBCMT ref: 00D0BB7F
                                                • Part of subcall function 00D029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000), ref: 00D029DE
                                                • Part of subcall function 00D029C8: GetLastError.KERNEL32(00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000,00000000), ref: 00D029F0
                                              • _free.LIBCMT ref: 00D0BD4B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                              • String ID:
                                              • API String ID: 1286116820-0
                                              • Opcode ID: 6459dce1f7722458d58f16f22e7eb16d4c8885e0fe700b100bbf46f93d3dfea3
                                              • Instruction ID: c612492361d030dc2ff4b0c50fcd957e81b19371b5c0a992a8af3da0c29ee2a9
                                              • Opcode Fuzzy Hash: 6459dce1f7722458d58f16f22e7eb16d4c8885e0fe700b100bbf46f93d3dfea3
                                              • Instruction Fuzzy Hash: 0651D475908309AFDB10EF759C82BAAB7B8EB41370F14426BE559D72D1EB309E408B74
                                              APIs
                                                • Part of subcall function 00D3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D3CF22,?), ref: 00D3DDFD
                                                • Part of subcall function 00D3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D3CF22,?), ref: 00D3DE16
                                                • Part of subcall function 00D3E199: GetFileAttributesW.KERNEL32(?,00D3CF95), ref: 00D3E19A
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00D3E473
                                              • MoveFileW.KERNEL32(?,?), ref: 00D3E4AC
                                              • _wcslen.LIBCMT ref: 00D3E5EB
                                              • _wcslen.LIBCMT ref: 00D3E603
                                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00D3E650
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                              • String ID:
                                              • API String ID: 3183298772-0
                                              • Opcode ID: 73a79a549ce3a7a0a69588f1f235cd40d9c9729a44c79268205d7a1ef147e6e3
                                              • Instruction ID: 49be79b02853a9ff6cf67d7c3fdf89ed72f46626c188210d6716c8a7a1ec32db
                                              • Opcode Fuzzy Hash: 73a79a549ce3a7a0a69588f1f235cd40d9c9729a44c79268205d7a1ef147e6e3
                                              • Instruction Fuzzy Hash: B8516DB25083459BC764EB90D8819EBB3ECEF85340F04491EF689D31D1EE75A6888B76
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D5B6AE,?,?), ref: 00D5C9B5
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5C9F1
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5CA68
                                                • Part of subcall function 00D5C998: _wcslen.LIBCMT ref: 00D5CA9E
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D5BAA5
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D5BB00
                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00D5BB63
                                              • RegCloseKey.ADVAPI32(?,?), ref: 00D5BBA6
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00D5BBB3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                              • String ID:
                                              • API String ID: 826366716-0
                                              • Opcode ID: a558cfa38033d3be51521882f2293c403adf418c63b2b938b35be9f780341be1
                                              • Instruction ID: f1a63363dc3a526b55361d6a67800761cdf35b4d956e71ef11638159508fff0e
                                              • Opcode Fuzzy Hash: a558cfa38033d3be51521882f2293c403adf418c63b2b938b35be9f780341be1
                                              • Instruction Fuzzy Hash: EA61B531218241EFD714DF14C490E2AB7E5FF84318F18855EF8998B2A2DB71ED49DBA2
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00D38BCD
                                              • VariantClear.OLEAUT32 ref: 00D38C3E
                                              • VariantClear.OLEAUT32 ref: 00D38C9D
                                              • VariantClear.OLEAUT32(?), ref: 00D38D10
                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00D38D3B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$Clear$ChangeInitType
                                              • String ID:
                                              • API String ID: 4136290138-0
                                              • Opcode ID: d9408bcb9a3db498e81dd57fe146a37dcf1ede7db356300c22b47be312b72a15
                                              • Instruction ID: 453e0dcfb617262845981ef1a0f6ed3c5ac23cd734b7cd4d347e139e350a8086
                                              • Opcode Fuzzy Hash: d9408bcb9a3db498e81dd57fe146a37dcf1ede7db356300c22b47be312b72a15
                                              • Instruction Fuzzy Hash: A25148B5A00219EFCB14CF68D894AAAB7F8FF89310F158559F945DB350EB30E911CBA0
                                              APIs
                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00D48BAE
                                              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00D48BDA
                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00D48C32
                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00D48C57
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00D48C5F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: PrivateProfile$SectionWrite$String
                                              • String ID:
                                              • API String ID: 2832842796-0
                                              • Opcode ID: e9ae00a5ce48d79a64de84be90a1a1e3623222286badda37fd854782d6b1cff3
                                              • Instruction ID: b61913aab92d67b38b965d440da6bac7b7a8a06291ec33093f9bf1668ad2f13f
                                              • Opcode Fuzzy Hash: e9ae00a5ce48d79a64de84be90a1a1e3623222286badda37fd854782d6b1cff3
                                              • Instruction Fuzzy Hash: 3A515935A00215AFCB00DF65C880A6EBBF5FF48314F088059E949AB362DB31ED41EBA1
                                              APIs
                                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00D58F40
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00D58FD0
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00D58FEC
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00D59032
                                              • FreeLibrary.KERNEL32(00000000), ref: 00D59052
                                                • Part of subcall function 00CEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00D41043,?,7644E610), ref: 00CEF6E6
                                                • Part of subcall function 00CEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00D2FA64,00000000,00000000,?,?,00D41043,?,7644E610,?,00D2FA64), ref: 00CEF70D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                              • String ID:
                                              • API String ID: 666041331-0
                                              • Opcode ID: f8912a2e6149344973b92bfc6ec0697f08de80e11afb68c2605fcb59712db65b
                                              • Instruction ID: 09abf991501a944782fcf78195179527529a6e2dd64e33c107bad3386e639bfc
                                              • Opcode Fuzzy Hash: f8912a2e6149344973b92bfc6ec0697f08de80e11afb68c2605fcb59712db65b
                                              • Instruction Fuzzy Hash: 46513A35600205DFCB15DF58C4948ADBBF1FF49315B098099ED4AAB362DB31ED89DBA0
                                              APIs
                                              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00D66C33
                                              • SetWindowLongW.USER32(?,000000EC,?), ref: 00D66C4A
                                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00D66C73
                                              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00D4AB79,00000000,00000000), ref: 00D66C98
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00D66CC7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Long$MessageSendShow
                                              • String ID:
                                              • API String ID: 3688381893-0
                                              • Opcode ID: 188149693135f0c42de2372756ddb14a22ff738a2a6245b3e56f6536d7407096
                                              • Instruction ID: a37a0a21f4bc6957d0d354bd8459530ec13a77ec15b9a1c0dac6a18fc9ceeda3
                                              • Opcode Fuzzy Hash: 188149693135f0c42de2372756ddb14a22ff738a2a6245b3e56f6536d7407096
                                              • Instruction Fuzzy Hash: AD418035604604AFDB24CF68CC58FAA7FA5EB09350F1A0268F895E73A0C371ED51DA70
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free
                                              • String ID:
                                              • API String ID: 269201875-0
                                              • Opcode ID: b6f741481327f7caecabe795b47b3c3e8354ccb5371328a21f17ef6c33bc37ec
                                              • Instruction ID: 13b377b2e094b05857cbac1bcb84ef153a8ccb03f3eb5d0fa8f59b7c863ca4af
                                              • Opcode Fuzzy Hash: b6f741481327f7caecabe795b47b3c3e8354ccb5371328a21f17ef6c33bc37ec
                                              • Instruction Fuzzy Hash: 5A41D032A013009FCB24DF78C885B6AB3B5EF89314F1945A9E619EB395D631AD01CBA1
                                              APIs
                                              • GetInputState.USER32 ref: 00D438CB
                                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00D43922
                                              • TranslateMessage.USER32(?), ref: 00D4394B
                                              • DispatchMessageW.USER32(?), ref: 00D43955
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D43966
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                              • String ID:
                                              • API String ID: 2256411358-0
                                              • Opcode ID: 7da77fdaf85af245bc5212e65d27aec41bce50638c44365bf439b11340a2cd7a
                                              • Instruction ID: 89d15bfac921ab89e9eca2063ece7e9eefa50a1aaf639475bd67a7daf7de1396
                                              • Opcode Fuzzy Hash: 7da77fdaf85af245bc5212e65d27aec41bce50638c44365bf439b11340a2cd7a
                                              • Instruction Fuzzy Hash: FF3177749043829FEB35CB7D9C49BB777A8AB16304F084569E4A2C22A0E7F49685CF31
                                              APIs
                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00D4C21E,00000000), ref: 00D4CF38
                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00D4CF6F
                                              • GetLastError.KERNEL32(?,00000000,?,?,?,00D4C21E,00000000), ref: 00D4CFB4
                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00D4C21E,00000000), ref: 00D4CFC8
                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00D4C21E,00000000), ref: 00D4CFF2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                              • String ID:
                                              • API String ID: 3191363074-0
                                              • Opcode ID: 71eeea8761cc43ecf308151eb29010440207afe626e42cbc67639d27ae4af944
                                              • Instruction ID: b024276c0ee0be73b4687cb797aaf8cd366ad3c007102042b7517d9ff8956be7
                                              • Opcode Fuzzy Hash: 71eeea8761cc43ecf308151eb29010440207afe626e42cbc67639d27ae4af944
                                              • Instruction Fuzzy Hash: 24317C71616305AFDB60DFA5C884AABBBF9EF14310B14542EF546D2201EB34EE499B70
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00D31915
                                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 00D319C1
                                              • Sleep.KERNEL32(00000000,?,?,?), ref: 00D319C9
                                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 00D319DA
                                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00D319E2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessagePostSleep$RectWindow
                                              • String ID:
                                              • API String ID: 3382505437-0
                                              • Opcode ID: 8b18bcadb8fa46cbcebf8717d8495cf6549f833bb7d6dfa77039c67c3c712282
                                              • Instruction ID: 242a69cae2ab83c2f3e5e3bafbb4a5eb3faf4fb1332166efe1a30eb23b935999
                                              • Opcode Fuzzy Hash: 8b18bcadb8fa46cbcebf8717d8495cf6549f833bb7d6dfa77039c67c3c712282
                                              • Instruction Fuzzy Hash: 9F319E75A0021AEFCB04CFA8CD99BAE3BB5EB05315F144225F961E72D1C7B09954CBB0
                                              APIs
