Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new order.exe

Overview

General Information

Sample name:new order.exe
Analysis ID:1591634
MD5:5bd43bca9f37dc01690005a956311211
SHA1:6e3b46e9fa922cea0ed1d02389032a0600f0e4f6
SHA256:3cd37c50b5c492be85099995d20dbeeaa806fd14794317fdea52fb515cda0ba7
Tags:AgentTeslaexeuser-cocaman
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • new order.exe (PID: 5000 cmdline: "C:\Users\user\Desktop\new order.exe" MD5: 5BD43BCA9F37DC01690005A956311211)
    • ageless.exe (PID: 1876 cmdline: "C:\Users\user\Desktop\new order.exe" MD5: 5BD43BCA9F37DC01690005A956311211)
      • RegSvcs.exe (PID: 6504 cmdline: "C:\Users\user\Desktop\new order.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 2272 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ageless.exe (PID: 1896 cmdline: "C:\Users\user\AppData\Local\supergroup\ageless.exe" MD5: 5BD43BCA9F37DC01690005A956311211)
      • RegSvcs.exe (PID: 1412 cmdline: "C:\Users\user\AppData\Local\supergroup\ageless.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.stilbo.eu", "Username": "bogdan.hafner@stilbo.eu", "Password": "StilBO_#1"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33513:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33585:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x3360f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x336a1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x3370b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x3377d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x33813:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x338a3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            2.2.ageless.exe.3e70000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.ageless.exe.3e70000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.ageless.exe.3e70000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x31713:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31785:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3180f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x318a1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3190b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3197d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x31a13:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31aa3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                3.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  3.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , ProcessId: 2272, ProcessName: wscript.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 212.44.102.65, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6504, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , ProcessId: 2272, ProcessName: wscript.exe

                    Data Obfuscation

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\supergroup\ageless.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T08:33:11.193385+010020301711A Network Trojan was detected192.168.2.549705212.44.102.65587TCP
                    2025-01-15T08:34:34.087994+010020301711A Network Trojan was detected192.168.2.549707212.44.102.65587TCP
                    2025-01-15T08:34:35.553033+010020301711A Network Trojan was detected192.168.2.549980212.44.102.65587TCP
                    2025-01-15T08:34:40.254586+010020301711A Network Trojan was detected192.168.2.549981212.44.102.65587TCP
                    2025-01-15T08:34:42.824861+010020301711A Network Trojan was detected192.168.2.549983212.44.102.65587TCP
                    2025-01-15T08:34:45.117347+010020301711A Network Trojan was detected192.168.2.549984212.44.102.65587TCP
                    2025-01-15T08:35:04.902792+010020301711A Network Trojan was detected192.168.2.549985212.44.102.65587TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T08:33:01.032121+010028555421A Network Trojan was detected192.168.2.549705212.44.102.65587TCP
                    2025-01-15T08:33:13.430899+010028555421A Network Trojan was detected192.168.2.549707212.44.102.65587TCP
                    2025-01-15T08:34:35.545429+010028555421A Network Trojan was detected192.168.2.549980212.44.102.65587TCP
                    2025-01-15T08:34:40.247527+010028555421A Network Trojan was detected192.168.2.549981212.44.102.65587TCP
                    2025-01-15T08:34:42.817359+010028555421A Network Trojan was detected192.168.2.549983212.44.102.65587TCP
                    2025-01-15T08:34:45.109477+010028555421A Network Trojan was detected192.168.2.549984212.44.102.65587TCP
                    2025-01-15T08:35:04.885425+010028555421A Network Trojan was detected192.168.2.549985212.44.102.65587TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T08:33:01.032121+010028552451A Network Trojan was detected192.168.2.549705212.44.102.65587TCP
                    2025-01-15T08:33:13.430899+010028552451A Network Trojan was detected192.168.2.549707212.44.102.65587TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T08:33:11.193385+010028400321A Network Trojan was detected192.168.2.549705212.44.102.65587TCP
                    2025-01-15T08:34:34.087994+010028400321A Network Trojan was detected192.168.2.549707212.44.102.65587TCP
                    2025-01-15T08:34:35.553033+010028400321A Network Trojan was detected192.168.2.549980212.44.102.65587TCP
                    2025-01-15T08:34:40.254586+010028400321A Network Trojan was detected192.168.2.549981212.44.102.65587TCP
                    2025-01-15T08:34:42.824861+010028400321A Network Trojan was detected192.168.2.549983212.44.102.65587TCP
                    2025-01-15T08:34:45.117347+010028400321A Network Trojan was detected192.168.2.549984212.44.102.65587TCP
                    2025-01-15T08:35:04.902792+010028400321A Network Trojan was detected192.168.2.549985212.44.102.65587TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: new order.exeAvira: detected
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeAvira: detection malicious, Label: DR/AutoIt.Gen8
                    Source: 2.2.ageless.exe.3e70000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.stilbo.eu", "Username": "bogdan.hafner@stilbo.eu", "Password": "StilBO_#1"}
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeReversingLabs: Detection: 36%
                    Source: new order.exeVirustotal: Detection: 37%Perma Link
                    Source: new order.exeReversingLabs: Detection: 36%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeJoe Sandbox ML: detected
                    Source: new order.exeJoe Sandbox ML: detected
                    Source: new order.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: ageless.exe, 00000002.00000003.2046444659.0000000004160000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000002.00000003.2047136937.0000000004300000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2168707186.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2169169097.0000000003AC0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: ageless.exe, 00000002.00000003.2046444659.0000000004160000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000002.00000003.2047136937.0000000004300000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2168707186.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2169169097.0000000003AC0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0089C2A2 FindFirstFileExW,0_2_0089C2A2
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D68EE FindFirstFileW,FindClose,0_2_008D68EE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_008D698F
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008CD076
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008CD3A9
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008D9642
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008D979D
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_008CDBBE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_008D9B2B
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_008D5C97
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006AC2A2 FindFirstFileExW,2_2_006AC2A2
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E68EE FindFirstFileW,FindClose,2_2_006E68EE
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_006E698F
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_006DD076
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_006DD3A9
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_006E9642
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_006E979D
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_006E9B2B
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_006DDBBE
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E5C97 FindFirstFileW,FindNextFileW,FindClose,2_2_006E5C97
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.5:49707 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.5:49705 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49705 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49707 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49705 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49705 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49707 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49707 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49980 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49983 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49981 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49983 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49983 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49985 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49980 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49980 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49981 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49981 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49985 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49985 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49984 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49984 -> 212.44.102.65:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49984 -> 212.44.102.65:587
                    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 212.44.102.65:587
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewASN Name: DHH-ASSI DHH-ASSI
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 212.44.102.65:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008DCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_008DCE44
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.stilbo.eu
                    Source: RegSvcs.exe, 00000003.00000002.2173742168.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.00000000030A8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002F72000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000003063000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000003168000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002F2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.stilbo.eu
                    Source: RegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: ageless.exe, 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, ageless.exe, 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: ageless.exe, 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, ageless.exe, 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49706 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008DEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_008DEAFF
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008DED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_008DED6A
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_006EED6A
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008DEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_008DEAFF
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_008CAA57
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008F9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_008F9576
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00709576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_00709576

                    System Summary

                    barindex
                    Source: 2.2.ageless.exe.3e70000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.ageless.exe.3e70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.ageless.exe.ce0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.ageless.exe.ce0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: new order.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: new order.exe, 00000000.00000003.2029349367.0000000004351000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d0f02bbe-7
                    Source: new order.exe, 00000000.00000003.2029349367.0000000004351000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bf85b195-a
                    Source: new order.exe, 00000000.00000000.2019814696.0000000000922000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b4a1190c-0
                    Source: new order.exe, 00000000.00000000.2019814696.0000000000922000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0b23530a-1
                    Source: ageless.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: ageless.exe, 00000002.00000000.2029710368.0000000000732000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3399e6be-d
                    Source: ageless.exe, 00000002.00000000.2029710368.0000000000732000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d52aa50f-0
                    Source: ageless.exe, 00000005.00000002.2171726963.0000000000732000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_75f57429-d
                    Source: ageless.exe, 00000005.00000002.2171726963.0000000000732000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_380bb9f7-1
                    Source: new order.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ab4b5a1f-3
                    Source: new order.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_908e3a91-f
                    Source: ageless.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_320feb8f-9
                    Source: ageless.exe.0.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_248fbc52-2
                    Source: initial sampleStatic PE information: Filename: new order.exe
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_008CD5EB
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_008C1201
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_008CE8F6
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_006DE8F6
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D20460_2_008D2046
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008680600_2_00868060
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C82980_2_008C8298
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0089E4FF0_2_0089E4FF
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0089676B0_2_0089676B
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008F48730_2_008F4873
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0088CAA00_2_0088CAA0
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0086CAF00_2_0086CAF0
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0087CC390_2_0087CC39
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00896DD90_2_00896DD9
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008691C00_2_008691C0
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0087B1190_2_0087B119
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008813940_2_00881394
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008817060_2_00881706
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0088781B0_2_0088781B
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008819B00_2_008819B0
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008679200_2_00867920
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0087997D0_2_0087997D
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00887A4A0_2_00887A4A
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00887CA70_2_00887CA7
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00881C770_2_00881C77
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00899EEE0_2_00899EEE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008EBE440_2_008EBE44
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00881F320_2_00881F32
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_01B51F600_2_01B51F60
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006780602_2_00678060
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E20462_2_006E2046
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006D82982_2_006D8298
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006AE4FF2_2_006AE4FF
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006A676B2_2_006A676B
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_007048732_2_00704873
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0067CAF02_2_0067CAF0
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0069CAA02_2_0069CAA0
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0068CC392_2_0068CC39
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006A6DD92_2_006A6DD9
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0068D0652_2_0068D065
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0068B1192_2_0068B119
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006791C02_2_006791C0
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006913942_2_00691394
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006917062_2_00691706
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0069781B2_2_0069781B
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0068997D2_2_0068997D
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006779202_2_00677920
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006919B02_2_006919B0
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00697A4A2_2_00697A4A
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00691C772_2_00691C77
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00697CA72_2_00697CA7
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006FBE442_2_006FBE44
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006A9EEE2_2_006A9EEE
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0067BF402_2_0067BF40
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00691F322_2_00691F32
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_018007802_2_01800780
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0161E4093_2_0161E409
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0161DB183_2_0161DB18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01614A983_2_01614A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01613E803_2_01613E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_016141C83_2_016141C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B466083_2_06B46608
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B47D983_2_06B47D98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B455C83_2_06B455C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B4B24A3_2_06B4B24A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B430803_2_06B43080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B4C1A03_2_06B4C1A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B476B83_2_06B476B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B45CF73_2_06B45CF7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B4E3C03_2_06B4E3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B400403_2_06B40040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06B400063_2_06B40006
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 5_2_0120A3905_2_0120A390
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02DC41C86_2_02DC41C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02DC4A986_2_02DC4A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02DCBB266_2_02DCBB26
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02DCE8096_2_02DCE809
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02DC3E806_2_02DC3E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068266086_2_06826608
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06827D986_2_06827D98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068255C86_2_068255C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0682B2476_2_0682B247
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068230806_2_06823080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0682C1A06_2_0682C1A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068276B86_2_068276B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06825CF76_2_06825CF7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0682E3C06_2_0682E3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068223786_2_06822378
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068200406_2_06820040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_068200076_2_06820007
                    Source: C:\Users\user\Desktop\new order.exeCode function: String function: 0087F9F2 appears 40 times
                    Source: C:\Users\user\Desktop\new order.exeCode function: String function: 00869CB3 appears 31 times
                    Source: C:\Users\user\Desktop\new order.exeCode function: String function: 00880A30 appears 46 times
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: String function: 0068F9F2 appears 40 times
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: String function: 00690A30 appears 46 times
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: String function: 00679CB3 appears 31 times
                    Source: new order.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 2.2.ageless.exe.3e70000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.ageless.exe.3e70000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.ageless.exe.ce0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.ageless.exe.ce0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/3@2/2
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D37B5 GetLastError,FormatMessageW,0_2_008D37B5
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C10BF AdjustTokenPrivileges,CloseHandle,0_2_008C10BF
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_008C16C3
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006D10BF AdjustTokenPrivileges,CloseHandle,2_2_006D10BF
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_006D16C3
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008D51CD
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008EA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_008EA67C
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_008D648E
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008642A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_008642A2
                    Source: C:\Users\user\Desktop\new order.exeFile created: C:\Users\user\AppData\Local\supergroupJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\new order.exeFile created: C:\Users\user\AppData\Local\Temp\deblaterationJump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs"
                    Source: new order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: new order.exeVirustotal: Detection: 37%