                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D65745
                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00D6579D
                                              • _wcslen.LIBCMT ref: 00D657AF
                                              • _wcslen.LIBCMT ref: 00D657BA
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D65816
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$_wcslen
                                              • String ID:
                                              • API String ID: 763830540-0
                                              • Opcode ID: 52b2d2a0b54ae9ced80de50275f53fbcbf935a7d83cb5b4c571ebe44e6ef3b5a
                                              • Instruction ID: f93c916d247f022cd476f23e0b7a3806281ebabeb282d1ff791b34e536a93eca
                                              • Opcode Fuzzy Hash: 52b2d2a0b54ae9ced80de50275f53fbcbf935a7d83cb5b4c571ebe44e6ef3b5a
                                              • Instruction Fuzzy Hash: DF2193719046189BDB208FA0DC84AEE77B8FF15724F148256E969EA184D77099C5CF70
                                              APIs
                                              • IsWindow.USER32(00000000), ref: 00D50951
                                              • GetForegroundWindow.USER32 ref: 00D50968
                                              • GetDC.USER32(00000000), ref: 00D509A4
                                              • GetPixel.GDI32(00000000,?,00000003), ref: 00D509B0
                                              • ReleaseDC.USER32(00000000,00000003), ref: 00D509E8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$ForegroundPixelRelease
                                              • String ID:
                                              • API String ID: 4156661090-0
                                              • Opcode ID: 481a492aaa90f4677d2e87c7bca74858696e104458a226ad64780a074a1fc190
                                              • Instruction ID: a278346d5e9630fa96df16360ef1b9f2cab5bbc048b1a1174e58113b36961265
                                              • Opcode Fuzzy Hash: 481a492aaa90f4677d2e87c7bca74858696e104458a226ad64780a074a1fc190
                                              • Instruction Fuzzy Hash: 31218139600204AFD704EFA9D884AAEBBE5EF44701F048069F89AD7362DB70AC44DF70
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 00D0CDC6
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D0CDE9
                                                • Part of subcall function 00D03820: RtlAllocateHeap.NTDLL(00000000,?,00DA1444,?,00CEFDF5,?,?,00CDA976,00000010,00DA1440,00CD13FC,?,00CD13C6,?,00CD1129), ref: 00D03852
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D0CE0F
                                              • _free.LIBCMT ref: 00D0CE22
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D0CE31
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                              • String ID:
                                              • API String ID: 336800556-0
                                              • Opcode ID: 8c0bb3b4c714dcaed6f41e0be5e87d33b81e0b2e91c3bb58c1ab4a090efa8006
                                              • Instruction ID: 850f3c23f7e269bb62600b2c71acf24db04ac5db3b3126d540e0724ac0e84a95
                                              • Opcode Fuzzy Hash: 8c0bb3b4c714dcaed6f41e0be5e87d33b81e0b2e91c3bb58c1ab4a090efa8006
                                              • Instruction Fuzzy Hash: AA0184726223157FA32127B6AC8CF7F696DDEC6BA13191229FD09C7281EA618D0191B0
                                              APIs
                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CE9693
                                              • SelectObject.GDI32(?,00000000), ref: 00CE96A2
                                              • BeginPath.GDI32(?), ref: 00CE96B9
                                              • SelectObject.GDI32(?,00000000), ref: 00CE96E2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: c4e317d0461741b3bd0a57c7dd15585a7f2f8db2a83c7522c7f127f5e6e09329
                                              • Instruction ID: 44c672bc55d43b95adc7dbfbd52c15388e7499a2b82371a23652e412181daea8
                                              • Opcode Fuzzy Hash: c4e317d0461741b3bd0a57c7dd15585a7f2f8db2a83c7522c7f127f5e6e09329
                                              • Instruction Fuzzy Hash: 52218E34812385EBDB11DF66EC187AA3BA8FB12355F100216F430E62B0D3B49995CFB4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 37b602d065fc45b45603ac0a50a3ceac5a0edc9ec3da9861d281001f3a36c477
                                              • Instruction ID: 5333e45d2088f2ce2e2fe4eecc5fef8e29377fe28501cbeb40a9e9672008b92f
                                              • Opcode Fuzzy Hash: 37b602d065fc45b45603ac0a50a3ceac5a0edc9ec3da9861d281001f3a36c477
                                              • Instruction Fuzzy Hash: 9401B1E2645A09FFE2089610BD82FBB735D9B313A4F594020FE089A245F760ED18D2F1
                                              APIs
                                              • GetLastError.KERNEL32(?,?,?,00CFF2DE,00D03863,00DA1444,?,00CEFDF5,?,?,00CDA976,00000010,00DA1440,00CD13FC,?,00CD13C6), ref: 00D02DFD
                                              • _free.LIBCMT ref: 00D02E32
                                              • _free.LIBCMT ref: 00D02E59
                                              • SetLastError.KERNEL32(00000000,00CD1129), ref: 00D02E66
                                              • SetLastError.KERNEL32(00000000,00CD1129), ref: 00D02E6F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_free
                                              • String ID:
                                              • API String ID: 3170660625-0
                                              • Opcode ID: 2977385758a51c192a12a84ebe893968aaf4d8965056b0cf8360cb9dfab0b654
                                              • Instruction ID: 497acf9c273ce6cfeb45e5f41be408cb50a4408c1e747f340e6c05e93347fe1a
                                              • Opcode Fuzzy Hash: 2977385758a51c192a12a84ebe893968aaf4d8965056b0cf8360cb9dfab0b654
                                              • Instruction Fuzzy Hash: 4201A4362877006BC6126775EC4EF3B265DEBD13B5B694429F8ADE23E2EB64CC014134
                                              APIs
                                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?,?,00D3035E), ref: 00D3002B
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?), ref: 00D30046
                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?), ref: 00D30054
                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?), ref: 00D30064
                                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00D2FF41,80070057,?,?), ref: 00D30070
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                              • String ID:
                                              • API String ID: 3897988419-0
                                              • Opcode ID: f5021f055daaec0ea778953df0320399505d334b941440a27cb9a1ea99c3acfa
                                              • Instruction ID: a0e9851ed07b9d0b03163ed04946ebb480fe8cb97399789d91a71d377ef2efd3
                                              • Opcode Fuzzy Hash: f5021f055daaec0ea778953df0320399505d334b941440a27cb9a1ea99c3acfa
                                              • Instruction Fuzzy Hash: B1017872610218ABDB245F68DC44BAA7FADEB48792F149124F945D2210E7B5DD408BB0
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00D3E997
                                              • QueryPerformanceFrequency.KERNEL32(?), ref: 00D3E9A5
                                              • Sleep.KERNEL32(00000000), ref: 00D3E9AD
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00D3E9B7
                                              • Sleep.KERNEL32 ref: 00D3E9F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: 8400cc9fab8ca3f1feaaa4a7305051f81423d7d4329a29599405f4cca5ac385b
                                              • Instruction ID: 923b2d1edb16bd8d95bc38c59e6af9fe87c95b278af73bd2f67c3305ecf17ea7
                                              • Opcode Fuzzy Hash: 8400cc9fab8ca3f1feaaa4a7305051f81423d7d4329a29599405f4cca5ac385b
                                              • Instruction Fuzzy Hash: 0C011732D11629DBCF40ABE5DC59AEDFB78FB09701F000556E942B2281CB7495558BB1
                                              APIs
                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D31114
                                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D31120
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D3112F
                                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D30B9B,?,?,?), ref: 00D31136
                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D3114D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 842720411-0
                                              • Opcode ID: 92d796b7d5b08f2b6cecda56e341e4f367aa2ba73c93a18aab4c10a9cf01e5d4
                                              • Instruction ID: 392fa720ddc4276479c812b0041acb0125b00fea492ba89d9e8b4fa5acd0f6ac
                                              • Opcode Fuzzy Hash: 92d796b7d5b08f2b6cecda56e341e4f367aa2ba73c93a18aab4c10a9cf01e5d4
                                              • Instruction Fuzzy Hash: FF011979210305BFDB114FA5DC49AAA3B6EEF8A3A0B244419FA85D7360DA71DC009A70
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D30FCA
                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D30FD6
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D30FE5
                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D30FEC
                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D31002
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: cd27791a68190cf48b458fcc06910bbbb11f502fea1fd5da91ed257f677d3c4c
                                              • Instruction ID: 8330a70453d2be6ed115afc521c5c91cb606687eed36461d164740a10fa232de
                                              • Opcode Fuzzy Hash: cd27791a68190cf48b458fcc06910bbbb11f502fea1fd5da91ed257f677d3c4c
                                              • Instruction Fuzzy Hash: 99F04939250302BBDB214FA59C4AF663BADEF8A762F145414FA89D6351CAB1DC408A70
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D3102A
                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D31036
                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D31045
                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D3104C
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D31062
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 0d75c6f756047b752d875afe6d4642c34b60d85e0cd524d32f6605be0a305fa3
                                              • Instruction ID: a992fc9cd3253553f994e5c29dc1a732fda2f03d956975abdf0528a28605baab
                                              • Opcode Fuzzy Hash: 0d75c6f756047b752d875afe6d4642c34b60d85e0cd524d32f6605be0a305fa3
                                              • Instruction Fuzzy Hash: 75F06D39250302FBDB215FA5EC5AF663BADEF8A761F141414FA85D7350CAB1D8408A70
                                              APIs
                                              • CloseHandle.KERNEL32(?,?,?,?,00D4017D,?,00D432FC,?,00000001,00D12592,?), ref: 00D40324
                                              • CloseHandle.KERNEL32(?,?,?,?,00D4017D,?,00D432FC,?,00000001,00D12592,?), ref: 00D40331
                                              • CloseHandle.KERNEL32(?,?,?,?,00D4017D,?,00D432FC,?,00000001,00D12592,?), ref: 00D4033E
                                              • CloseHandle.KERNEL32(?,?,?,?,00D4017D,?,00D432FC,?,00000001,00D12592,?), ref: 00D4034B
                                              • CloseHandle.KERNEL32(?,?,?,?,00D4017D,?,00D432FC,?,00000001,00D12592,?), ref: 00D40358
                                              • CloseHandle.KERNEL32(?,?,?,?,00D4017D,?,00D432FC,?,00000001,00D12592,?), ref: 00D40365
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 5eb53ead6c63af7e6bbb7f5205d14fd9ea90bfbb019c3d264ab9aded49df3d86
                                              • Instruction ID: e9b5ca1acabc005e6eeed928016202b13265c56b97b3759aabb1d3de76853b1d
                                              • Opcode Fuzzy Hash: 5eb53ead6c63af7e6bbb7f5205d14fd9ea90bfbb019c3d264ab9aded49df3d86
                                              • Instruction Fuzzy Hash: 2701AE72800B159FCB30AF66D890812FBF9BF603153198A3FD29652931C3B1A958CFA0
                                              APIs
                                              • _free.LIBCMT ref: 00D0D752
                                                • Part of subcall function 00D029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000), ref: 00D029DE
                                                • Part of subcall function 00D029C8: GetLastError.KERNEL32(00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000,00000000), ref: 00D029F0
                                              • _free.LIBCMT ref: 00D0D764
                                              • _free.LIBCMT ref: 00D0D776
                                              • _free.LIBCMT ref: 00D0D788
                                              • _free.LIBCMT ref: 00D0D79A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 82b8b3c2096b61a4e40aa04e02a73fb8884ad1fd06c9e86f1a485f82c0ddb47d
                                              • Instruction ID: 945f3df563dced497599d3c7a8eea398dfa21e85f6cf723f43c8cfacb2f7637f
                                              • Opcode Fuzzy Hash: 82b8b3c2096b61a4e40aa04e02a73fb8884ad1fd06c9e86f1a485f82c0ddb47d
                                              • Instruction Fuzzy Hash: E1F0FF32595304ABC621EBA8F9C5E2677DEFB847117A81807F04DE7681C730FC808AB4
                                              APIs
                                              • GetDlgItem.USER32(?,000003E9), ref: 00D35C58
                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00D35C6F
                                              • MessageBeep.USER32(00000000), ref: 00D35C87
                                              • KillTimer.USER32(?,0000040A), ref: 00D35CA3
                                              • EndDialog.USER32(?,00000001), ref: 00D35CBD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                              • String ID:
                                              • API String ID: 3741023627-0
                                              • Opcode ID: a24a7fb3b91c2c8910935b773791242c78c5fa65e648ec2be541bfa697a83221
                                              • Instruction ID: 0a5e05bc6e247328a37e88689ff52105c11caa1ca1280eedad20ed38450ee74b
                                              • Opcode Fuzzy Hash: a24a7fb3b91c2c8910935b773791242c78c5fa65e648ec2be541bfa697a83221
                                              • Instruction Fuzzy Hash: 93018630510B04ABEB205B50ED4EFA677B8BB00B05F04255AE5C3A15F1DBF4A984CAB4
                                              APIs
                                              • _free.LIBCMT ref: 00D022BE
                                                • Part of subcall function 00D029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000), ref: 00D029DE
                                                • Part of subcall function 00D029C8: GetLastError.KERNEL32(00000000,?,00D0D7D1,00000000,00000000,00000000,00000000,?,00D0D7F8,00000000,00000007,00000000,?,00D0DBF5,00000000,00000000), ref: 00D029F0
                                              • _free.LIBCMT ref: 00D022D0
                                              • _free.LIBCMT ref: 00D022E3
                                              • _free.LIBCMT ref: 00D022F4
                                              • _free.LIBCMT ref: 00D02305
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 6c3286a6513ebb805c22593b95647110c1ed8706c1184a602af5a602cce4e6f8
                                              • Instruction ID: 103952463f108d7fbb54ff4fe8a046d7e3bd8d927d19dc515f67dc1eaf3c11f9
                                              • Opcode Fuzzy Hash: 6c3286a6513ebb805c22593b95647110c1ed8706c1184a602af5a602cce4e6f8
                                              • Instruction Fuzzy Hash: 21F03A788A23208FCA12BF64BC06A683F64FB1A760B54150BF418E33F1C7304811AFB8
                                              APIs
                                              • EndPath.GDI32(?), ref: 00CE95D4
                                              • StrokeAndFillPath.GDI32(?,?,00D271F7,00000000,?,?,?), ref: 00CE95F0
                                              • SelectObject.GDI32(?,00000000), ref: 00CE9603
                                              • DeleteObject.GDI32 ref: 00CE9616
                                              • StrokePath.GDI32(?), ref: 00CE9631
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                              • String ID:
                                              • API String ID: 2625713937-0
                                              • Opcode ID: e8dbfd1f009fec137ce4362b642d2aaf968773725ba3ee892f36c1c9ab6e8b6b
                                              • Instruction ID: d88983437740bfe752effeed73d9a4e9d167e4043ba3420265f7572138b7929b
                                              • Opcode Fuzzy Hash: e8dbfd1f009fec137ce4362b642d2aaf968773725ba3ee892f36c1c9ab6e8b6b
                                              • Instruction Fuzzy Hash: 15F01438006348EBDB229F6AED18BA63B65EB02362F048215F4B5D52F0D7748A95DF31
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: __freea$_free
                                              • String ID: a/p$am/pm
                                              • API String ID: 3432400110-3206640213
                                              • Opcode ID: d184a71b5c2832278b167cbd48a2bdc27a401b48fdc4176f8904703e25558b75
                                              • Instruction ID: 1a555f1a93d2e8af7170eaf76df40ae31a921d4efa04244462dea155055e0f38
                                              • Opcode Fuzzy Hash: d184a71b5c2832278b167cbd48a2bdc27a401b48fdc4176f8904703e25558b75
                                              • Instruction Fuzzy Hash: 0CD1F239900206DADB289F68C895BFEB7B5FF05700F284259E94D9B6D0D3759D80CBB1
                                              APIs
                                                • Part of subcall function 00CF0242: EnterCriticalSection.KERNEL32(00DA070C,00DA1884,?,?,00CE198B,00DA2518,?,?,?,00CD12F9,00000000), ref: 00CF024D
                                                • Part of subcall function 00CF0242: LeaveCriticalSection.KERNEL32(00DA070C,?,00CE198B,00DA2518,?,?,?,00CD12F9,00000000), ref: 00CF028A
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00CF00A3: __onexit.LIBCMT ref: 00CF00A9
                                              • __Init_thread_footer.LIBCMT ref: 00D57BFB
                                                • Part of subcall function 00CF01F8: EnterCriticalSection.KERNEL32(00DA070C,?,?,00CE8747,00DA2514), ref: 00CF0202
                                                • Part of subcall function 00CF01F8: LeaveCriticalSection.KERNEL32(00DA070C,?,00CE8747,00DA2514), ref: 00CF0235
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                              • String ID: 5$G$Variable must be of type 'Object'.
                                              • API String ID: 535116098-3733170431
                                              • Opcode ID: e5cef92205a8b9ac26ec1fcd2d139042ccae1d85c5c08bca573f2838d8133abe
                                              • Instruction ID: 8ea34df14c84b0713c35d257fa0a883c2a015a66cb3f88cbbaf64cebd879b5e9
                                              • Opcode Fuzzy Hash: e5cef92205a8b9ac26ec1fcd2d139042ccae1d85c5c08bca573f2838d8133abe
                                              • Instruction Fuzzy Hash: 51915874A04209EFCF04EF54E8919BDB7B1EF49301F24805AFC469B292DB71AE49DB61
                                              APIs
                                                • Part of subcall function 00D3B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D321D0,?,?,00000034,00000800,?,00000034), ref: 00D3B42D
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00D32760
                                                • Part of subcall function 00D3B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00D3B3F8
                                                • Part of subcall function 00D3B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00D3B355
                                                • Part of subcall function 00D3B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00D32194,00000034,?,?,00001004,00000000,00000000), ref: 00D3B365
                                                • Part of subcall function 00D3B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00D32194,00000034,?,?,00001004,00000000,00000000), ref: 00D3B37B
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D327CD
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D3281A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: be9aea458c42c64ef867e02b0f4735574320e06d25ab1468471ed49614027613
                                              • Instruction ID: 9fcc4ac4d798282567964677c78783d2fdae71eb3db682d11939b3bbd66c0c1f
                                              • Opcode Fuzzy Hash: be9aea458c42c64ef867e02b0f4735574320e06d25ab1468471ed49614027613
                                              • Instruction Fuzzy Hash: F1412A72900218BFDB10DBA4CD81AEEBBB8EF09710F144095FA55B7191DB706E45CBB0
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\New Order-090125.exe,00000104), ref: 00D01769
                                              • _free.LIBCMT ref: 00D01834
                                              • _free.LIBCMT ref: 00D0183E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free$FileModuleName
                                              • String ID: C:\Users\user\Desktop\New Order-090125.exe
                                              • API String ID: 2506810119-1661078105
                                              • Opcode ID: 37587bfadfc2d99269a0d534f21f0fc60a52b97a786320b5b94319e7affabfa5
                                              • Instruction ID: 3d84096336914208a0ab79038530ad67884f44bcaa98764fb0403b77c1b5894b
                                              • Opcode Fuzzy Hash: 37587bfadfc2d99269a0d534f21f0fc60a52b97a786320b5b94319e7affabfa5
                                              • Instruction Fuzzy Hash: 31314F79A41218FBDB21DF999885EAEBBFCEB85310F144166F508D7291D6708E40CBB0
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00D6CC08,00000000,?,?,?,?), ref: 00D644AA
                                              • GetWindowLongW.USER32 ref: 00D644C7
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D644D7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Long
                                              • String ID: SysTreeView32
                                              • API String ID: 847901565-1698111956
                                              • Opcode ID: a5a709623bf21a7a4dad82a685af9668499c06ae9e926dbca11c18c18a545493
                                              • Instruction ID: 76bd388fb2f583f5804b40bf7282a8742f8f4aa771922afc65c5a1924bbb5a13
                                              • Opcode Fuzzy Hash: a5a709623bf21a7a4dad82a685af9668499c06ae9e926dbca11c18c18a545493
                                              • Instruction Fuzzy Hash: 12319C31210205AFDF219E78DC46BEA7BA9EB09334F244715F975E22E0DBB0EC509B60
                                              APIs
                                                • Part of subcall function 00D5335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00D53077,?,?), ref: 00D53378
                                              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00D5307A
                                              • _wcslen.LIBCMT ref: 00D5309B
                                              • htons.WSOCK32(00000000,?,?,00000000), ref: 00D53106
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                              • String ID: 255.255.255.255
                                              • API String ID: 946324512-2422070025
                                              • Opcode ID: 8a83f4ca5431bac6607eb27ab64944578e07fc1c93267183bff43766f864446d
                                              • Instruction ID: 663c273598ddb62bbe99166f4f5c4a8812c54657fca7b5462feddb5868c98c04
                                              • Opcode Fuzzy Hash: 8a83f4ca5431bac6607eb27ab64944578e07fc1c93267183bff43766f864446d
                                              • Instruction Fuzzy Hash: 9931AF392043059FCB20CF68C485EAAB7A0EF14399F288059ED158B3D2DB72EE49C770
                                              APIs
                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00D64705
                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00D64713
                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00D6471A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$DestroyWindow
                                              • String ID: msctls_updown32
                                              • API String ID: 4014797782-2298589950
                                              • Opcode ID: 74d649d66c258ce6c4541e57176951bc6560033a7989b91d3fd60818516f1d16
                                              • Instruction ID: c5b28e9be4b986f71c767f24257a4688e7894c93ac410b6c9df9a6b3a5b18cee
                                              • Opcode Fuzzy Hash: 74d649d66c258ce6c4541e57176951bc6560033a7989b91d3fd60818516f1d16
                                              • Instruction Fuzzy Hash: B7214AB5600209AFDB10DF64DC91DB737ADEB5A3A4B080059FA109B3A1CB71EC51DAB1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                              • API String ID: 176396367-2734436370
                                              • Opcode ID: c6e658cefd0c65daa7ad8fd63e5f93068fb021315e1651fe161741f662fe6af6
                                              • Instruction ID: a157a12931a4604cdad1184ae44c91ee53935978333f8a3dadf48bd528ac2331
                                              • Opcode Fuzzy Hash: c6e658cefd0c65daa7ad8fd63e5f93068fb021315e1651fe161741f662fe6af6
                                              • Instruction Fuzzy Hash: 78212B7220561166D331AB289C23FB7F3D89F51310F58442AFA4A97141EBE1ED86D2B5
                                              APIs
                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00D63840
                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00D63850
                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00D63876
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend$MoveWindow
                                              • String ID: Listbox
                                              • API String ID: 3315199576-2633736733