                    Source: new order.exeReversingLabs: Detection: 36%
                    Source: C:\Users\user\Desktop\new order.exeFile read: C:\Users\user\Desktop\new order.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\new order.exe "C:\Users\user\Desktop\new order.exe"
                    Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Users\user\AppData\Local\supergroup\ageless.exe "C:\Users\user\Desktop\new order.exe"
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\new order.exe"
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\supergroup\ageless.exe "C:\Users\user\AppData\Local\supergroup\ageless.exe"
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\supergroup\ageless.exe"
                    Source: C:\Users\user\Desktop\new order.exeProcess created: C:\Users\user\AppData\Local\supergroup\ageless.exe "C:\Users\user\Desktop\new order.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\new order.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\supergroup\ageless.exe "C:\Users\user\AppData\Local\supergroup\ageless.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\supergroup\ageless.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: new order.exeStatic file information: File size 1470464 > 1048576
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: new order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: ageless.exe, 00000002.00000003.2046444659.0000000004160000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000002.00000003.2047136937.0000000004300000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2168707186.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2169169097.0000000003AC0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: ageless.exe, 00000002.00000003.2046444659.0000000004160000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000002.00000003.2047136937.0000000004300000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2168707186.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000005.00000003.2169169097.0000000003AC0000.00000004.00001000.00020000.00000000.sdmp
                    Source: new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: new order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008642DE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00880A76 push ecx; ret 0_2_00880A89
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00690A76 push ecx; ret 2_2_00690A89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02DC0C55 push edi; retf 6_2_02DC0C7A
                    Source: C:\Users\user\Desktop\new order.exeFile created: C:\Users\user\AppData\Local\supergroup\ageless.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbsJump to dropped file
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbsJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbsJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0087F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0087F98E
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008F1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_008F1C41
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0068F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_0068F98E
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00701C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_00701C41
                    Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                    Source: C:\Users\user\Desktop\new order.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98138
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeAPI/Special instruction interceptor: Address: 18003A4
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeAPI/Special instruction interceptor: Address: 1209FB4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199577Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199222Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199981Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199434Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199311Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199202Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199092Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198855Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198750Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198637Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198421Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198200Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196780Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196671Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8087Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1752Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4104Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5738Jump to behavior
                    Source: C:\Users\user\Desktop\new order.exeAPI coverage: 3.5 %
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeAPI coverage: 3.7 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0089C2A2 FindFirstFileExW,0_2_0089C2A2
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D68EE FindFirstFileW,FindClose,0_2_008D68EE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_008D698F
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008CD076
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008CD3A9
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008D9642
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008D979D
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_008CDBBE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_008D9B2B
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_008D5C97
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006AC2A2 FindFirstFileExW,2_2_006AC2A2
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E68EE FindFirstFileW,FindClose,2_2_006E68EE
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_006E698F
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_006DD076
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_006DD3A9
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_006E9642
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_006E979D
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_006E9B2B
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_006DDBBE
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006E5C97 FindFirstFileW,FindNextFileW,FindClose,2_2_006E5C97
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008642DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99324Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99216Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98859Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98749Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98640Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98201Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199577Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199222Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99121Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98904Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98654Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98308Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98202Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97761Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199981Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199434Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199311Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199202Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199092Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198855Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198750Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198637Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198421Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198200Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196780Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1196671Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: wscript.exe, 00000004.00000002.2160424316.000002C4DB5D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: wscript.exe, 00000004.00000002.2160424316.000002C4DB5D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: RegSvcs.exe, 00000003.00000002.2177370247.00000000063AA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3292439617.0000000006170000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008DEAA2 BlockInput,0_2_008DEAA2
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00892622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00892622
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008642DE
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00884CE8 mov eax, dword ptr fs:[00000030h]0_2_00884CE8
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_01B50790 mov eax, dword ptr fs:[00000030h]0_2_01B50790
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_01B51DF0 mov eax, dword ptr fs:[00000030h]0_2_01B51DF0
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_01B51E50 mov eax, dword ptr fs:[00000030h]0_2_01B51E50
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00694CE8 mov eax, dword ptr fs:[00000030h]2_2_00694CE8
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_01800610 mov eax, dword ptr fs:[00000030h]2_2_01800610
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_01800670 mov eax, dword ptr fs:[00000030h]2_2_01800670
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_017FEFB0 mov eax, dword ptr fs:[00000030h]2_2_017FEFB0
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 5_2_0120A220 mov eax, dword ptr fs:[00000030h]5_2_0120A220
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 5_2_0120A280 mov eax, dword ptr fs:[00000030h]5_2_0120A280
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 5_2_01208BC0 mov eax, dword ptr fs:[00000030h]5_2_01208BC0
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_008C0B62
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00892622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00892622
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0088083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0088083F
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008809D5 SetUnhandledExceptionFilter,0_2_008809D5
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00880C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00880C21
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_006A2622
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_0069083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0069083F
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006909D5 SetUnhandledExceptionFilter,2_2_006909D5
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_00690C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00690C21
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FE9008Jump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DD6008Jump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_008C1201
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008A2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_008A2BA5
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008CB226 SendInput,keybd_event,0_2_008CB226
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008E22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008E22DA
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\new order.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\supergroup\ageless.exe "C:\Users\user\AppData\Local\supergroup\ageless.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\supergroup\ageless.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_008C0B62
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008C1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_008C1663
                    Source: new order.exe, ageless.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: new order.exe, ageless.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_00880698 cpuid 0_2_00880698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008D8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_008D8195
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008BD27A GetUserNameW,0_2_008BD27A
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_0089B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0089B952
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008642DE
                    Source: C:\Users\user\Desktop\new order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 2.2.ageless.exe.3e70000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.ageless.exe.3e70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.ageless.exe.ce0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.ageless.exe.ce0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.00000000031C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6504, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 1896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1412, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: ageless.exeBinary or memory string: WIN_81
                    Source: ageless.exeBinary or memory string: WIN_XP
                    Source: ageless.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                    Source: ageless.exeBinary or memory string: WIN_XPe
                    Source: ageless.exeBinary or memory string: WIN_VISTA
                    Source: ageless.exeBinary or memory string: WIN_7
                    Source: ageless.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 2.2.ageless.exe.3e70000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.ageless.exe.3e70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.ageless.exe.ce0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.ageless.exe.ce0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6504, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 1896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1412, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 2.2.ageless.exe.3e70000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.ageless.exe.3e70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.ageless.exe.ce0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.ageless.exe.ce0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.00000000031C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2173742168.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.3288783278.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6504, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 1896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1412, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008E1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_008E1204
                    Source: C:\Users\user\Desktop\new order.exeCode function: 0_2_008E1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_008E1806
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_006F1204
                    Source: C:\Users\user\AppData\Local\supergroup\ageless.exeCode function: 2_2_006F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_006F1806
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    111
                    Scripting
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt2
                    Valid Accounts
                    2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    3
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCron2
                    Registry Run Keys / Startup Folder
                    21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets431
                    Security Software Discovery
                    SSH4
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials221
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items221
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591634 Sample: new order.exe Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 30 mail.stilbo.eu 2->30 32 api.ipify.org 2->32 38 Suricata IDS alerts for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 10 other signatures 2->44 8 new order.exe 3 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 26 C:\Users\user\AppData\Local\...\ageless.exe, PE32 8->26 dropped 58 Binary is likely a compiled AutoIt script file 8->58 14 ageless.exe 1 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 18 ageless.exe 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\Roaming\...\ageless.vbs, data 14->28 dropped 62 Antivirus detection for dropped file 14->62 64 Multi AV Scanner detection for dropped file 14->64 66 Binary is likely a compiled AutoIt script file 14->66 72 4 other signatures 14->72 20 RegSvcs.exe 15 2 14->20         started        68 Writes to foreign memory regions 18->68 70 Maps a DLL or memory area into another process 18->70 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 34 mail.stilbo.eu 212.44.102.65, 49705, 49707, 49980 DHH-ASSI Slovenia 20->34 36 api.ipify.org 104.26.13.205, 443, 49704, 49706 CLOUDFLARENETUS United States 20->36 46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 20->46 48 Installs a global keyboard hook 20->48 50 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->50 52 Tries to steal Mail credentials (via file / registry access) 24->52 54 Tries to harvest and steal ftp login credentials 24->54 56 Tries to harvest and steal browser information (history, passwords, etc) 24->56 signatures12

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    new order.exe38%VirustotalBrowse
                    new order.exe37%ReversingLabsWin32.Trojan.Generic
                    new order.exe100%AviraDR/AutoIt.Gen8
                    new order.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\supergroup\ageless.exe100%AviraDR/AutoIt.Gen8
                    C:\Users\user\AppData\Local\supergroup\ageless.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\supergroup\ageless.exe37%ReversingLabsWin32.Trojan.AgentTesla
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.stilbo.eu0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.stilbo.eu
                    212.44.102.65
                    truetrue
                      unknown
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgageless.exe, 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, ageless.exe, 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/ageless.exe, 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, ageless.exe, 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org/tRegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.2173742168.0000000003141000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://mail.stilbo.euRegSvcs.exe, 00000003.00000002.2173742168.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.00000000030A8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002F72000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000003063000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000003168000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.3288783278.0000000002F2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.26.13.205
                                  api.ipify.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  212.44.102.65
                                  mail.stilbo.euSlovenia
                                  43128DHH-ASSItrue
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1591634
                                  Start date and time:2025-01-15 08:32:05 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 44s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:9
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:new order.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.expl.evad.winEXE@10/3@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 47
                                  • Number of non-executed functions: 305
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  02:32:57API Interceptor2277368x Sleep call for process: RegSvcs.exe modified
                                  08:32:58AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  104.26.13.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                  • api.ipify.org/
                                  lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                  • api.ipify.org/
                                  Simple1.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousRDPWrap ToolBrowse
                                  • api.ipify.org/
                                  Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                  • api.ipify.org/
                                  212.44.102.65SMBKT-20242005.exeGet hashmaliciousAgentTeslaBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    api.ipify.orghttps://savory-sweet-felidae-psrnd.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                    • 104.26.12.205
                                    http://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
                                    • 104.26.12.205
                                    Employee_Salary_Update.docxGet hashmaliciousUnknownBrowse
                                    • 104.26.12.205
                                    q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    https://www.explorium.ai/notice-of-processing-for-eu-residents/?email=fabrice.duval@socotec.comGet hashmaliciousUnknownBrowse
                                    • 104.26.12.205
                                    https://www.explorium.ai/notice-of-processing-for-eu-residents/?email=fabrice.duval@socotec.comGet hashmaliciousUnknownBrowse
                                    • 104.26.12.205
                                    VRO.exeGet hashmaliciousUnknownBrowse
                                    • 172.67.74.152
                                    mP8rzGD7fG.dllGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    VRO.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.12.205
                                    mP8rzGD7fG.dllGet hashmaliciousUnknownBrowse
                                    • 172.67.74.152
                                    mail.stilbo.euSMBKT-20242005.exeGet hashmaliciousAgentTeslaBrowse
                                    • 212.44.102.65
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUShttps://qvg.soundestlink.com/ce/c/6783ea8fa36d871b210a875d/678648091eb09f6bc9efe05e/678648224da9c434ec77e1fc?signature=c3a7b24183dde70b3cc2cefa1e1d5f8ff6f1d434aea3b4c4cfdeccd85ad85929Get hashmaliciousUnknownBrowse
                                    • 104.18.42.178
                                    MDE_File_Sample_c404ec52446527b77da6860ca493ea2007ac03d5 (1).zipGet hashmaliciousUnknownBrowse
                                    • 104.16.148.130
                                    https://url.rw/ddj4fGet hashmaliciousUnknownBrowse
                                    • 1.1.1.1
                                    Invdoc80.pdfGet hashmaliciousHTMLPhisherBrowse
                                    • 104.21.18.22
                                    https://padlet.com/prowebsolutions488/new-message-jba6y6w7rg9tzzmnGet hashmaliciousHTMLPhisherBrowse
                                    • 104.22.67.248
                                    rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.96.1
                                    https://androiddatahost.com/sdsd3Get hashmaliciousUnknownBrowse
                                    • 104.21.80.92
                                    Final-Agreement-Document#808977735.pdfGet hashmaliciousHTMLPhisherBrowse
                                    • 188.114.96.3
                                    EXTERNAL Your company's credit limit has changed!.msgGet hashmaliciousUnknownBrowse
                                    • 104.17.25.14
                                    https://tvtsrilanka.com/Agrr/Get hashmaliciousUnknownBrowse
                                    • 104.18.11.207
                                    DHH-ASSINowe zam.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 212.44.112.138
                                    ZAPYTANIE OFERTOWE ST-2024-S315 CPA9170385.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                    • 212.44.112.138
                                    SMBKT-20242005.exeGet hashmaliciousAgentTeslaBrowse
                                    • 212.44.102.65
                                    a5hbkmGD7N.exeGet hashmaliciousPushdoBrowse
                                    • 212.44.102.75
                                    G7DyaA9iz9.exeGet hashmaliciousPushdoBrowse
                                    • 212.44.102.75
                                    x607DB0i08.exeGet hashmaliciousPushdoBrowse
                                    • 212.44.102.75
                                    x7RlIzQDk1.exeGet hashmaliciousUnknownBrowse
                                    • 212.44.102.75
                                    EwK95WVtzI.exeGet hashmaliciousPushdoBrowse
                                    • 212.44.102.75
                                    OWd39WUX3D.exeGet hashmaliciousPushdoBrowse
                                    • 212.44.102.75
                                    demand_rpkb_060923.exeGet hashmaliciousGuLoaderBrowse
                                    • 212.44.101.105
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0erDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.26.13.205
                                    NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                    • 104.26.13.205
                                    542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                                    • 104.26.13.205
                                    https://cc68b94d-d9d0-4a03-bf37-d58a3335e1ce.p.reviewstudio.com/-/en/b/?_encoding=UTF8&_encoding=UTF8&node=3024314031&bbn=16435051&pd_rd_w=VSdHJ&content-id=amzn1.sym.01fcb23a-92a2-4260-b9bf-7c78abf408da&pf_rd_p=01fcb23a-92a2-4260-b9bf-7c78abf408da&pf_rd_r=E0WD16QK99B55VAWSKBQ&pd_rd_wg=EU3Lj&pd_rd_r=fd3510c2-a6e6-4f59-a468-c59aac80bfa9&ref_=pd_hp_d_btf_unkGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    https://ziyahid.github.io/netflix-cloneGet hashmaliciousHTMLPhisherBrowse
                                    • 104.26.13.205
                                    http://pub-35a1d927529e4c9684409537cf8ff63f.r2.dev/docu/e_protocol.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 104.26.13.205
                                    http://emeklilereozeldir.org/Get hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    http://industrious-tomato-ngvkcs.mystrikingly.com/Get hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    http://telegroom-nzj.icu/Get hashmaliciousTelegram PhisherBrowse
                                    • 104.26.13.205
                                    https://cdn.trytraffics.com/rdr/YWE9MzUyODAwODkxJnNlaT0zMDQ3NDU3NCZ0az1JR0doTXJGNXNpVnJBYzZkWlBUWSZ0PTUmYz05MGFzODc2ZmQ4OWFzNWZnOGEwOXM=Get hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    No context
                                    Process:C:\Users\user\Desktop\new order.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):240128
                                    Entropy (8bit):6.644334608566067
                                    Encrypted:false
                                    SSDEEP:6144:qidsQxo1GlyHmwfi2+meiFQRZ5KzsR5mBHy9:qxMo1GOmw62+meiFQeza51
                                    MD5:95C34F5F4091FC2F0D1C1CB30A7EA5FD
                                    SHA1:E5D8DC6D8788321E5A173C14157647EBC603C8E4
                                    SHA-256:A3E00BD87A6FBD1DAD04DE65045996B65F5062D194E926A3189AB8F5141923C0
                                    SHA-512:43CD26FCA2846F33F481A2575A71F2EE2F4F938C230D1CAB34B1BAEC06E7670BA1783EA70591255F3912E0406249301ABCEAC3D033DA146CB0207254A13D0278
                                    Malicious:false
                                    Reputation:low
                                    Preview:z..W:JLDS8ZO..GY.GEW9JLD.8ZOUXGY7GEW9JLDW8ZOUXGY7GEW9JLDW8ZO.XGY9X.Y9.E.v.[..y.1^4e'K%+66Uz,46)6Cg'2.89*wQ4o...yZ(!2.GANs8ZOUXGYg.EWuKOD$..)UXGY7GEW.JNE\9QOU.DY7OEW9JLD..YOUxGY7.FW9J.DW.ZOUZGY3GEW9JLDS8ZOUXGY7GAW9HLDW8ZOWX..7GUW9ZLDW8JOUHGY7GEW)JLDW8ZOUXGY?.FWjJLDW.YO.]GY7GEW9JLDW8ZOUXGY7.FW5JLDW8ZOUXGY7GEW9JLDW8ZOUXGY7GEW9JLDW8ZOUXGY7GEW9JLDW.ZO]XGY7GEW9JLD_.ZO.XGY7GEW9JLDyL?7!XGYS.FW9jLDW.YOUZGY7GEW9JLDW8ZOuXG9.56%ZJLD.=ZOU.DY7AEW9.ODW8ZOUXGY7GEWyJL.yJ?#:;GY;GEW9.ODW:ZOU.DY7GEW9JLDW8ZO.XG.7GEW9JLDW8ZOUXGYw.FW9JLD.8ZOWXBY..GW.{MDT8ZOTXG_7GEW9JLDW8ZOUXGY7GEW9JLDW8ZOUXGY7GEW9JLDW8ZOUXGY*.....z.EdE7_... .T.._..A..Z.R.LS.r.A....r-A.~G.X...^....-.Q2>D.....oXQ>[0...H$.$.....{;..._Y.?..2v.V\k.q...af...K#f...,..T((yX:<(2...3950.E.V9JLD.......^?...ICZc*".....U=....)8ZO1XGYEGEWXJLD.8ZO:XGYYGEWGJLD)8ZO.XGYwGEW.JLDr8ZO8XGY.GEWGJLD.EU@..0D.W9JLDb....5.....`...r&.$.7`...#....I..72."....K..!..@j1Iv..^6AAR;MHG[.T....x5CAR;MHG[.T....x.a....&...".%7GEW9J.DW.ZOU..Y.GEW.J.D.ZOU.Y.G.W...D
                                    Process:C:\Users\user\Desktop\new order.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):1470464
                                    Entropy (8bit):7.328405849363466
                                    Encrypted:false
                                    SSDEEP:24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aQswTAQNpRzgqyHta1lkVPQwOGyUyAc:aTvC/MTQYxsWR7aQVTAQXRjyNVPFByA
                                    MD5:5BD43BCA9F37DC01690005A956311211
                                    SHA1:6E3B46E9FA922CEA0ED1D02389032A0600F0E4F6
                                    SHA-256:3CD37C50B5C492BE85099995D20DBEEAA806FD14794317FDEA52FB515CDA0BA7
                                    SHA-512:BA30E2315DDBD4F3760B315C0B69CB0A09D5BF50B6499CED4D64FB27F185C267D58AEEB50669BB5B335F505447A641B3F06D31F1C2A30D4E54F50FF85D560D21
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 37%
                                    Reputation:low
                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...".g..........".................w.............@..................................^....@...@.......@.....................d...|....@..\....................P...u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...\....@......................@..@.reloc...u...P...v..................@..B........................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Local\supergroup\ageless.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):278
                                    Entropy (8bit):3.3894793254573172
                                    Encrypted:false
                                    SSDEEP:6:DMM8lfm3OOQdUfclo5ZsUEZ+lX1WlQfSMlm6nriIM8lfQVn:DsO+vNlzQ1zakm4mA2n
                                    MD5:B1DB2C1E090A2F744400431A7AA25E09
                                    SHA1:66A25BE70394B332900B56B0015635025FFA40D7
                                    SHA-256:F4A840D1A43F19761E0E61E49B6E35078260652EC68D26F68FC19FF95CE01592
                                    SHA-512:69CCE61ABE895A40D01BEAE4E9657B2017FB79ADBA4F32B2BCEEB1B062ED626C9CCA57FEDF8299622EF9A4B039191F047BB639ED0AFB0BD2AC9A82CDF019297F
                                    Malicious:true
                                    Reputation:low
                                    Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.s.u.p.e.r.g.r.o.u.p.\.a.g.e.l.e.s.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.328405849363466
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:new order.exe
                                    File size:1'470'464 bytes
                                    MD5:5bd43bca9f37dc01690005a956311211
                                    SHA1:6e3b46e9fa922cea0ed1d02389032a0600f0e4f6
                                    SHA256:3cd37c50b5c492be85099995d20dbeeaa806fd14794317fdea52fb515cda0ba7
                                    SHA512:ba30e2315ddbd4f3760b315c0b69cb0a09d5bf50b6499ced4d64fb27f185c267d58aeeb50669bb5b335f505447a641b3f06d31f1c2a30d4e54f50ff85d560d21
                                    SSDEEP:24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aQswTAQNpRzgqyHta1lkVPQwOGyUyAc:aTvC/MTQYxsWR7aQVTAQXRjyNVPFByA
                                    TLSH:D565D0027381C062FF9B92734F9AF6515BBC69260123E62F13A81D79BD701B1563E7A3
                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                    Icon Hash:aaf3e3e3938382a0
                                    Entrypoint:0x420577
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6786F222 [Tue Jan 14 23:24:18 2025 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:1
                                    File Version Major:5
                                    File Version Minor:1
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:1
                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                    Instruction
                                    call 00007F2CE4E84B43h
                                    jmp 00007F2CE4E8444Fh
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    push dword ptr [ebp+08h]
                                    mov esi, ecx
                                    call 00007F2CE4E8462Dh
                                    mov dword ptr [esi], 0049FDF0h
                                    mov eax, esi
                                    pop esi
                                    pop ebp
                                    retn 0004h
                                    and dword ptr [ecx+04h], 00000000h
                                    mov eax, ecx
                                    and dword ptr [ecx+08h], 00000000h
                                    mov dword ptr [ecx+04h], 0049FDF8h
                                    mov dword ptr [ecx], 0049FDF0h
                                    ret
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    push dword ptr [ebp+08h]
                                    mov esi, ecx
                                    call 00007F2CE4E845FAh
                                    mov dword ptr [esi], 0049FE0Ch
                                    mov eax, esi
                                    pop esi
                                    pop ebp
                                    retn 0004h
                                    and dword ptr [ecx+04h], 00000000h
                                    mov eax, ecx
                                    and dword ptr [ecx+08h], 00000000h
                                    mov dword ptr [ecx+04h], 0049FE14h
                                    mov dword ptr [ecx], 0049FE0Ch
                                    ret
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    mov esi, ecx
                                    lea eax, dword ptr [esi+04h]
                                    mov dword ptr [esi], 0049FDD0h
                                    and dword ptr [eax], 00000000h
                                    and dword ptr [eax+04h], 00000000h
                                    push eax
                                    mov eax, dword ptr [ebp+08h]
                                    add eax, 04h
                                    push eax
                                    call 00007F2CE4E871EDh
                                    pop ecx
                                    pop ecx
                                    mov eax, esi
                                    pop esi
                                    pop ebp
                                    retn 0004h
                                    lea eax, dword ptr [ecx+04h]
                                    mov dword ptr [ecx], 0049FDD0h
                                    push eax
                                    call 00007F2CE4E87238h
                                    pop ecx
                                    ret
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    mov esi, ecx
                                    lea eax, dword ptr [esi+04h]
                                    mov dword ptr [esi], 0049FDD0h
                                    push eax
                                    call 00007F2CE4E87221h
                                    test byte ptr [ebp+08h], 00000001h
                                    pop ecx
                                    Programming Language:
                                    • [ C ] VS2008 SP1 build 30729
                                    • [IMP] VS2008 SP1 build 30729
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9045c.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1650000x7594.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0xd40000x9045c0x90600c14af8aefe74d45731c860721417b8dbFalse0.9542495265151515data7.9477422372239905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1650000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                    RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                    RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                    RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                    RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                    RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                    RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                    RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                    RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                    RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                    RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                    RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                    RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                    RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                    RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                    RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                    RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                    RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                    RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                    RT_RCDATA0xdc7b80x87724data1.0003172382964303
                                    RT_GROUP_ICON0x163edc0x76dataEnglishGreat Britain0.6610169491525424
                                    RT_GROUP_ICON0x163f540x14dataEnglishGreat Britain1.25
                                    RT_GROUP_ICON0x163f680x14dataEnglishGreat Britain1.15
                                    RT_GROUP_ICON0x163f7c0x14dataEnglishGreat Britain1.25
                                    RT_VERSION0x163f900xdcdataEnglishGreat Britain0.6181818181818182
                                    RT_MANIFEST0x16406c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                    DLLImport
                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                    PSAPI.DLLGetProcessMemoryInfo
                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                    UxTheme.dllIsThemeActive
                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishGreat Britain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-15T08:33:01.032121+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.549705212.44.102.65587TCP
                                    2025-01-15T08:33:01.032121+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549705212.44.102.65587TCP
                                    2025-01-15T08:33:11.193385+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549705212.44.102.65587TCP
                                    2025-01-15T08:33:11.193385+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549705212.44.102.65587TCP
                                    2025-01-15T08:33:13.430899+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.549707212.44.102.65587TCP
                                    2025-01-15T08:33:13.430899+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549707212.44.102.65587TCP
                                    2025-01-15T08:34:34.087994+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549707212.44.102.65587TCP
                                    2025-01-15T08:34:34.087994+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549707212.44.102.65587TCP
                                    2025-01-15T08:34:35.545429+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549980212.44.102.65587TCP
                                    2025-01-15T08:34:35.553033+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549980212.44.102.65587TCP
                                    2025-01-15T08:34:35.553033+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549980212.44.102.65587TCP
                                    2025-01-15T08:34:40.247527+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549981212.44.102.65587TCP
                                    2025-01-15T08:34:40.254586+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549981212.44.102.65587TCP
                                    2025-01-15T08:34:40.254586+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549981212.44.102.65587TCP
                                    2025-01-15T08:34:42.817359+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549983212.44.102.65587TCP
                                    2025-01-15T08:34:42.824861+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549983212.44.102.65587TCP
                                    2025-01-15T08:34:42.824861+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549983212.44.102.65587TCP
                                    2025-01-15T08:34:45.109477+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549984212.44.102.65587TCP
                                    2025-01-15T08:34:45.117347+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549984212.44.102.65587TCP
                                    2025-01-15T08:34:45.117347+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549984212.44.102.65587TCP
                                    2025-01-15T08:35:04.885425+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549985212.44.102.65587TCP
                                    2025-01-15T08:35:04.902792+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549985212.44.102.65587TCP
                                    2025-01-15T08:35:04.902792+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549985212.44.102.65587TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 08:32:57.643543005 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:57.643582106 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:57.643712044 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:57.649925947 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:57.649940968 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.147171021 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.147332907 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:58.151911020 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:58.151932001 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.152399063 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.199505091 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:58.215536118 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:58.263329983 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.327133894 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.327291012 CET44349704104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:32:58.330332041 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:58.334425926 CET49704443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:32:58.879880905 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:32:58.884747982 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:32:58.884824038 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:32:59.770742893 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:32:59.775098085 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:32:59.780081034 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:32:59.969145060 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:32:59.969991922 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:32:59.974890947 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.164668083 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.165750027 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:00.170558929 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.395963907 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.396251917 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:00.401134014 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.590336084 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.594961882 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:00.600014925 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.837271929 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:00.837507963 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:00.842241049 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.031555891 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.032083035 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:01.032120943 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:01.032145977 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:01.032157898 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:01.036940098 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.036967993 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.037096024 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.037107944 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.402292967 CET58749705212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:01.449678898 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:09.920022011 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:09.920072079 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:09.920362949 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:09.924293041 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:09.924319983 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.388654947 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.389440060 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:10.424954891 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:10.424988031 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.425817013 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.480813026 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:10.604296923 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:10.647334099 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.709028959 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.709115982 CET44349706104.26.13.205192.168.2.5