                                              • Opcode ID: a36b24a893db275d54179edc294e7c13126b490c78a9ed3aa1060b1bd2588546
                                              • Instruction ID: 2e538cfad8cd624c34e8eff3cf624105f887eb5b67b75cbdcbd1b756d3e20280
                                              • Opcode Fuzzy Hash: a36b24a893db275d54179edc294e7c13126b490c78a9ed3aa1060b1bd2588546
                                              • Instruction Fuzzy Hash: 7F218E72610218BBEF219F64DC85EBB376AEF89760F148124FA549B190C6B1EC5287B0
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00D44A08
                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00D44A5C
                                              • SetErrorMode.KERNEL32(00000000,?,?,00D6CC08), ref: 00D44AD0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorMode$InformationVolume
                                              • String ID: %lu
                                              • API String ID: 2507767853-685833217
                                              • Opcode ID: 66119b5837c1766809167b00ba62d91bf1c4c2cc83a79ffd44d3015b31ee358c
                                              • Instruction ID: 58e77a09b4d1575cda3664cea5cd4a73270ed1cb85c60af59941b95ce5a57cc5
                                              • Opcode Fuzzy Hash: 66119b5837c1766809167b00ba62d91bf1c4c2cc83a79ffd44d3015b31ee358c
                                              • Instruction Fuzzy Hash: E7314C75A00208AFDB10DF54C985EAA7BF8EF09308F1480A9E909DB362DB71ED45CB71
                                              APIs
                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00D6424F
                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00D64264
                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00D64271
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: msctls_trackbar32
                                              • API String ID: 3850602802-1010561917
                                              • Opcode ID: 151dc455ac9c82e1044fe68a76b70d70c200493e9292dda6ce6b3dd1bb07484d
                                              • Instruction ID: 280e24201c21991262621e34ceb46c48d383c4bbf5e915423d6c42ccaf556c21
                                              • Opcode Fuzzy Hash: 151dc455ac9c82e1044fe68a76b70d70c200493e9292dda6ce6b3dd1bb07484d
                                              • Instruction Fuzzy Hash: DD11E331250208BFEF205E68CC46FAB3BACEF99B54F110114FA55E21A0D2B1D8519B34
                                              APIs
                                                • Part of subcall function 00CD6B57: _wcslen.LIBCMT ref: 00CD6B6A
                                                • Part of subcall function 00D32DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D32DC5
                                                • Part of subcall function 00D32DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D32DD6
                                                • Part of subcall function 00D32DA7: GetCurrentThreadId.KERNEL32 ref: 00D32DDD
                                                • Part of subcall function 00D32DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00D32DE4
                                              • GetFocus.USER32 ref: 00D32F78
                                                • Part of subcall function 00D32DEE: GetParent.USER32(00000000), ref: 00D32DF9
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00D32FC3
                                              • EnumChildWindows.USER32(?,00D3303B), ref: 00D32FEB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                              • String ID: %s%d
                                              • API String ID: 1272988791-1110647743
                                              • Opcode ID: 754ee5975b4094546a4b912fb936c6524b514e764d7308f9b451dbb4613bd554
                                              • Instruction ID: 2e42f66ab3ba4e662a2f928155b8aa4764e963d12e3018e9ccbc61f44710815d
                                              • Opcode Fuzzy Hash: 754ee5975b4094546a4b912fb936c6524b514e764d7308f9b451dbb4613bd554
                                              • Instruction Fuzzy Hash: 24119D71600205ABCF556FA49C85EFE376AEF84314F044076F909AB292DE7099499B70
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00D658C1
                                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00D658EE
                                              • DrawMenuBar.USER32(?), ref: 00D658FD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Menu$InfoItem$Draw
                                              • String ID: 0
                                              • API String ID: 3227129158-4108050209
                                              • Opcode ID: 9805d3dde39f9303bd8e97673355af92a1f2c0fde3479695cd102859f70b26a5
                                              • Instruction ID: 6aa64c562bf7c0ca3ab496e0ae984e6d5c0bfe7462b6ed7112827b8fc79cc93d
                                              • Opcode Fuzzy Hash: 9805d3dde39f9303bd8e97673355af92a1f2c0fde3479695cd102859f70b26a5
                                              • Instruction Fuzzy Hash: 9F016D31500258EFDB219F11EC44BAEBBB4FB45360F14809AE889D6251DB709AC4EF31
                                              APIs
                                              • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00D2D3BF
                                              • FreeLibrary.KERNEL32 ref: 00D2D3E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: AddressFreeLibraryProc
                                              • String ID: GetSystemWow64DirectoryW$X64
                                              • API String ID: 3013587201-2590602151
                                              • Opcode ID: 2737a17dbe456d3af80aa72a3d9442d52caa0437060d645ac1e0b6a5a6019e20
                                              • Instruction ID: 9098bbfd511d9fdadaf0e6376d51cad4c4395947595e9326be7cc0ab713dcfb5
                                              • Opcode Fuzzy Hash: 2737a17dbe456d3af80aa72a3d9442d52caa0437060d645ac1e0b6a5a6019e20
                                              • Instruction Fuzzy Hash: 14F0AB31919730DBDB315A10EC58AB93311AF31705F6CD15AF4C2E1304D760CC4082FA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7a7dbd185c560b7986a11f78f4e5d95bf082e85b0720481382e0c8534a437782
                                              • Instruction ID: 25264b6bbf2d81e96769b86ef316c217236228c7bd612b6fd41c744f4416fcc2
                                              • Opcode Fuzzy Hash: 7a7dbd185c560b7986a11f78f4e5d95bf082e85b0720481382e0c8534a437782
                                              • Instruction Fuzzy Hash: D2C14C75A0021AEFDB14CFA8C8A4EAEBBB5FF48704F148598E505EB251D731ED41CBA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: __alldvrm$_strrchr
                                              • String ID:
                                              • API String ID: 1036877536-0
                                              • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                              • Instruction ID: e834ea15ee6846d85774b235fe464ae7742de2414368e250cd1da3221927a0a4
                                              • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                              • Instruction Fuzzy Hash: 49A147B5E003869FDB25CF18C891BAEBFE8EF61350F18416DE6899B2C1C6349981C771
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInitInitializeUninitialize
                                              • String ID:
                                              • API String ID: 1998397398-0
                                              • Opcode ID: bfa3bfe90b35965a4b5e5b34494fedea71d2eb817e8141090c8db48360fd046f
                                              • Instruction ID: 7b45f8c19ad064ee4a7fcc6f31b5864dc1c9dbd224d6c54390d05192f147702b
                                              • Opcode Fuzzy Hash: bfa3bfe90b35965a4b5e5b34494fedea71d2eb817e8141090c8db48360fd046f
                                              • Instruction Fuzzy Hash: 35A11B756042019FCB10DF28C485A2AB7E5FF88755F04895EFD899B361EB30EE05DBA2
                                              APIs
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00D6FC08,?), ref: 00D305F0
                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00D6FC08,?), ref: 00D30608
                                              • CLSIDFromProgID.OLE32(?,?,00000000,00D6CC40,000000FF,?,00000000,00000800,00000000,?,00D6FC08,?), ref: 00D3062D
                                              • _memcmp.LIBVCRUNTIME ref: 00D3064E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FromProg$FreeTask_memcmp
                                              • String ID:
                                              • API String ID: 314563124-0
                                              • Opcode ID: 2e8632f8fe9a1ecffa3bf9f5e613313de9da2dd761fcc6b14d3747ccb740ab73
                                              • Instruction ID: 2b607c3063e3e928306d1e96fc0d56e6faa9a91edc787e89881e36b0b6b10237
                                              • Opcode Fuzzy Hash: 2e8632f8fe9a1ecffa3bf9f5e613313de9da2dd761fcc6b14d3747ccb740ab73
                                              • Instruction Fuzzy Hash: 74811C75A00109EFCB04DF94C994EEEBBB9FF89315F244598E506EB250DB71AE06CB60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _free
                                              • String ID:
                                              • API String ID: 269201875-0
                                              • Opcode ID: a8d6507d2d3b1d96ed91269dd20728654247cfdabc20698c0e42284e9a4fecb3
                                              • Instruction ID: 4fe58283033a8a72366e70e13004c470008189db1d808fabb433f6f1e439a5c7
                                              • Opcode Fuzzy Hash: a8d6507d2d3b1d96ed91269dd20728654247cfdabc20698c0e42284e9a4fecb3
                                              • Instruction Fuzzy Hash: DD413B39A00114BBEB216BF8BC45BFE3AA5EF41770F184225F619D62D2EE7488C15672
                                              APIs
                                              • GetWindowRect.USER32(00E7E298,?), ref: 00D662E2
                                              • ScreenToClient.USER32(?,?), ref: 00D66315
                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00D66382
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$ClientMoveRectScreen
                                              • String ID:
                                              • API String ID: 3880355969-0
                                              • Opcode ID: 34e65d5aa94b2a0d8e4f531758883db7653285feed3c438a9e47e825c85250ee
                                              • Instruction ID: 86e7636de9f4341b1a7fcb93b3863624c0737a258d072adc3656e22aae448a4a
                                              • Opcode Fuzzy Hash: 34e65d5aa94b2a0d8e4f531758883db7653285feed3c438a9e47e825c85250ee
                                              • Instruction Fuzzy Hash: 84510A74A00209EFDF10DF68D8809AE7BB5EB55364F18815AF965DB3A0D770ED81CB60
                                              APIs
                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00D51AFD
                                              • WSAGetLastError.WSOCK32 ref: 00D51B0B
                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00D51B8A
                                              • WSAGetLastError.WSOCK32 ref: 00D51B94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ErrorLast$socket
                                              • String ID:
                                              • API String ID: 1881357543-0
                                              • Opcode ID: 638655c9a9e810e931cd9a1dde65a1b585b169a72a3978a199eb50776ac649a0
                                              • Instruction ID: 7380b0f71c2a33876a1493c2adfd0f725eca5648cf3639626c69e8b01fbf1fdd
                                              • Opcode Fuzzy Hash: 638655c9a9e810e931cd9a1dde65a1b585b169a72a3978a199eb50776ac649a0
                                              • Instruction Fuzzy Hash: 0241D338600201AFEB20AF24C886F2577E5AB45718F548449FA5A9F3D2D7B2DD41DBA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: df24c70c95d7693513db206a19188ac22c32ccd8eef95b5f22eb16747c260bef
                                              • Instruction ID: 34c80f132f4ad5ba5b25b05a5d0e3aa5b8b1facb072a82eb07bdf2fa2b5f2ed7
                                              • Opcode Fuzzy Hash: df24c70c95d7693513db206a19188ac22c32ccd8eef95b5f22eb16747c260bef
                                              • Instruction Fuzzy Hash: D941F475A04204BFD7249F78CC45BAABBA9EB88724F10456FF149DB2C1D771DA4187B0
                                              APIs
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00D45783
                                              • GetLastError.KERNEL32(?,00000000), ref: 00D457A9
                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00D457CE
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00D457FA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                              • String ID:
                                              • API String ID: 3321077145-0
                                              • Opcode ID: e110d03fff98a8c3213a8d9df177418c89736f95274ed36d32f1725a2d969c91
                                              • Instruction ID: 4d84f62ddb2435e281912f6ec11cad9daf93dbf2f6265bc95a94bc73dda4bfbd
                                              • Opcode Fuzzy Hash: e110d03fff98a8c3213a8d9df177418c89736f95274ed36d32f1725a2d969c91
                                              • Instruction Fuzzy Hash: 4B414E35600611DFCB11DF15D484A5EBBE2EF89720B198589ED4AAB362DB30FD00DBA1
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00CF6D71,00000000,00000000,00CF82D9,?,00CF82D9,?,00000001,00CF6D71,8BE85006,00000001,00CF82D9,00CF82D9), ref: 00D0D910
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D0D999
                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00D0D9AB
                                              • __freea.LIBCMT ref: 00D0D9B4
                                                • Part of subcall function 00D03820: RtlAllocateHeap.NTDLL(00000000,?,00DA1444,?,00CEFDF5,?,?,00CDA976,00000010,00DA1440,00CD13FC,?,00CD13C6,?,00CD1129), ref: 00D03852
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                              • String ID:
                                              • API String ID: 2652629310-0
                                              • Opcode ID: 23f4c0e2f0c5918e98fbefa393ec1d6e928679bda628f7626031a568da5f33a9
                                              • Instruction ID: d0061ad079c0f3a85ff1c57ead99d3109af135e326c42ac51ad78dd2f5eb7e1e
                                              • Opcode Fuzzy Hash: 23f4c0e2f0c5918e98fbefa393ec1d6e928679bda628f7626031a568da5f33a9
                                              • Instruction Fuzzy Hash: 6731A271A0020AABDB24DFA5EC45EBE7BA6EB41710B194169FC08D6291D735CD50CBB0
                                              APIs
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00D65352
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D65375
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D65382
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D653A8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LongWindow$InvalidateMessageRectSend
                                              • String ID:
                                              • API String ID: 3340791633-0
                                              • Opcode ID: cda74e5b228bfd6f3a0a96bf7f42fc76d0d742f49ee03f58c5c8a819279ff154
                                              • Instruction ID: 09ce5f9077dfa47019afa29dd4d4b073e9cb0eb78f5118e610c58e3ffda76f6a
                                              • Opcode Fuzzy Hash: cda74e5b228bfd6f3a0a96bf7f42fc76d0d742f49ee03f58c5c8a819279ff154
                                              • Instruction Fuzzy Hash: 5F31E034A55A08EFEB309E54EC06BE83761AB05B90F5C4102FA51963E5C7F1A9C0EB72
                                              APIs
                                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00D3ABF1
                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00D3AC0D
                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00D3AC74
                                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00D3ACC6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: 43030276f229d2b6e93a62be3ee052ba3e5984b0f5b16b46a0874e5e4af880de
                                              • Instruction ID: c6be28101ba87734d28a25190567dd5a9b5418c763e2703074af605342684b5a
                                              • Opcode Fuzzy Hash: 43030276f229d2b6e93a62be3ee052ba3e5984b0f5b16b46a0874e5e4af880de
                                              • Instruction Fuzzy Hash: 54310634B047186FEF35CB69CC087FABBA5AB89310F08631AE4D5962E1C3758D858772
                                              APIs
                                              • ClientToScreen.USER32(?,?), ref: 00D6769A
                                              • GetWindowRect.USER32(?,?), ref: 00D67710
                                              • PtInRect.USER32(?,?,00D68B89), ref: 00D67720
                                              • MessageBeep.USER32(00000000), ref: 00D6778C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Rect$BeepClientMessageScreenWindow
                                              • String ID:
                                              • API String ID: 1352109105-0
                                              • Opcode ID: e8311b14bfd75e0061cbb31c4b0f59a17f528e5f5e8e94fc39d5b5a03dc32329
                                              • Instruction ID: bf61abe201d29345b38379fa7f69258900ae8e4f96de0f973f5489879d9f7766
                                              • Opcode Fuzzy Hash: e8311b14bfd75e0061cbb31c4b0f59a17f528e5f5e8e94fc39d5b5a03dc32329
                                              • Instruction Fuzzy Hash: 89417C386052189FDB01CF98C894EA977F5FB49318F1980A9E465DB3A1D730E942CFB0
                                              APIs
                                              • GetForegroundWindow.USER32 ref: 00D616EB
                                                • Part of subcall function 00D33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D33A57
                                                • Part of subcall function 00D33A3D: GetCurrentThreadId.KERNEL32 ref: 00D33A5E
                                                • Part of subcall function 00D33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D325B3), ref: 00D33A65
                                              • GetCaretPos.USER32(?), ref: 00D616FF
                                              • ClientToScreen.USER32(00000000,?), ref: 00D6174C
                                              • GetForegroundWindow.USER32 ref: 00D61752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                              • String ID:
                                              • API String ID: 2759813231-0
                                              • Opcode ID: 03efc9e4d54fb41db9250362c3e3189038fba6554b30205e43989c7613e71e65
                                              • Instruction ID: 1f2ff4eaac6ccdfec59296f39faa5acde904f1d83864b81b194552d3dcd60159
                                              • Opcode Fuzzy Hash: 03efc9e4d54fb41db9250362c3e3189038fba6554b30205e43989c7613e71e65
                                              • Instruction Fuzzy Hash: 7A310C75D00249AFC704EFA9C8818AEBBF9EF48304B5480AAE555E7351E631EE45CBA0
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00D3D501
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00D3D50F
                                              • Process32NextW.KERNEL32(00000000,?), ref: 00D3D52F
                                              • CloseHandle.KERNEL32(00000000), ref: 00D3D5DC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 420147892-0
                                              • Opcode ID: 1f88a98cc246d68a6c32893cc3c87cf717433bc7ded96abf8ccda1129a6a34b3
                                              • Instruction ID: 188c85c84e472e1ea8ddc3f5f5f9c6d836337fdb4296955f11a79f0afe6cf740
                                              • Opcode Fuzzy Hash: 1f88a98cc246d68a6c32893cc3c87cf717433bc7ded96abf8ccda1129a6a34b3
                                              • Instruction Fuzzy Hash: 543191721083409FD301EF54D881ABFBBE8EF9A354F14092DF581872A1EB719949DBA2
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • GetCursorPos.USER32(?), ref: 00D69001
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00D27711,?,?,?,?,?), ref: 00D69016
                                              • GetCursorPos.USER32(?), ref: 00D6905E
                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00D27711,?,?,?), ref: 00D69094
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                              • String ID:
                                              • API String ID: 2864067406-0
                                              • Opcode ID: 2d47a8e4d6782e465cc346ca4ea509afdd558d854af03b560232148402d82cfc
                                              • Instruction ID: ed4c622b06a7ff9fad321cd69c3fc6cc1e3a7389546e71f7c1ff354b60854974
                                              • Opcode Fuzzy Hash: 2d47a8e4d6782e465cc346ca4ea509afdd558d854af03b560232148402d82cfc
                                              • Instruction Fuzzy Hash: B121A135601118EFCF258FA4CC68EFABBB9EF4A350F144059F94587261C3719950DB71
                                              APIs
                                              • GetFileAttributesW.KERNEL32(?,00D6CB68), ref: 00D3D2FB
                                              • GetLastError.KERNEL32 ref: 00D3D30A
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D3D319
                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00D6CB68), ref: 00D3D376
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 2267087916-0
                                              • Opcode ID: fc9e8a6c2a9799f9802ce0ab69f03eb110566decedddd2eaa19e5c9b0c5e6261
                                              • Instruction ID: 7c46af5afce2edb86592b50212853122916c5a79ecc8bbd6247821ea731bf0be
                                              • Opcode Fuzzy Hash: fc9e8a6c2a9799f9802ce0ab69f03eb110566decedddd2eaa19e5c9b0c5e6261
                                              • Instruction Fuzzy Hash: 9C219F745093019F8300DF28E88196AB7E4EE5A764F544A1EF499C33A1D731DD49CFA3
                                              APIs
                                                • Part of subcall function 00D31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D3102A
                                                • Part of subcall function 00D31014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D31036
                                                • Part of subcall function 00D31014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D31045
                                                • Part of subcall function 00D31014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D3104C
                                                • Part of subcall function 00D31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D31062
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00D315BE
                                              • _memcmp.LIBVCRUNTIME ref: 00D315E1
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D31617
                                              • HeapFree.KERNEL32(00000000), ref: 00D3161E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                              • String ID:
                                              • API String ID: 1592001646-0
                                              • Opcode ID: 087ae8c201c350c40e231297e5470126e0866c3b7957fff8d3429b649b7232fc
                                              • Instruction ID: a54dca2ba1e1712f8e1a27aaa229bcdb4fcbf816075895802a92fa11aa26b0df
                                              • Opcode Fuzzy Hash: 087ae8c201c350c40e231297e5470126e0866c3b7957fff8d3429b649b7232fc
                                              • Instruction Fuzzy Hash: E8219A35E0020AEFDF10DFA5C945BEEB7B8EF44344F088469E441AB241E770AA05CBB0
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EC), ref: 00D6280A
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00D62824
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00D62832
                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00D62840
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Long$AttributesLayered
                                              • String ID:
                                              • API String ID: 2169480361-0
                                              • Opcode ID: 4f64baaf76f88fa65448e2e1b49013b4a9eb7b03b6b535db6bc3455e10a9e8fc
                                              • Instruction ID: a5770cfe2cb11f33a23762504dcd2ec8516ad3d49f0f5fdd1faad1c39db68bec
                                              • Opcode Fuzzy Hash: 4f64baaf76f88fa65448e2e1b49013b4a9eb7b03b6b535db6bc3455e10a9e8fc
                                              • Instruction Fuzzy Hash: 80218E31205A11AFD7149B24CC45FBA7BA5AF45324F188159E466CB6E2C7B1EC42C7B0
                                              APIs
                                                • Part of subcall function 00D38D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00D3790A,?,000000FF,?,00D38754,00000000,?,0000001C,?,?), ref: 00D38D8C
                                                • Part of subcall function 00D38D7D: lstrcpyW.KERNEL32(00000000,?,?,00D3790A,?,000000FF,?,00D38754,00000000,?,0000001C,?,?,00000000), ref: 00D38DB2
                                                • Part of subcall function 00D38D7D: lstrcmpiW.KERNEL32(00000000,?,00D3790A,?,000000FF,?,00D38754,00000000,?,0000001C,?,?), ref: 00D38DE3
                                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00D38754,00000000,?,0000001C,?,?,00000000), ref: 00D37923
                                              • lstrcpyW.KERNEL32(00000000,?,?,00D38754,00000000,?,0000001C,?,?,00000000), ref: 00D37949
                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00D38754,00000000,?,0000001C,?,?,00000000), ref: 00D37984
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpylstrlen
                                              • String ID: cdecl
                                              • API String ID: 4031866154-3896280584
                                              • Opcode ID: 3a92ec946045e2a7c57bedfc2ad49e8fe6b1c4fe1ae89baa66bbeb8df0dc2293
                                              • Instruction ID: 9d98e166ed40555f1c43677ccc774bb4fadae59503cf218b97000ba7ac0fbd21
                                              • Opcode Fuzzy Hash: 3a92ec946045e2a7c57bedfc2ad49e8fe6b1c4fe1ae89baa66bbeb8df0dc2293