                                    Jan 15, 2025 08:33:10.709247112 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:10.759826899 CET49706443192.168.2.5104.26.13.205
                                    Jan 15, 2025 08:33:11.193384886 CET49705587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:11.537566900 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:11.542651892 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:11.542803049 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:12.150542974 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.150767088 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:12.155776024 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.348969936 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.349333048 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:12.354147911 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.547652006 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.547972918 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:12.552927017 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.759274960 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.759557962 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:12.764492989 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.957504034 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:12.957735062 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:12.962677002 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.199348927 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.199565887 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:13.204498053 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.398282051 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.430897951 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:13.430898905 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:13.431298971 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:13.431354046 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:33:13.435889959 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.435903072 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.436172962 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.436182022 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.796818018 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:33:13.855796099 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:33.687275887 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:33.687927961 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:33.692286968 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:33.692790985 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:33.692857981 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.087887049 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.087994099 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.088143110 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.088289976 CET49707587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.092865944 CET58749707212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.282912970 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.283090115 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.287939072 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.477765083 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.478240967 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.483228922 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.673193932 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.673408031 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.678438902 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.909265995 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:34.909492016 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:34.914437056 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.103744984 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.103909016 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.108808041 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.346313000 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.346470118 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.351356983 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.540873051 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.545362949 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.545404911 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.545428991 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.545480013 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.547964096 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.550508976 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.550539970 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.550566912 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.550594091 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.550615072 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.552860022 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.552908897 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.552984953 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.553013086 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.553033113 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.553054094 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.553086042 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.553112984 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.553136110 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.553150892 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.553217888 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.553244114 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.553301096 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.555285931 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.555337906 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.555361986 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.555388927 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.555502892 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.555546999 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.558048964 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558108091 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.558188915 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558222055 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558276892 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.558331966 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558358908 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558374882 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.558398962 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.558408976 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558474064 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.558527946 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.560318947 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.560421944 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.560481071 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.560508013 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.560528040 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.560554981 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.563055038 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563111067 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.563265085 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563328028 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.563394070 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563440084 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563441992 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.563469887 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563483000 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.563527107 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563560963 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563607931 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563635111 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.563709974 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565150023 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565176964 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565227032 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565253019 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565304995 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565331936 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565357924 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565407038 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565433025 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565483093 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565510035 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565557957 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565584898 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565633059 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565660000 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565709114 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565735102 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.565768003 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568001986 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568290949 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568317890 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568344116 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568370104 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568434000 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568614006 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568640947 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568671942 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568697929 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568725109 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568773031 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568799973 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568846941 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568872929 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:35.568958044 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:35.573899031 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:36.122112036 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:36.168471098 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:37.983241081 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:37.988312960 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:38.379875898 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:38.379925013 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:38.380022049 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:38.380482912 CET49980587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:38.381521940 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:38.385042906 CET58749980212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:38.386611938 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:38.386854887 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:38.980648041 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:38.982882023 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:38.988013029 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.179361105 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.181355000 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:39.186516047 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.377981901 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.378307104 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:39.383410931 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.589993954 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.590245962 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:39.595361948 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.786629915 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:39.786926985 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:39.792042971 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.048676968 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.048825979 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.053769112 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.245068073 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.247436047 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.247526884 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.247526884 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.247526884 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.249252081 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.252435923 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.252496004 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.252526045 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.252558947 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254290104 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254370928 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254398108 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254447937 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254476070 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254528046 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254554033 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.254585981 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.254717112 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.257270098 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.257297993 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.257467985 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.259526014 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259593964 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.259610891 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259692907 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.259718895 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259746075 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259864092 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259891033 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259917021 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259924889 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.259948015 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.259983063 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.260301113 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.262619019 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.262741089 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.264820099 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.264875889 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.264904976 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265079975 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265108109 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265137911 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265192032 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265197992 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.265219927 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265270948 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265299082 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265366077 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265445948 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265513897 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.265541077 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.267432928 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.267462969 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.267494917 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.267522097 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.267611980 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.269541979 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.269568920 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.269597054 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270216942 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270243883 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270273924 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270306110 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270438910 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270466089 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270520926 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270549059 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270575047 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270601034 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270649910 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270678043 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270704985 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270731926 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270759106 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270787001 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270836115 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270862103 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270889044 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270915985 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270942926 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270970106 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.270998001 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.778105021 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.783334017 CET58749981212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.783431053 CET49981587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.848494053 CET49982587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.853728056 CET58749982212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.853813887 CET49982587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.904495001 CET49982587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.909631968 CET58749982212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.909764051 CET49982587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.964652061 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:40.970932961 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:40.971043110 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:41.569097996 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:41.569533110 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:41.574614048 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:41.766146898 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:41.766511917 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:41.771595955 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:41.970201969 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:41.970623970 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:41.975771904 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.181840897 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.182123899 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.186985016 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.378528118 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.378706932 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.384011984 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.620002031 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.620153904 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.625129938 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.816968918 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.817312002 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.817358017 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.817358971 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.817449093 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.819649935 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.822379112 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.822410107 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.822436094 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.822462082 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.822488070 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.824773073 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.824800014 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.824826956 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.824858904 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.824861050 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.824887037 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.824930906 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.825030088 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.825057030 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.825084925 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.825122118 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.827146053 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.827173948 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.827208996 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.827248096 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.827311039 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.827764034 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.829735994 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.829852104 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.830128908 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.830156088 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.830180883 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.830190897 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.830215931 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.830229044 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.830251932 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.830259085 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.830286026 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.830324888 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.830393076 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.832179070 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.832206011 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.832257986 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.832731962 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.832798958 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.834849119 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.834876060 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.834913015 