                                              • Instruction Fuzzy Hash: 0C11DF7A200742ABCB259F35D844E7A77A9EF85350B00412AF846C72A4EB719801DBB1
                                              APIs
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00D67D0B
                                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00D67D2A
                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00D67D42
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00D4B7AD,00000000), ref: 00D67D6B
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$Long
                                              • String ID:
                                              • API String ID: 847901565-0
                                              • Opcode ID: a705fc11ba273868b2b2c9bc8f3620503e39858fc3b88f7b2b227e6c882adc41
                                              • Instruction ID: 96fd2020051bbf3a2d3659d9018aed93b096d70571d3d5ddec24c38f31021b3a
                                              • Opcode Fuzzy Hash: a705fc11ba273868b2b2c9bc8f3620503e39858fc3b88f7b2b227e6c882adc41
                                              • Instruction Fuzzy Hash: C2119D35614619AFCB109F68CC04ABA3BA5AF46364F198B24F839C72F0E7309951DF70
                                              APIs
                                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 00D656BB
                                              • _wcslen.LIBCMT ref: 00D656CD
                                              • _wcslen.LIBCMT ref: 00D656D8
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D65816
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend_wcslen
                                              • String ID:
                                              • API String ID: 455545452-0
                                              • Opcode ID: 8f695e5fe8f4f12d48dcc74931cc79168dddff2cf981731cdfbc4aa4b36249fd
                                              • Instruction ID: 02bfcef80c31c38e676fda94c667ad628faa228f43292898b2b3c87371b4c47c
                                              • Opcode Fuzzy Hash: 8f695e5fe8f4f12d48dcc74931cc79168dddff2cf981731cdfbc4aa4b36249fd
                                              • Instruction Fuzzy Hash: FD11E175600609A7DB209FA1EC81AFE37ACEF21764F14406AF955D6185EBB0DAC4CB70
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 26bb10b89ecf814eca0519100cc2594ba1eac68557b4d343f41f99e49f332194
                                              • Instruction ID: bd6b107b4e2d3c98e1eafdc2dcd6e684a4009c19cf82ab07028cc2d0934217ec
                                              • Opcode Fuzzy Hash: 26bb10b89ecf814eca0519100cc2594ba1eac68557b4d343f41f99e49f332194
                                              • Instruction Fuzzy Hash: F901D1B660A7163EFA2126B87CC0F37661DEF423B8F380326F529A12D2EB60CC015170
                                              APIs
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00D31A47
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D31A59
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D31A6F
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D31A8A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: ce767b1937fb2c24f49ac2ff6cf249d83565738da2dcd72731b395f72211657c
                                              • Instruction ID: 37d69990ed474e6ef250bbf004c2303eb32eda638e1ca75c6731b42fccb9fa35
                                              • Opcode Fuzzy Hash: ce767b1937fb2c24f49ac2ff6cf249d83565738da2dcd72731b395f72211657c
                                              • Instruction Fuzzy Hash: A7110C3AD01219FFEB11DBA5CD85FADBB78EB04750F200091E604B7290D6716E51DBA4
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00D3E1FD
                                              • MessageBoxW.USER32(?,?,?,?), ref: 00D3E230
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00D3E246
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00D3E24D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                              • String ID:
                                              • API String ID: 2880819207-0
                                              • Opcode ID: c85e4870af21a985f588a9b22176ffd4deb58160546e6404a209dd82c0028d82
                                              • Instruction ID: f2cd8a1ba2de56ff65fe98f9b7376a25644046fd5ae005b4e1b17c82ea574e30
                                              • Opcode Fuzzy Hash: c85e4870af21a985f588a9b22176ffd4deb58160546e6404a209dd82c0028d82
                                              • Instruction Fuzzy Hash: 9F11C47A904358BBCB119FA89C09BAF7FADAB46320F044255F925E33D1D6B4DD0487B0
                                              APIs
                                              • CreateThread.KERNEL32(00000000,?,00CFCFF9,00000000,00000004,00000000), ref: 00CFD218
                                              • GetLastError.KERNEL32 ref: 00CFD224
                                              • __dosmaperr.LIBCMT ref: 00CFD22B
                                              • ResumeThread.KERNEL32(00000000), ref: 00CFD249
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                                              • String ID:
                                              • API String ID: 173952441-0
                                              • Opcode ID: 6fb00603ea29bdc162d423c8e4a82d43cc1fe1751589aa48bee439f6670fb23e
                                              • Instruction ID: 0bcddc786ffed4896228474455a47b88732d4b7021bde8321eb3da676d119c5a
                                              • Opcode Fuzzy Hash: 6fb00603ea29bdc162d423c8e4a82d43cc1fe1751589aa48bee439f6670fb23e
                                              • Instruction Fuzzy Hash: 1B01D67640520C7BDB516BA5DC09BBE7A6ADF82331F204219FA26921D0CB718D01D6F2
                                              APIs
                                                • Part of subcall function 00CE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CE9BB2
                                              • GetClientRect.USER32(?,?), ref: 00D69F31
                                              • GetCursorPos.USER32(?), ref: 00D69F3B
                                              • ScreenToClient.USER32(?,?), ref: 00D69F46
                                              • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00D69F7A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Client$CursorLongProcRectScreenWindow
                                              • String ID:
                                              • API String ID: 4127811313-0
                                              • Opcode ID: 23961715fafe6653ea24a29a8b4b706e82df4ffe164a87d6552a3fe6e66f686e
                                              • Instruction ID: 3eb56a9202ee52d8e5d244f6d3709e8cd8e70a646c9b9b2b0e519b6e4aa6e7c2
                                              • Opcode Fuzzy Hash: 23961715fafe6653ea24a29a8b4b706e82df4ffe164a87d6552a3fe6e66f686e
                                              • Instruction Fuzzy Hash: E111333690021AABDB10DFA8C8999FEB7BCEF05311F014455F952E3250D770BA81CBB1
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00CD604C
                                              • GetStockObject.GDI32(00000011), ref: 00CD6060
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00CD606A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CreateMessageObjectSendStockWindow
                                              • String ID:
                                              • API String ID: 3970641297-0
                                              • Opcode ID: 9a71c5a7e4acdaaac1f2ef3a51b436140aafb04c948cc2fdc9128506cf7dbae4
                                              • Instruction ID: e194c6550fee15ed58512ca54566ad96e278639ef67d97da0581e4801c2178b9
                                              • Opcode Fuzzy Hash: 9a71c5a7e4acdaaac1f2ef3a51b436140aafb04c948cc2fdc9128506cf7dbae4
                                              • Instruction Fuzzy Hash: 89115E72501609BFEF129F949C44AEABF69EF19354F040116FA1492210D776AD60DBB4
                                              APIs
                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00CF3B56
                                                • Part of subcall function 00CF3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00CF3AD2
                                                • Part of subcall function 00CF3AA3: ___AdjustPointer.LIBCMT ref: 00CF3AED
                                              • _UnwindNestedFrames.LIBCMT ref: 00CF3B6B
                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00CF3B7C
                                              • CallCatchBlock.LIBVCRUNTIME ref: 00CF3BA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                              • String ID:
                                              • API String ID: 737400349-0
                                              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                              • Instruction ID: 4da12cc2ccbdc4a6091997e954c35795a485c682b1a03e6e359009988dd24ed5
                                              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                              • Instruction Fuzzy Hash: 1001173210018DBBDF525E95CC42EFB3B6AEF88754F044015FE58A6121C632E961ABA1
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00CD13C6,00000000,00000000,?,00D0301A,00CD13C6,00000000,00000000,00000000,?,00D0328B,00000006,FlsSetValue), ref: 00D030A5
                                              • GetLastError.KERNEL32(?,00D0301A,00CD13C6,00000000,00000000,00000000,?,00D0328B,00000006,FlsSetValue,00D72290,FlsSetValue,00000000,00000364,?,00D02E46), ref: 00D030B1
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D0301A,00CD13C6,00000000,00000000,00000000,?,00D0328B,00000006,FlsSetValue,00D72290,FlsSetValue,00000000), ref: 00D030BF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID:
                                              • API String ID: 3177248105-0
                                              • Opcode ID: 9769a7041ff46f088c67c7edb5995efe68e40e9700cd9c4305b0c87bf50750c5
                                              • Instruction ID: 4923dc95b15a03091f2808818ffc6d171b9e89d35aa31ec16aa52eddfa0dfcf6
                                              • Opcode Fuzzy Hash: 9769a7041ff46f088c67c7edb5995efe68e40e9700cd9c4305b0c87bf50750c5
                                              • Instruction Fuzzy Hash: CF01F732712322ABCB314F799C44B677B9CAF05BA1B144620F94DE32C0D721D901C6F0
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00D3747F
                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00D37497
                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00D374AC
                                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00D374CA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Type$Register$FileLoadModuleNameUser
                                              • String ID:
                                              • API String ID: 1352324309-0
                                              • Opcode ID: 1d5313104f6ac29baba825f92d1c19fae028b1dead1ff771edbe4e8df4bc3799
                                              • Instruction ID: 4f10d90fa906e290a1205c9a2488b9e92f475137c8f329b15dcd8340bc5faad5
                                              • Opcode Fuzzy Hash: 1d5313104f6ac29baba825f92d1c19fae028b1dead1ff771edbe4e8df4bc3799
                                              • Instruction Fuzzy Hash: BD1139B5209B15ABE730CF54EC09BA27BF8EB00B04F108569A696D6591DBB0F904DB70
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00D3ACD3,?,00008000), ref: 00D3B0C4
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D3ACD3,?,00008000), ref: 00D3B0E9
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00D3ACD3,?,00008000), ref: 00D3B0F3
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D3ACD3,?,00008000), ref: 00D3B126
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CounterPerformanceQuerySleep
                                              • String ID:
                                              • API String ID: 2875609808-0
                                              • Opcode ID: 07930b4fa046bf81773674d5d33455a11ff0229fbbfbe5301bc46767834b5b12
                                              • Instruction ID: a9cb1cca6fa57fdfb6b9bf0939ee2c20eec17b60019fa14eeaad0035f8c53517
                                              • Opcode Fuzzy Hash: 07930b4fa046bf81773674d5d33455a11ff0229fbbfbe5301bc46767834b5b12
                                              • Instruction Fuzzy Hash: 68113931D0172CE7CF04AFA4E9586FEBB78FF0A761F104086DA81B6285CB7496508B71
                                              APIs
                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D32DC5
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D32DD6
                                              • GetCurrentThreadId.KERNEL32 ref: 00D32DDD
                                              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00D32DE4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                              • String ID:
                                              • API String ID: 2710830443-0
                                              • Opcode ID: 9c1d48513c116d7f69196a85650389d3030a2b7313e12b3a3387d61c780a3b63
                                              • Instruction ID: 07bec687ed804a5ad846b138cf1814b394a7a83c28dd180ca380951245a5482b
                                              • Opcode Fuzzy Hash: 9c1d48513c116d7f69196a85650389d3030a2b7313e12b3a3387d61c780a3b63
                                              • Instruction Fuzzy Hash: A0E06D716123247ADB202BA2EC0DEFB7E6CEF42BA1F041015F106D1190DAE5C840C6F0
                                              APIs
                                                • Part of subcall function 00CE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CE9693
                                                • Part of subcall function 00CE9639: SelectObject.GDI32(?,00000000), ref: 00CE96A2
                                                • Part of subcall function 00CE9639: BeginPath.GDI32(?), ref: 00CE96B9
                                                • Part of subcall function 00CE9639: SelectObject.GDI32(?,00000000), ref: 00CE96E2
                                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00D68887
                                              • LineTo.GDI32(?,?,?), ref: 00D68894
                                              • EndPath.GDI32(?), ref: 00D688A4
                                              • StrokePath.GDI32(?), ref: 00D688B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                              • String ID:
                                              • API String ID: 1539411459-0
                                              • Opcode ID: 4382d014183b5fd0241f41e7e9f305f58cb538305a7492ac3ac7842fe16b75ee
                                              • Instruction ID: 3b091d6bb0bedfb53555c5e62ce6ca87050e56185b877d48ff7f42fe1eb11ab3
                                              • Opcode Fuzzy Hash: 4382d014183b5fd0241f41e7e9f305f58cb538305a7492ac3ac7842fe16b75ee
                                              • Instruction Fuzzy Hash: 47F03A36041358BBDB126F94AC09FDA3F59AF0A350F048100FA61A62E1C7B55511DFF5
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 00CE98CC
                                              • SetTextColor.GDI32(?,?), ref: 00CE98D6
                                              • SetBkMode.GDI32(?,00000001), ref: 00CE98E9
                                              • GetStockObject.GDI32(00000005), ref: 00CE98F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Color$ModeObjectStockText
                                              • String ID:
                                              • API String ID: 4037423528-0
                                              • Opcode ID: 870d354cef05c7722558ce292d236afc42e4ea3b3212dca288303161d1911a72
                                              • Instruction ID: 0fd21cb77a26f018318d4bfa83ab2e86f385133ee9fa109f479bf07955e9ba5d
                                              • Opcode Fuzzy Hash: 870d354cef05c7722558ce292d236afc42e4ea3b3212dca288303161d1911a72
                                              • Instruction Fuzzy Hash: 8CE06531254780AADB215B74FC09BE93F10EB12335F049219F6FA941E1C3B546509B31
                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00D31634
                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00D311D9), ref: 00D3163B
                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00D311D9), ref: 00D31648
                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00D311D9), ref: 00D3164F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CurrentOpenProcessThreadToken
                                              • String ID:
                                              • API String ID: 3974789173-0
                                              • Opcode ID: 45cc28b9b45d7f1f750e3f8f7e7b3f4484e97ecfdd127b14bbf38b2e7794dcc6
                                              • Instruction ID: aa5d1599c445054817f78b8e5ae82ccf2c8b1d282f96eae3bab50d01187d3b49
                                              • Opcode Fuzzy Hash: 45cc28b9b45d7f1f750e3f8f7e7b3f4484e97ecfdd127b14bbf38b2e7794dcc6
                                              • Instruction Fuzzy Hash: 6DE08635611312EBD7301FE19D0DB663B7CAF44791F184808F685C9180D6B44440C774
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00D2D858
                                              • GetDC.USER32(00000000), ref: 00D2D862
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D2D882
                                              • ReleaseDC.USER32(?), ref: 00D2D8A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: f507f26476fbcf715032c2841abf423a108dd335af527bc5e444f09345cb88d0
                                              • Instruction ID: 1eb6b7b747620d8647dca94aa44e5737ced5a6a3e690279290f6e50b73cb8ac5
                                              • Opcode Fuzzy Hash: f507f26476fbcf715032c2841abf423a108dd335af527bc5e444f09345cb88d0
                                              • Instruction Fuzzy Hash: B6E0E5B5810205DFCB419FE1D84866DBBB2EB08310B14A009E88AE7360C7B89901AF64
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00D2D86C
                                              • GetDC.USER32(00000000), ref: 00D2D876
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D2D882
                                              • ReleaseDC.USER32(?), ref: 00D2D8A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: 5882e660fc2af535de82fe6019b0d363d8a124488ad113ac5c8313baad6f0ab3
                                              • Instruction ID: 56e1a5dda37974cce82775fd1cab37e4b16c7bed816f465443494ac70740bd68
                                              • Opcode Fuzzy Hash: 5882e660fc2af535de82fe6019b0d363d8a124488ad113ac5c8313baad6f0ab3
                                              • Instruction Fuzzy Hash: 85E012B1810300EFCB40AFE1D84866DBBB1FB08310B14A009F98AE7360CBB85901AF64
                                              APIs
                                                • Part of subcall function 00CD7620: _wcslen.LIBCMT ref: 00CD7625
                                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00D44ED4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Connection_wcslen
                                              • String ID: *$LPT
                                              • API String ID: 1725874428-3443410124
                                              • Opcode ID: 435e7f45a0a64dd348cd5cba9476dc017bff7a67970b8e00e2cf2a0c34c68f80
                                              • Instruction ID: 441ddd4bc6973fd74b499f0420337d35e87219a32a8d761d6591be2210cc472e
                                              • Opcode Fuzzy Hash: 435e7f45a0a64dd348cd5cba9476dc017bff7a67970b8e00e2cf2a0c34c68f80
                                              • Instruction Fuzzy Hash: A0914E75A002449FDB14DF58C484FAABBF1BF44304F198099E84A9F3A2D735ED89CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: #
                                              • API String ID: 0-1885708031
                                              • Opcode ID: a345423122d1026d0ea34208eee6381f0b11a25ff8a53bf588bcd38bba3fbcfc
                                              • Instruction ID: 4fcb688a9fb7dc3024925840bc34df6b4be6b8d72529e3dd879df9606702135a
                                              • Opcode Fuzzy Hash: a345423122d1026d0ea34208eee6381f0b11a25ff8a53bf588bcd38bba3fbcfc
                                              • Instruction Fuzzy Hash: 345174356043A6DFDF14DF69D0806BA7BA8EF25314F288055E9919B2C0D7349E42DBB0
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 00CEF2A2
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00CEF2BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: GlobalMemorySleepStatus
                                              • String ID: @
                                              • API String ID: 2783356886-2766056989
                                              • Opcode ID: a064e0232bc5944865f5c262edb1ba337579e926c713f565444d6d62bb4b09e3
                                              • Instruction ID: 84c965965f9c1ca647ce67ac0be328ee0329f14b7bc50a9e6edcf4d3223dec70
                                              • Opcode Fuzzy Hash: a064e0232bc5944865f5c262edb1ba337579e926c713f565444d6d62bb4b09e3
                                              • Instruction Fuzzy Hash: A45148714187459BD320AF54DC86BABBBF8FB84300F81885DF2D9812A5EB709529CB66
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00D557E0
                                              • _wcslen.LIBCMT ref: 00D557EC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper_wcslen
                                              • String ID: CALLARGARRAY
                                              • API String ID: 157775604-1150593374
                                              • Opcode ID: 8ff8464c7e709451901f8252e09ef1452c75aedc87bee55b16e2199a40133235
                                              • Instruction ID: 6fb8d6f0e6d0d1b4f2597a62cb6154c8638c737476e8c17ddde08ebdf3396b3e
                                              • Opcode Fuzzy Hash: 8ff8464c7e709451901f8252e09ef1452c75aedc87bee55b16e2199a40133235
                                              • Instruction Fuzzy Hash: E141DE31E002099FCF05DFA9D8918BEBBB5EF59321F14402AE905A7395EB709D85DBB0
                                              APIs
                                              • _wcslen.LIBCMT ref: 00D4D130
                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00D4D13A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CrackInternet_wcslen
                                              • String ID: |
                                              • API String ID: 596671847-2343686810
                                              • Opcode ID: 014a7d9773f131aa2af231b1d265d02026a6fc87c08c7a0e1431828d2f29b349
                                              • Instruction ID: 364045ea769a8fab6acb53698464f22a8ad699a5d73c1fafdeceb974d95d1dc6
                                              • Opcode Fuzzy Hash: 014a7d9773f131aa2af231b1d265d02026a6fc87c08c7a0e1431828d2f29b349
                                              • Instruction Fuzzy Hash: F0311E75D00219ABCF15EFA4CC85EEEBFBAFF04300F10001AF915A6265D731AA56DB60
                                              APIs
                                              • DestroyWindow.USER32(?,?,?,?), ref: 00D63621
                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00D6365C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$DestroyMove
                                              • String ID: static
                                              • API String ID: 2139405536-2160076837
                                              • Opcode ID: 431753dbdc66ef980d03e5ac271e790621cc31721a95e1a8cfdfc8562806b588
                                              • Instruction ID: c1bc7bb7b014af7bf5944500e8dba27d74997123765fd597292fb41da70a7755
                                              • Opcode Fuzzy Hash: 431753dbdc66ef980d03e5ac271e790621cc31721a95e1a8cfdfc8562806b588
                                              • Instruction Fuzzy Hash: 40318A71110204ABDB10DF68DC80ABB73A9FF88724F10961AF9A5D7290DA70AD91D770
                                              APIs
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00D6461F
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D64634
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: '
                                              • API String ID: 3850602802-1997036262
                                              • Opcode ID: 349350499c117814c16edaee0e7de5cddc8ed10b65e8708b090670b3637e3d38
                                              • Instruction ID: c547610b237563cb04be6d4ddf6e13c97b766eaa92dca1abbd308955c1f1b9ff
                                              • Opcode Fuzzy Hash: 349350499c117814c16edaee0e7de5cddc8ed10b65e8708b090670b3637e3d38
                                              • Instruction Fuzzy Hash: E931F774A0131A9FDB14CFA9C991BDA7BB5FF49300F14406AE905AB391D770A941CFA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D6327C
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D63287
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Combobox
                                              • API String ID: 3850602802-2096851135
                                              • Opcode ID: a08a7e1a03f5fd7aaefbb51ebe144e9f4d955d59c91dc201d813f7a42d83cf99
                                              • Instruction ID: 632e63860e3de78a79bafeb13ba9f94fc49809459af0bba76b6bb0febe67370b
                                              • Opcode Fuzzy Hash: a08a7e1a03f5fd7aaefbb51ebe144e9f4d955d59c91dc201d813f7a42d83cf99
                                              • Instruction Fuzzy Hash: 2D11E2713002087FFF21DE94DC90EBB37AAEB983A4F140124FA1897290D6719D518774
                                              APIs
                                                • Part of subcall function 00CD600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00CD604C
                                                • Part of subcall function 00CD600E: GetStockObject.GDI32(00000011), ref: 00CD6060
                                                • Part of subcall function 00CD600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CD606A
                                              • GetWindowRect.USER32(00000000,?), ref: 00D6377A
                                              • GetSysColor.USER32(00000012), ref: 00D63794
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                              • String ID: static
                                              • API String ID: 1983116058-2160076837
                                              • Opcode ID: 859548180a9f91f18b68831a090b47b7c087bf11615c720d2a374047c44301b0