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.834966898 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.835195065 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835266113 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.835381985 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835416079 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835484982 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835511923 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835546017 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:42.835561991 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835592985 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.835642099 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.836997032 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.837023973 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.837049961 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.837076902 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.837125063 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.837152004 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.837177992 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839755058 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839782953 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839809895 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839838028 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839886904 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839914083 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839940071 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839966059 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.839992046 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840018988 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840069056 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840095997 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840121984 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840147972 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840174913 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840200901 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840226889 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840253115 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840301991 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840327978 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840467930 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840540886 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840567112 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840656996 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840704918 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:42.840730906 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:43.184155941 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:43.189460039 CET58749983212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:43.189646006 CET49983587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:43.246938944 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:43.252022982 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:43.252219915 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:43.843770981 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:43.844062090 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:43.849148989 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.039879084 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.040146112 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:44.045183897 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.236004114 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.236514091 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:44.241581917 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.447627068 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.477844954 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:44.482916117 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.673209906 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.673388004 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:44.678361893 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.913136005 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:44.913387060 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:44.918443918 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.108985901 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.109384060 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.109384060 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.109477043 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.109477043 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.112013102 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.114557028 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.114587069 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.114620924 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.114654064 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.114909887 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.117126942 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117155075 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117202997 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117229939 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117255926 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117347002 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.117438078 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.117453098 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117490053 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.117707968 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.119245052 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.119394064 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.119445086 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.119550943 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.119827986 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.119921923 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.122665882 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122694969 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122723103 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122740984 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.122773886 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122783899 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.122802019 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122827053 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.122832060 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122865915 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.122874022 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.122984886 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.124418020 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.124609947 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.124663115 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.124905109 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.125097036 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.127752066 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.127856970 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.127875090 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.127902985 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.127937078 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.128144026 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:34:45.135152102 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.135729074 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.658047915 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:34:45.699696064 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:02.322015047 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:02.326945066 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:02.729523897 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:02.729578972 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:02.729712009 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:02.729712009 CET49984587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:02.729986906 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:02.734724998 CET58749984212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:02.734910011 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:02.735115051 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:03.486588955 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:03.486717939 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:03.491605997 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:03.694026947 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:03.694206953 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:03.699027061 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:03.888817072 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:03.888983965 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:03.893840075 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.185806036 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.185941935 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.190754890 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.380068064 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.380378962 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.385354996 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.687980890 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.688704014 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.693543911 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.885112047 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.885389090 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.885416031 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.885425091 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.885452986 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.886585951 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.890258074 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.890288115 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.890316010 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.890347958 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.890378952 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.891444921 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.891575098 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.891602039 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.891628027 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.891654015 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.891702890 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.891731977 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.895003080 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.895030022 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.895253897 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.902791977 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.907681942 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.907752991 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.907804012 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.907866001 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.907867908 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.907897949 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.907933950 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.907949924 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.907960892 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.907979012 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.908015966 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.908027887 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.908034086 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.908054113 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.908081055 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.908088923 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.908101082 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.908132076 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.908135891 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.908195972 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.912983894 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913048029 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913053036 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.913079023 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913108110 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.913155079 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.913208008 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913235903 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913270950 CET49985587192.168.2.5212.44.102.65
                                    Jan 15, 2025 08:35:04.913290024 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913315058 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913366079 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913393021 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913424015 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913507938 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913537025 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913564920 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913615942 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913641930 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913669109 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913695097 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913759947 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913786888 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913813114 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913841009 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913866997 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913892984 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913940907 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913968086 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.913994074 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.914020061 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.914046049 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.917979956 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.917990923 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.917996883 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918160915 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918548107 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918857098 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918865919 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918873072 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918937922 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918946028 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.918996096 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.919004917 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.919038057 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.919044971 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:04.919054031 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:05.458961010 CET58749985212.44.102.65192.168.2.5
                                    Jan 15, 2025 08:35:05.512115002 CET49985587192.168.2.5212.44.102.65
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 08:32:57.631337881 CET6536253192.168.2.51.1.1.1
                                    Jan 15, 2025 08:32:57.638628960 CET53653621.1.1.1192.168.2.5
                                    Jan 15, 2025 08:32:58.819552898 CET5284253192.168.2.51.1.1.1
                                    Jan 15, 2025 08:32:58.879283905 CET53528421.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 15, 2025 08:32:57.631337881 CET192.168.2.51.1.1.10xcd78Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                    Jan 15, 2025 08:32:58.819552898 CET192.168.2.51.1.1.10x7d99Standard query (0)mail.stilbo.euA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 15, 2025 08:32:57.638628960 CET1.1.1.1192.168.2.50xcd78No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                    Jan 15, 2025 08:32:57.638628960 CET1.1.1.1192.168.2.50xcd78No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                    Jan 15, 2025 08:32:57.638628960 CET1.1.1.1192.168.2.50xcd78No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                    Jan 15, 2025 08:32:58.879283905 CET1.1.1.1192.168.2.50x7d99No error (0)mail.stilbo.eu212.44.102.65A (IP address)IN (0x0001)false
                                    • api.ipify.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549704104.26.13.2054436504C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 07:32:58 UTC155OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                    Host: api.ipify.org
                                    Connection: Keep-Alive
                                    2025-01-15 07:32:58 UTC424INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 07:32:58 GMT
                                    Content-Type: text/plain
                                    Content-Length: 12
                                    Connection: close
                                    Vary: Origin
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 90242cc828fb43a6-EWR
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1613&min_rtt=1594&rtt_var=611&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1831869&cwnd=193&unsent_bytes=0&cid=2af7b374105db51e&ts=198&x=0"
                                    2025-01-15 07:32:58 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                    Data Ascii: 8.46.123.189


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549706104.26.13.2054431412C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 07:33:10 UTC155OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                    Host: api.ipify.org
                                    Connection: Keep-Alive
                                    2025-01-15 07:33:10 UTC424INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 07:33:10 GMT
                                    Content-Type: text/plain
                                    Content-Length: 12
                                    Connection: close
                                    Vary: Origin
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 90242d159e3e438a-EWR
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1563&rtt_var=620&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1717647&cwnd=210&unsent_bytes=0&cid=a8d411543eebff69&ts=330&x=0"
                                    2025-01-15 07:33:10 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                    Data Ascii: 8.46.123.189


                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    Jan 15, 2025 08:32:59.770742893 CET58749705212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:32:59 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:32:59.775098085 CET49705587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:32:59.969145060 CET58749705212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:32:59.969991922 CET49705587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:33:00.164668083 CET58749705212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:33:00.395963907 CET58749705212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:33:00.396251917 CET49705587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:33:00.590336084 CET58749705212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:33:00.594961882 CET49705587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:33:00.837271929 CET58749705212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:33:00.837507963 CET49705587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:33:01.031555891 CET58749705212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:33:01.032157898 CET49705587192.168.2.5212.44.102.65.
                                    Jan 15, 2025 08:33:01.402292967 CET58749705212.44.102.65192.168.2.5250 OK id=1tXxtc-0008Tv-31
                                    Jan 15, 2025 08:33:12.150542974 CET58749707212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:33:12 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:33:12.150767088 CET49707587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:33:12.348969936 CET58749707212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:33:12.349333048 CET49707587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:33:12.547652006 CET58749707212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:33:12.759274960 CET58749707212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:33:12.759557962 CET49707587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:33:12.957504034 CET58749707212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:33:12.957735062 CET49707587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:33:13.199348927 CET58749707212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:33:13.199565887 CET49707587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:33:13.398282051 CET58749707212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:33:13.431354046 CET49707587192.168.2.5212.44.102.65.
                                    Jan 15, 2025 08:33:13.796818018 CET58749707212.44.102.65192.168.2.5250 OK id=1tXxtp-000073-0y
                                    Jan 15, 2025 08:34:33.687275887 CET49707587192.168.2.5212.44.102.65QUIT
                                    Jan 15, 2025 08:34:34.087887049 CET58749707212.44.102.65192.168.2.5221 rcp-9.controlpanel.si closing connection
                                    Jan 15, 2025 08:34:34.282912970 CET58749980212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:34:34 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:34:34.283090115 CET49980587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:34:34.477765083 CET58749980212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:34:34.478240967 CET49980587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:34:34.673193932 CET58749980212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:34:34.909265995 CET58749980212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:34:34.909492016 CET49980587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:34:35.103744984 CET58749980212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:34:35.103909016 CET49980587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:34:35.346313000 CET58749980212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:34:35.346470118 CET49980587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:34:35.540873051 CET58749980212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:34:35.568958044 CET49980587192.168.2.5212.44.102.65.
                                    Jan 15, 2025 08:34:36.122112036 CET58749980212.44.102.65192.168.2.5250 OK id=1tXxv9-0000Pi-1R
                                    Jan 15, 2025 08:34:37.983241081 CET49980587192.168.2.5212.44.102.65QUIT
                                    Jan 15, 2025 08:34:38.379875898 CET58749980212.44.102.65192.168.2.5221 rcp-9.controlpanel.si closing connection
                                    Jan 15, 2025 08:34:38.980648041 CET58749981212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:34:38 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:34:38.982882023 CET49981587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:34:39.179361105 CET58749981212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:34:39.181355000 CET49981587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:34:39.377981901 CET58749981212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:34:39.589993954 CET58749981212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:34:39.590245962 CET49981587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:34:39.786629915 CET58749981212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:34:39.786926985 CET49981587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:34:40.048676968 CET58749981212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:34:40.048825979 CET49981587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:34:40.245068073 CET58749981212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:34:41.569097996 CET58749983212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:34:41 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:34:41.569533110 CET49983587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:34:41.766146898 CET58749983212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:34:41.766511917 CET49983587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:34:41.970201969 CET58749983212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:34:42.181840897 CET58749983212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:34:42.182123899 CET49983587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:34:42.378528118 CET58749983212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:34:42.378706932 CET49983587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:34:42.620002031 CET58749983212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:34:42.620153904 CET49983587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:34:42.816968918 CET58749983212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:34:43.843770981 CET58749984212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:34:43 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:34:43.844062090 CET49984587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:34:44.039879084 CET58749984212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:34:44.040146112 CET49984587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:34:44.236004114 CET58749984212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:34:44.447627068 CET58749984212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:34:44.477844954 CET49984587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:34:44.673209906 CET58749984212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:34:44.673388004 CET49984587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:34:44.913136005 CET58749984212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:34:44.913387060 CET49984587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:34:45.108985901 CET58749984212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:34:45.658047915 CET58749984212.44.102.65192.168.2.5250 OK id=1tXxvJ-0000R9-03
                                    Jan 15, 2025 08:35:02.322015047 CET49984587192.168.2.5212.44.102.65QUIT
                                    Jan 15, 2025 08:35:02.729523897 CET58749984212.44.102.65192.168.2.5221 rcp-9.controlpanel.si closing connection
                                    Jan 15, 2025 08:35:03.486588955 CET58749985212.44.102.65192.168.2.5220-rcp-9.controlpanel.si ESMTP Exim 4.96.2 #2 Wed, 15 Jan 2025 08:35:03 +0100
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Jan 15, 2025 08:35:03.486717939 CET49985587192.168.2.5212.44.102.65EHLO 701188
                                    Jan 15, 2025 08:35:03.694026947 CET58749985212.44.102.65192.168.2.5250-rcp-9.controlpanel.si Hello 701188 [8.46.123.189]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Jan 15, 2025 08:35:03.694206953 CET49985587192.168.2.5212.44.102.65AUTH login Ym9nZGFuLmhhZm5lckBzdGlsYm8uZXU=
                                    Jan 15, 2025 08:35:03.888817072 CET58749985212.44.102.65192.168.2.5334 UGFzc3dvcmQ6
                                    Jan 15, 2025 08:35:04.185806036 CET58749985212.44.102.65192.168.2.5235 Authentication succeeded
                                    Jan 15, 2025 08:35:04.185941935 CET49985587192.168.2.5212.44.102.65MAIL FROM:<bogdan.hafner@stilbo.eu>
                                    Jan 15, 2025 08:35:04.380068064 CET58749985212.44.102.65192.168.2.5250 OK
                                    Jan 15, 2025 08:35:04.380378962 CET49985587192.168.2.5212.44.102.65RCPT TO:<jinhux31@gmail.com>
                                    Jan 15, 2025 08:35:04.687980890 CET58749985212.44.102.65192.168.2.5250 Accepted
                                    Jan 15, 2025 08:35:04.688704014 CET49985587192.168.2.5212.44.102.65DATA
                                    Jan 15, 2025 08:35:04.885112047 CET58749985212.44.102.65192.168.2.5354 Enter message, ending with "." on a line by itself
                                    Jan 15, 2025 08:35:05.458961010 CET58749985212.44.102.65192.168.2.5250 OK id=1tXxvc-0000XW-2Y

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:02:32:53
                                    Start date:15/01/2025
                                    Path:C:\Users\user\Desktop\new order.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\new order.exe"
                                    Imagebase:0x860000
                                    File size:1'470'464 bytes
                                    MD5 hash:5BD43BCA9F37DC01690005A956311211
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:02:32:54
                                    Start date:15/01/2025
                                    Path:C:\Users\user\AppData\Local\supergroup\ageless.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\new order.exe"
                                    Imagebase:0x670000
                                    File size:1'470'464 bytes
                                    MD5 hash:5BD43BCA9F37DC01690005A956311211
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.2050257230.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 37%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:02:32:55
                                    Start date:15/01/2025
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\new order.exe"
                                    Imagebase:0xdd0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2173742168.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2173742168.00000000031C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2171226692.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2173742168.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:02:33:06
                                    Start date:15/01/2025
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs"
                                    Imagebase:0x7ff613520000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:02:33:07
                                    Start date:15/01/2025
                                    Path:C:\Users\user\AppData\Local\supergroup\ageless.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\supergroup\ageless.exe"
                                    Imagebase:0x670000
                                    File size:1'470'464 bytes
                                    MD5 hash:5BD43BCA9F37DC01690005A956311211
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000005.00000002.2172522191.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:6
                                    Start time:02:33:08
                                    Start date:15/01/2025
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\supergroup\ageless.exe"
                                    Imagebase:0xab0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3288783278.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3288783278.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3288783278.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3288783278.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:2.4%
                                      Dynamic/Decrypted Code Coverage:1.1%
                                      Signature Coverage:3.2%
                                      Total number of Nodes:1654
                                      Total number of Limit Nodes:45