                                              • Instruction ID: a03a2953c835c936560aa2e5873bc42ab16b7759a7a150226423f2b2d215e342
                                              • Opcode Fuzzy Hash: 859548180a9f91f18b68831a090b47b7c087bf11615c720d2a374047c44301b0
                                              • Instruction Fuzzy Hash: 8D1129B2610209AFDB00DFA8CC45AFA7BB8EB09354F005515F996E2250D775E8519B60
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00D4CD7D
                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00D4CDA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Internet$OpenOption
                                              • String ID: <local>
                                              • API String ID: 942729171-4266983199
                                              • Opcode ID: 4ec60c53492baad6f6c3b8a43ec3ce4c1de4f8bcde29f5329a1558279fbea348
                                              • Instruction ID: d9bd506063295789d3010c9102ca013a928611b6a3fdcf0ba83d18bb3a81df60
                                              • Opcode Fuzzy Hash: 4ec60c53492baad6f6c3b8a43ec3ce4c1de4f8bcde29f5329a1558279fbea348
                                              • Instruction Fuzzy Hash: 3F110671A226317BDB784B668C44EF3BE6CEF127A4F005226B14983180D3709841D6F0
                                              APIs
                                              • GetWindowTextLengthW.USER32(00000000), ref: 00D634AB
                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00D634BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LengthMessageSendTextWindow
                                              • String ID: edit
                                              • API String ID: 2978978980-2167791130
                                              • Opcode ID: 1447fd5e0a7df325121ced3289a80348f6cb194e1c143b07871c06b1e85f448b
                                              • Instruction ID: 9ea73b16b1261cfd9341009eaf859a413c650bd07cd9c72599e42c593e5a658f
                                              • Opcode Fuzzy Hash: 1447fd5e0a7df325121ced3289a80348f6cb194e1c143b07871c06b1e85f448b
                                              • Instruction Fuzzy Hash: 71118C71100208AFEB128E64DC84ABB776AEF15374F544324FAA1D32E0CB75EC959B70
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                              • CharUpperBuffW.USER32(?,?,?), ref: 00D36CB6
                                              • _wcslen.LIBCMT ref: 00D36CC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharUpper
                                              • String ID: STOP
                                              • API String ID: 1256254125-2411985666
                                              • Opcode ID: 4e97c6d7c70c2ba0f74fbd9a788e1c144f0f1c70fa6ff696832999f861a413bf
                                              • Instruction ID: 3ee94c2315e25ac17ed3b543ad04321ef223fd27a23a02f367b3cfe9b2a2d424
                                              • Opcode Fuzzy Hash: 4e97c6d7c70c2ba0f74fbd9a788e1c144f0f1c70fa6ff696832999f861a413bf
                                              • Instruction Fuzzy Hash: EC010432610526AACB209FBDEC808BF77B4EB61714F044529E85297295EA31D940C770
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D33CCA
                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00D31D4C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: 8701e831366b05941f993c431f3771066002059fc76c278f8bde186d48ac769f
                                              • Instruction ID: aac6745c57c0865946aa778514356c4669859ab0cde15a17c7574aef6139a3f8
                                              • Opcode Fuzzy Hash: 8701e831366b05941f993c431f3771066002059fc76c278f8bde186d48ac769f
                                              • Instruction Fuzzy Hash: 3601D479701219AB8B08EBA4ED51DFE73A8EB57350F04061AF872673D1EA3099089770
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D33CCA
                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00D31C46
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: 3d93d13f0f20cfd9d8c6bf85505fb0e54ffb28aacc6a7ff8873338ce2b14fcfa
                                              • Instruction ID: eae9d65cd368d374c5c62b9623274f478ba3977188f38bde11998d4d0a505b84
                                              • Opcode Fuzzy Hash: 3d93d13f0f20cfd9d8c6bf85505fb0e54ffb28aacc6a7ff8873338ce2b14fcfa
                                              • Instruction Fuzzy Hash: D501A7797811056ACF04EBA1DE51AFFB7A8DB52340F14102AB556672C1EA609E0CD7B1
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D33CCA
                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00D31CC8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: 7df68bc7c1be11670c8436cc5e088926ea6758cccdc272dd21f51187b3e0c891
                                              • Instruction ID: 1630541ef9184c5124da6394c71fc4dcea3f0f12d265cd9a4871429f21f8e063
                                              • Opcode Fuzzy Hash: 7df68bc7c1be11670c8436cc5e088926ea6758cccdc272dd21f51187b3e0c891
                                              • Instruction Fuzzy Hash: A601D6797811196BCF04EBA1DF01AFEB3A8DB12340F141016B94273381EA709F08D671
                                              APIs
                                                • Part of subcall function 00CD9CB3: _wcslen.LIBCMT ref: 00CD9CBD
                                                • Part of subcall function 00D33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D33CCA
                                              • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00D31DD3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: be1bb09a9532105ad81d047a39edafb33ac271ef5d2a678d20e552e3b8e4c5f3
                                              • Instruction ID: 10a7f416957c8e15ef4746dc412f10e7b4f66426193d8855cb4cfd6200522bfb
                                              • Opcode Fuzzy Hash: be1bb09a9532105ad81d047a39edafb33ac271ef5d2a678d20e552e3b8e4c5f3
                                              • Instruction Fuzzy Hash: E5F0F479B512156ACB04E7A4ED52BFE7368EF02744F040916B962633C1DA70990C9270
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: 3, 3, 16, 1
                                              • API String ID: 176396367-3042988571
                                              • Opcode ID: 3ff879c70b1d1ead67f1a40ce18aee6f413fdb9c96b45ef30c3b97cef8a7c70c
                                              • Instruction ID: 269887c7bcd6e6a4f43eaefae579595cb55adf52d70863b180e88ab8918430a2
                                              • Opcode Fuzzy Hash: 3ff879c70b1d1ead67f1a40ce18aee6f413fdb9c96b45ef30c3b97cef8a7c70c
                                              • Instruction Fuzzy Hash: 2EE06102314320149B751279FCC197F568DCFD5751738182FFE85C2266EAD4CE95A3B1
                                              APIs
                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00D30B23
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Message
                                              • String ID: AutoIt$Error allocating memory.
                                              • API String ID: 2030045667-4017498283
                                              • Opcode ID: 37fcf464982799d86a9bf50236c8d71ccf96d87b1a2554d3f9ed012b1bc66d49
                                              • Instruction ID: 2822323b191f1af77c5a6042137251c88345656e54d0502d4547affd6c181674
                                              • Opcode Fuzzy Hash: 37fcf464982799d86a9bf50236c8d71ccf96d87b1a2554d3f9ed012b1bc66d49
                                              • Instruction Fuzzy Hash: 6FE04F322943587BD3143A957C03F99BA848F05B61F10442BFB98A56C3CAE265906AB9
                                              APIs
                                                • Part of subcall function 00CEF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00CF0D71,?,?,?,00CD100A), ref: 00CEF7CE
                                              • IsDebuggerPresent.KERNEL32(?,?,?,00CD100A), ref: 00CF0D75
                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00CD100A), ref: 00CF0D84
                                              Strings
                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00CF0D7F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                              • API String ID: 55579361-631824599
                                              • Opcode ID: d59e9de8bfae47f2d4b2d63c4148ba573871d9b5ac090d0955cb3b8bacc4e220
                                              • Instruction ID: 40994bea8d6dde3d5579c482572b7323100925ef85246bc19cf3e9b847f6ea0d
                                              • Opcode Fuzzy Hash: d59e9de8bfae47f2d4b2d63c4148ba573871d9b5ac090d0955cb3b8bacc4e220
                                              • Instruction Fuzzy Hash: A3E06D74200B518BD7609FB8E4083667BE4AB04B44F10892DE982C6752DBB1E4448BB2
                                              APIs
                                              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00D4302F
                                              • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00D43044
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: Temp$FileNamePath
                                              • String ID: aut
                                              • API String ID: 3285503233-3010740371
                                              • Opcode ID: 3eade4e0025000d46fb47ef2816a026a17d937fe9dd34dcf263e3296ba6c3ecf
                                              • Instruction ID: 20e28310ca5ee7656eb70a5883ec9921468c1c159aa9db24998ee874415c8994
                                              • Opcode Fuzzy Hash: 3eade4e0025000d46fb47ef2816a026a17d937fe9dd34dcf263e3296ba6c3ecf
                                              • Instruction Fuzzy Hash: 64D05B7150031467DB209794DC0DFD73A6CD705750F000151BA95D2191DAF4D544CBF4
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: LocalTime
                                              • String ID: %.3d$X64
                                              • API String ID: 481472006-1077770165
                                              • Opcode ID: 0e19a95f9febe2d7a827ee95ba1f4fa35a00354b7d3be3e6a57e2b8ecdd2fc0e
                                              • Instruction ID: 9721eb6b6abd6eaf3da3c1fe1cd0f9f7f4129b75045fd96eed082ac09d8c220c
                                              • Opcode Fuzzy Hash: 0e19a95f9febe2d7a827ee95ba1f4fa35a00354b7d3be3e6a57e2b8ecdd2fc0e
                                              • Instruction Fuzzy Hash: 08D01261808128EACB5097E1EC458B9B37DAF28305F608452F846D1040D634C508A775
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D6236C
                                              • PostMessageW.USER32(00000000), ref: 00D62373
                                                • Part of subcall function 00D3E97B: Sleep.KERNEL32 ref: 00D3E9F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 97131fec45bc7463ad9046d9ede583dd160cb72cd0e6d47615fd3c864ec449fd
                                              • Instruction ID: 563269cde97558889a1ab9298c67085006676e5c4fe4fdeb812d0e6d1a8b269f
                                              • Opcode Fuzzy Hash: 97131fec45bc7463ad9046d9ede583dd160cb72cd0e6d47615fd3c864ec449fd
                                              • Instruction Fuzzy Hash: FFD0C9323913107AEA64B7B0EC0FFD66A149B14B10F105916B686EA2E0C9E0A8058B78
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D6232C
                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00D6233F
                                                • Part of subcall function 00D3E97B: Sleep.KERNEL32 ref: 00D3E9F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 46d55e8fd598c1de673b2161e07558a25c71715c62aedb2ce2136c1b2c2398e5
                                              • Instruction ID: 8e8b8ec19529f8a9f8447c9dead6ebb695af6247f6e4a5b115af3abfb436ed9d
                                              • Opcode Fuzzy Hash: 46d55e8fd598c1de673b2161e07558a25c71715c62aedb2ce2136c1b2c2398e5
                                              • Instruction Fuzzy Hash: 80D012363A4310BBEA64B7B0EC0FFD67A149B14B10F105916B786EA2E0C9F0A805CB74
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00D0BE93
                                              • GetLastError.KERNEL32 ref: 00D0BEA1
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D0BEFC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2188179940.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                              • Associated: 00000000.00000002.2188156713.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188238824.0000000000D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188293125.0000000000D9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2188320358.0000000000DA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cd0000_New Order-090125.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorLast
                                              • String ID:
                                              • API String ID: 1717984340-0
                                              • Opcode ID: 582766bcbe5d6587e693be9784ed24b910f8da8a536b3b996874ff13eb425c6a
                                              • Instruction ID: de1343bfde21370ccfd0a8dfa40a43b5e6e2dd73bda727185712dc0761454653
                                              • Opcode Fuzzy Hash: 582766bcbe5d6587e693be9784ed24b910f8da8a536b3b996874ff13eb425c6a
                                              • Instruction Fuzzy Hash: 4341A334609206AFCB218F64CC44BBA7BA5EF42730F18416AFA9D972E1DB318D01DB71