                                      execution_graph 97243 861044 97248 8610f3 97243->97248 97245 86104a 97284 8800a3 29 API calls __onexit 97245->97284 97247 861054 97285 861398 97248->97285 97252 86116a 97295 86a961 97252->97295 97255 86a961 22 API calls 97256 86117e 97255->97256 97257 86a961 22 API calls 97256->97257 97258 861188 97257->97258 97259 86a961 22 API calls 97258->97259 97260 8611c6 97259->97260 97261 86a961 22 API calls 97260->97261 97262 861292 97261->97262 97300 86171c 97262->97300 97266 8612c4 97267 86a961 22 API calls 97266->97267 97268 8612ce 97267->97268 97321 871940 97268->97321 97270 8612f9 97331 861aab 97270->97331 97272 861315 97273 861325 GetStdHandle 97272->97273 97274 86137a 97273->97274 97275 8a2485 97273->97275 97278 861387 OleInitialize 97274->97278 97275->97274 97276 8a248e 97275->97276 97338 87fddb 97276->97338 97278->97245 97279 8a2495 97348 8d011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97279->97348 97281 8a249e 97349 8d0944 CreateThread 97281->97349 97283 8a24aa CloseHandle 97283->97274 97284->97247 97350 8613f1 97285->97350 97288 8613f1 22 API calls 97289 8613d0 97288->97289 97290 86a961 22 API calls 97289->97290 97291 8613dc 97290->97291 97357 866b57 97291->97357 97293 861129 97294 861bc3 6 API calls 97293->97294 97294->97252 97296 87fe0b 22 API calls 97295->97296 97297 86a976 97296->97297 97298 87fddb 22 API calls 97297->97298 97299 861174 97298->97299 97299->97255 97301 86a961 22 API calls 97300->97301 97302 86172c 97301->97302 97303 86a961 22 API calls 97302->97303 97304 861734 97303->97304 97305 86a961 22 API calls 97304->97305 97306 86174f 97305->97306 97307 87fddb 22 API calls 97306->97307 97308 86129c 97307->97308 97309 861b4a 97308->97309 97310 861b58 97309->97310 97311 86a961 22 API calls 97310->97311 97312 861b63 97311->97312 97313 86a961 22 API calls 97312->97313 97314 861b6e 97313->97314 97315 86a961 22 API calls 97314->97315 97316 861b79 97315->97316 97317 86a961 22 API calls 97316->97317 97318 861b84 97317->97318 97319 87fddb 22 API calls 97318->97319 97320 861b96 RegisterWindowMessageW 97319->97320 97320->97266 97322 871981 97321->97322 97328 87195d 97321->97328 97402 880242 5 API calls __Init_thread_wait 97322->97402 97324 87198b 97324->97328 97403 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97324->97403 97326 878727 97330 87196e 97326->97330 97405 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97326->97405 97328->97330 97404 880242 5 API calls __Init_thread_wait 97328->97404 97330->97270 97332 8a272d 97331->97332 97333 861abb 97331->97333 97406 8d3209 23 API calls 97332->97406 97334 87fddb 22 API calls 97333->97334 97336 861ac3 97334->97336 97336->97272 97337 8a2738 97340 87fde0 97338->97340 97339 88ea0c ___std_exception_copy 21 API calls 97339->97340 97340->97339 97341 87fdfa 97340->97341 97343 87fdfc 97340->97343 97407 884ead 7 API calls 2 library calls 97340->97407 97341->97279 97344 88066d 97343->97344 97408 8832a4 RaiseException 97343->97408 97409 8832a4 RaiseException 97344->97409 97347 88068a 97347->97279 97348->97281 97349->97283 97410 8d092a 28 API calls 97349->97410 97351 86a961 22 API calls 97350->97351 97352 8613fc 97351->97352 97353 86a961 22 API calls 97352->97353 97354 861404 97353->97354 97355 86a961 22 API calls 97354->97355 97356 8613c6 97355->97356 97356->97288 97358 866b67 _wcslen 97357->97358 97359 8a4ba1 97357->97359 97362 866ba2 97358->97362 97363 866b7d 97358->97363 97380 8693b2 97359->97380 97361 8a4baa 97361->97361 97365 87fddb 22 API calls 97362->97365 97369 866f34 22 API calls 97363->97369 97367 866bae 97365->97367 97366 866b85 __fread_nolock 97366->97293 97370 87fe0b 97367->97370 97369->97366 97374 87fddb 97370->97374 97372 87fdfa 97372->97366 97374->97372 97376 87fdfc 97374->97376 97384 88ea0c 97374->97384 97391 884ead 7 API calls 2 library calls 97374->97391 97375 88066d 97393 8832a4 RaiseException 97375->97393 97376->97375 97392 8832a4 RaiseException 97376->97392 97379 88068a 97379->97366 97381 8693c0 97380->97381 97382 8693c9 __fread_nolock 97380->97382 97381->97382 97396 86aec9 97381->97396 97382->97361 97382->97382 97389 893820 __dosmaperr 97384->97389 97385 89385e 97395 88f2d9 20 API calls __dosmaperr 97385->97395 97387 893849 RtlAllocateHeap 97388 89385c 97387->97388 97387->97389 97388->97374 97389->97385 97389->97387 97394 884ead 7 API calls 2 library calls 97389->97394 97391->97374 97392->97375 97393->97379 97394->97389 97395->97388 97397 86aedc 97396->97397 97401 86aed9 __fread_nolock 97396->97401 97398 87fddb 22 API calls 97397->97398 97399 86aee7 97398->97399 97400 87fe0b 22 API calls 97399->97400 97400->97401 97401->97382 97402->97324 97403->97328 97404->97326 97405->97330 97406->97337 97407->97340 97408->97344 97409->97347 97411 86dee5 97414 86b710 97411->97414 97415 86b72b 97414->97415 97416 8b00f8 97415->97416 97417 8b0146 97415->97417 97442 86b750 97415->97442 97420 8b0102 97416->97420 97423 8b010f 97416->97423 97416->97442 97480 8e58a2 207 API calls 2 library calls 97417->97480 97478 8e5d33 207 API calls 97420->97478 97439 86ba20 97423->97439 97479 8e61d0 207 API calls 2 library calls 97423->97479 97426 8b03d9 97426->97426 97429 86ba4e 97431 8b0322 97487 8e5c0c 82 API calls 97431->97487 97438 86bbe0 40 API calls 97438->97442 97439->97429 97488 8d359c 82 API calls __wsopen_s 97439->97488 97440 87d336 40 API calls 97440->97442 97442->97429 97442->97431 97442->97438 97442->97439 97442->97440 97445 86ec40 97442->97445 97469 86a81b 41 API calls 97442->97469 97470 87d2f0 40 API calls 97442->97470 97471 87a01b 207 API calls 97442->97471 97472 880242 5 API calls __Init_thread_wait 97442->97472 97473 87edcd 22 API calls 97442->97473 97474 8800a3 29 API calls __onexit 97442->97474 97475 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97442->97475 97476 87ee53 82 API calls 97442->97476 97477 87e5ca 207 API calls 97442->97477 97481 86aceb 23 API calls messages 97442->97481 97482 8bf6bf 23 API calls 97442->97482 97483 86a8c7 97442->97483 97466 86ec76 messages 97445->97466 97446 87fddb 22 API calls 97446->97466 97447 86fef7 97453 86a8c7 22 API calls 97447->97453 97461 86ed9d messages 97447->97461 97450 8b4600 97456 86a8c7 22 API calls 97450->97456 97450->97461 97451 8b4b0b 97492 8d359c 82 API calls __wsopen_s 97451->97492 97453->97461 97455 86a8c7 22 API calls 97455->97466 97456->97461 97458 880242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97458->97466 97459 86fbe3 97459->97461 97462 8b4bdc 97459->97462 97468 86f3ae messages 97459->97468 97460 86a961 22 API calls 97460->97466 97461->97442 97493 8d359c 82 API calls __wsopen_s 97462->97493 97463 8800a3 29 API calls pre_c_initialization 97463->97466 97465 8b4beb 97494 8d359c 82 API calls __wsopen_s 97465->97494 97466->97446 97466->97447 97466->97450 97466->97451 97466->97455 97466->97458 97466->97459 97466->97460 97466->97461 97466->97463 97466->97465 97467 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97466->97467 97466->97468 97489 8701e0 207 API calls 2 library calls 97466->97489 97490 8706a0 41 API calls messages 97466->97490 97467->97466 97468->97461 97491 8d359c 82 API calls __wsopen_s 97468->97491 97469->97442 97470->97442 97471->97442 97472->97442 97473->97442 97474->97442 97475->97442 97476->97442 97477->97442 97478->97423 97479->97439 97480->97442 97481->97442 97482->97442 97484 86a8ea __fread_nolock 97483->97484 97485 86a8db 97483->97485 97484->97442 97485->97484 97486 87fe0b 22 API calls 97485->97486 97486->97484 97487->97439 97488->97426 97489->97466 97490->97466 97491->97461 97492->97461 97493->97465 97494->97461 97495 1b50cd0 97509 1b4e900 97495->97509 97497 1b50da9 97512 1b50bc0 97497->97512 97499 1b50dd2 CreateFileW 97501 1b50e26 97499->97501 97508 1b50e21 97499->97508 97502 1b50e3d VirtualAlloc 97501->97502 97501->97508 97503 1b50e5e ReadFile 97502->97503 97502->97508 97504 1b50e79 97503->97504 97503->97508 97505 1b4f970 12 API calls 97504->97505 97506 1b50e93 97505->97506 97507 1b4fbc0 GetPEB GetPEB 97506->97507 97507->97508 97515 1b51df0 GetPEB 97509->97515 97511 1b4ef8b 97511->97497 97513 1b50bc9 Sleep 97512->97513 97514 1b50bd7 97513->97514 97516 1b51e1a 97515->97516 97516->97511 97517 862de3 97518 862df0 __wsopen_s 97517->97518 97519 8a2c2b ___scrt_fastfail 97518->97519 97520 862e09 97518->97520 97523 8a2c47 GetOpenFileNameW 97519->97523 97533 863aa2 97520->97533 97525 8a2c96 97523->97525 97527 866b57 22 API calls 97525->97527 97528 8a2cab 97527->97528 97528->97528 97530 862e27 97561 8644a8 97530->97561 97591 8a1f50 97533->97591 97536 863ace 97539 866b57 22 API calls 97536->97539 97537 863ae9 97597 86a6c3 97537->97597 97540 863ada 97539->97540 97593 8637a0 97540->97593 97543 862da5 97544 8a1f50 __wsopen_s 97543->97544 97545 862db2 GetLongPathNameW 97544->97545 97546 866b57 22 API calls 97545->97546 97547 862dda 97546->97547 97548 863598 97547->97548 97549 86a961 22 API calls 97548->97549 97550 8635aa 97549->97550 97551 863aa2 23 API calls 97550->97551 97552 8635b5 97551->97552 97553 8a32eb 97552->97553 97554 8635c0 97552->97554 97560 8a330d 97553->97560 97615 87ce60 41 API calls 97553->97615 97603 86515f 97554->97603 97559 8635df 97559->97530 97616 864ecb 97561->97616 97564 8a3833 97638 8d2cf9 97564->97638 97565 864ecb 94 API calls 97567 8644e1 97565->97567 97567->97564 97569 8644e9 97567->97569 97568 8a3848 97570 8a3869 97568->97570 97571 8a384c 97568->97571 97573 8644f5 97569->97573 97574 8a3854 97569->97574 97572 87fe0b 22 API calls 97570->97572 97688 864f39 97571->97688 97590 8a38ae 97572->97590 97687 86940c 136 API calls 2 library calls 97573->97687 97694 8cda5a 82 API calls 97574->97694 97578 862e31 97579 8a3862 97579->97570 97580 8a3a5f 97585 8a3a67 97580->97585 97581 864f39 68 API calls 97581->97585 97585->97581 97696 8c989b 82 API calls __wsopen_s 97585->97696 97587 869cb3 22 API calls 97587->97590 97590->97580 97590->97585 97590->97587 97664 8c967e 97590->97664 97667 8d0b5a 97590->97667 97673 86a4a1 97590->97673 97681 863ff7 97590->97681 97695 8c95ad 42 API calls _wcslen 97590->97695 97592 863aaf GetFullPathNameW 97591->97592 97592->97536 97592->97537 97594 8637ae 97593->97594 97595 8693b2 22 API calls 97594->97595 97596 862e12 97595->97596 97596->97543 97598 86a6d0 97597->97598 97599 86a6dd 97597->97599 97598->97540 97600 87fddb 22 API calls 97599->97600 97601 86a6e7 97600->97601 97602 87fe0b 22 API calls 97601->97602 97602->97598 97604 86516e 97603->97604 97608 86518f __fread_nolock 97603->97608 97607 87fe0b 22 API calls 97604->97607 97605 87fddb 22 API calls 97606 8635cc 97605->97606 97609 8635f3 97606->97609 97607->97608 97608->97605 97610 863605 97609->97610 97614 863624 __fread_nolock 97609->97614 97612 87fe0b 22 API calls 97610->97612 97611 87fddb 22 API calls 97613 86363b 97611->97613 97612->97614 97613->97559 97614->97611 97615->97553 97697 864e90 LoadLibraryA 97616->97697 97621 864ef6 LoadLibraryExW 97705 864e59 LoadLibraryA 97621->97705 97622 8a3ccf 97624 864f39 68 API calls 97622->97624 97626 8a3cd6 97624->97626 97628 864e59 3 API calls 97626->97628 97629 8a3cde 97628->97629 97727 8650f5 97629->97727 97630 864f20 97630->97629 97631 864f2c 97630->97631 97633 864f39 68 API calls 97631->97633 97635 8644cd 97633->97635 97635->97564 97635->97565 97637 8a3d05 97639 8d2d15 97638->97639 97640 86511f 64 API calls 97639->97640 97641 8d2d29 97640->97641 97877 8d2e66 97641->97877 97644 8650f5 40 API calls 97645 8d2d56 97644->97645 97646 8650f5 40 API calls 97645->97646 97647 8d2d66 97646->97647 97648 8650f5 40 API calls 97647->97648 97649 8d2d81 97648->97649 97650 8650f5 40 API calls 97649->97650 97651 8d2d9c 97650->97651 97652 86511f 64 API calls 97651->97652 97653 8d2db3 97652->97653 97654 88ea0c ___std_exception_copy 21 API calls 97653->97654 97655 8d2dba 97654->97655 97656 88ea0c ___std_exception_copy 21 API calls 97655->97656 97657 8d2dc4 97656->97657 97658 8650f5 40 API calls 97657->97658 97659 8d2dd8 97658->97659 97660 8d28fe 27 API calls 97659->97660 97661 8d2dee 97660->97661 97662 8d2d3f 97661->97662 97883 8d22ce 97661->97883 97662->97568 97665 87fe0b 22 API calls 97664->97665 97666 8c96ae __fread_nolock 97665->97666 97666->97590 97668 8d0b65 97667->97668 97669 87fddb 22 API calls 97668->97669 97670 8d0b7c 97669->97670 98043 869cb3 97670->98043 97674 86a4b1 __fread_nolock 97673->97674 97675 86a52b 97673->97675 97676 87fddb 22 API calls 97674->97676 97678 87fe0b 22 API calls 97675->97678 97677 86a4b8 97676->97677 97679 86a4d6 97677->97679 97680 87fddb 22 API calls 97677->97680 97678->97674 97679->97590 97680->97679 97682 86400a 97681->97682 97684 8640ae 97681->97684 97683 87fe0b 22 API calls 97682->97683 97686 86403c 97682->97686 97683->97686 97684->97590 97685 87fddb 22 API calls 97685->97686 97686->97684 97686->97685 97687->97578 97689 864f43 97688->97689 97691 864f4a 97688->97691 97690 88e678 67 API calls 97689->97690 97690->97691 97692 864f6a FreeLibrary 97691->97692 97693 864f59 97691->97693 97692->97693 97693->97574 97694->97579 97695->97590 97696->97585 97698 864ec6 97697->97698 97699 864ea8 GetProcAddress 97697->97699 97702 88e5eb 97698->97702 97700 864eb8 97699->97700 97700->97698 97701 864ebf FreeLibrary 97700->97701 97701->97698 97735 88e52a 97702->97735 97704 864eea 97704->97621 97704->97622 97706 864e6e GetProcAddress 97705->97706 97707 864e8d 97705->97707 97708 864e7e 97706->97708 97710 864f80 97707->97710 97708->97707 97709 864e86 FreeLibrary 97708->97709 97709->97707 97711 87fe0b 22 API calls 97710->97711 97712 864f95 97711->97712 97803 865722 97712->97803 97714 864fa1 __fread_nolock 97715 8650a5 97714->97715 97716 8a3d1d 97714->97716 97721 864fdc 97714->97721 97806 8642a2 CreateStreamOnHGlobal 97715->97806 97817 8d304d 74 API calls 97716->97817 97719 8a3d22 97722 86511f 64 API calls 97719->97722 97720 8650f5 40 API calls 97720->97721 97721->97719 97721->97720 97726 86506e messages 97721->97726 97812 86511f 97721->97812 97723 8a3d45 97722->97723 97724 8650f5 40 API calls 97723->97724 97724->97726 97726->97630 97728 865107 97727->97728 97729 8a3d70 97727->97729 97839 88e8c4 97728->97839 97732 8d28fe 97860 8d274e 97732->97860 97734 8d2919 97734->97637 97738 88e536 __FrameHandler3::FrameUnwindToState 97735->97738 97736 88e544 97760 88f2d9 20 API calls __dosmaperr 97736->97760 97738->97736 97740 88e574 97738->97740 97739 88e549 97761 8927ec 26 API calls __fread_nolock 97739->97761 97742 88e579 97740->97742 97743 88e586 97740->97743 97762 88f2d9 20 API calls __dosmaperr 97742->97762 97752 898061 97743->97752 97746 88e58f 97747 88e5a2 97746->97747 97748 88e595 97746->97748 97764 88e5d4 LeaveCriticalSection __fread_nolock 97747->97764 97763 88f2d9 20 API calls __dosmaperr 97748->97763 97749 88e554 __fread_nolock 97749->97704 97753 89806d __FrameHandler3::FrameUnwindToState 97752->97753 97765 892f5e EnterCriticalSection 97753->97765 97755 89807b 97766 8980fb 97755->97766 97759 8980ac __fread_nolock 97759->97746 97760->97739 97761->97749 97762->97749 97763->97749 97764->97749 97765->97755 97767 89811e 97766->97767 97768 898177 97767->97768 97775 898088 97767->97775 97782 88918d EnterCriticalSection 97767->97782 97783 8891a1 LeaveCriticalSection 97767->97783 97784 894c7d 97768->97784 97773 898189 97773->97775 97797 893405 11 API calls 2 library calls 97773->97797 97779 8980b7 97775->97779 97776 8981a8 97798 88918d EnterCriticalSection 97776->97798 97802 892fa6 LeaveCriticalSection 97779->97802 97781 8980be 97781->97759 97782->97767 97783->97767 97790 894c8a __dosmaperr 97784->97790 97785 894cca 97800 88f2d9 20 API calls __dosmaperr 97785->97800 97786 894cb5 RtlAllocateHeap 97788 894cc8 97786->97788 97786->97790 97791 8929c8 97788->97791 97790->97785 97790->97786 97799 884ead 7 API calls 2 library calls 97790->97799 97792 8929fc __dosmaperr 97791->97792 97793 8929d3 RtlFreeHeap 97791->97793 97792->97773 97793->97792 97794 8929e8 97793->97794 97801 88f2d9 20 API calls __dosmaperr 97794->97801 97796 8929ee GetLastError 97796->97792 97797->97776 97798->97775 97799->97790 97800->97788 97801->97796 97802->97781 97804 87fddb 22 API calls 97803->97804 97805 865734 97804->97805 97805->97714 97807 8642bc FindResourceExW 97806->97807 97811 8642d9 97806->97811 97808 8a35ba LoadResource 97807->97808 97807->97811 97809 8a35cf SizeofResource 97808->97809 97808->97811 97810 8a35e3 LockResource 97809->97810 97809->97811 97810->97811 97811->97721 97813 86512e 97812->97813 97814 8a3d90 97812->97814 97818 88ece3 97813->97818 97817->97719 97821 88eaaa 97818->97821 97820 86513c 97820->97721 97825 88eab6 __FrameHandler3::FrameUnwindToState 97821->97825 97822 88eac2 97834 88f2d9 20 API calls __dosmaperr 97822->97834 97824 88eae8 97836 88918d EnterCriticalSection 97824->97836 97825->97822 97825->97824 97826 88eac7 97835 8927ec 26 API calls __fread_nolock 97826->97835 97829 88eaf4 97837 88ec0a 62 API calls 2 library calls 97829->97837 97831 88eb08 97838 88eb27 LeaveCriticalSection __fread_nolock 97831->97838 97833 88ead2 __fread_nolock 97833->97820 97834->97826 97835->97833 97836->97829 97837->97831 97838->97833 97842 88e8e1 97839->97842 97841 865118 97841->97732 97843 88e8ed __FrameHandler3::FrameUnwindToState 97842->97843 97844 88e92d 97843->97844 97845 88e900 ___scrt_fastfail 97843->97845 97854 88e925 __fread_nolock 97843->97854 97857 88918d EnterCriticalSection 97844->97857 97855 88f2d9 20 API calls __dosmaperr 97845->97855 97848 88e937 97858 88e6f8 38 API calls 3 library calls 97848->97858 97850 88e91a 97856 8927ec 26 API calls __fread_nolock 97850->97856 97851 88e94e 97859 88e96c LeaveCriticalSection __fread_nolock 97851->97859 97854->97841 97855->97850 97856->97854 97857->97848 97858->97851 97859->97854 97863 88e4e8 97860->97863 97862 8d275d 97862->97734 97866 88e469 97863->97866 97865 88e505 97865->97862 97867 88e478 97866->97867 97868 88e48c 97866->97868 97874 88f2d9 20 API calls __dosmaperr 97867->97874 97873 88e488 __alldvrm 97868->97873 97876 89333f 11 API calls 2 library calls 97868->97876 97870 88e47d 97875 8927ec 26 API calls __fread_nolock 97870->97875 97873->97865 97874->97870 97875->97873 97876->97873 97881 8d2e7a 97877->97881 97878 8d28fe 27 API calls 97878->97881 97879 8d2d3b 97879->97644 97879->97662 97880 8650f5 40 API calls 97880->97881 97881->97878 97881->97879 97881->97880 97882 86511f 64 API calls 97881->97882 97882->97881 97884 8d22d9 97883->97884 97885 8d22e7 97883->97885 97886 88e5eb 29 API calls 97884->97886 97887 8d232c 97885->97887 97888 88e5eb 29 API calls 97885->97888 97899 8d22f0 97885->97899 97886->97885 97912 8d2557 40 API calls __fread_nolock 97887->97912 97889 8d2311 97888->97889 97889->97887 97891 8d231a 97889->97891 97891->97899 97920 88e678 97891->97920 97892 8d2370 97893 8d2395 97892->97893 97894 8d2374 97892->97894 97913 8d2171 97893->97913 97897 8d2381 97894->97897 97898 88e678 67 API calls 97894->97898 97897->97899 97901 88e678 67 API calls 97897->97901 97898->97897 97899->97662 97900 8d239d 97902 8d23c3 97900->97902 97903 8d23a3 97900->97903 97901->97899 97933 8d23f3 74 API calls 97902->97933 97905 8d23b0 97903->97905 97906 88e678 67 API calls 97903->97906 97905->97899 97907 88e678 67 API calls 97905->97907 97906->97905 97907->97899 97908 8d23de 97908->97899 97911 88e678 67 API calls 97908->97911 97909 8d23ca 97909->97908 97910 88e678 67 API calls 97909->97910 97910->97908 97911->97899 97912->97892 97914 88ea0c ___std_exception_copy 21 API calls 97913->97914 97915 8d217f 97914->97915 97916 88ea0c ___std_exception_copy 21 API calls 97915->97916 97917 8d2190 97916->97917 97918 88ea0c ___std_exception_copy 21 API calls 97917->97918 97919 8d219c 97918->97919 97919->97900 97921 88e684 __FrameHandler3::FrameUnwindToState 97920->97921 97922 88e6aa 97921->97922 97923 88e695 97921->97923 97932 88e6a5 __fread_nolock 97922->97932 97934 88918d EnterCriticalSection 97922->97934 97951 88f2d9 20 API calls __dosmaperr 97923->97951 97925 88e69a 97952 8927ec 26 API calls __fread_nolock 97925->97952 97928 88e6c6 97935 88e602 97928->97935 97930 88e6d1 97953 88e6ee LeaveCriticalSection __fread_nolock 97930->97953 97932->97899 97933->97909 97934->97928 97936 88e60f 97935->97936 97938 88e624 97935->97938 97986 88f2d9 20 API calls __dosmaperr 97936->97986 97943 88e61f 97938->97943 97954 88dc0b 97938->97954 97939 88e614 97987 8927ec 26 API calls __fread_nolock 97939->97987 97943->97930 97947 88e646 97971 89862f 97947->97971 97950 8929c8 _free 20 API calls 97950->97943 97951->97925 97952->97932 97953->97932 97955 88dc23 97954->97955 97957 88dc1f 97954->97957 97956 88d955 __fread_nolock 26 API calls 97955->97956 97955->97957 97958 88dc43 97956->97958 97960 894d7a 97957->97960 97988 8959be 62 API calls 4 library calls 97958->97988 97961 894d90 97960->97961 97962 88e640 97960->97962 97961->97962 97963 8929c8 _free 20 API calls 97961->97963 97964 88d955 97962->97964 97963->97962 97965 88d961 97964->97965 97966 88d976 97964->97966 97989 88f2d9 20 API calls __dosmaperr 97965->97989 97966->97947 97968 88d966 97990 8927ec 26 API calls __fread_nolock 97968->97990 97970 88d971 97970->97947 97972 89863e 97971->97972 97973 898653 97971->97973 97994 88f2c6 20 API calls __dosmaperr 97972->97994 97974 89868e 97973->97974 97979 89867a 97973->97979 97996 88f2c6 20 API calls __dosmaperr 97974->97996 97976 898643 97995 88f2d9 20 API calls __dosmaperr 97976->97995 97991 898607 97979->97991 97980 898693 97997 88f2d9 20 API calls __dosmaperr 97980->97997 97983 88e64c 97983->97943 97983->97950 97984 89869b 97998 8927ec 26 API calls __fread_nolock 97984->97998 97986->97939 97987->97943 97988->97957 97989->97968 97990->97970 97999 898585 97991->97999 97993 89862b 97993->97983 97994->97976 97995->97983 97996->97980 97997->97984 97998->97983 98000 898591 __FrameHandler3::FrameUnwindToState 97999->98000 98010 895147 EnterCriticalSection 98000->98010 98002 89859f 98003 8985d1 98002->98003 98004 8985c6 98002->98004 98026 88f2d9 20 API calls __dosmaperr 98003->98026 98011 8986ae 98004->98011 98007 8985cc 98027 8985fb LeaveCriticalSection __wsopen_s 98007->98027 98009 8985ee __fread_nolock 98009->97993 98010->98002 98028 8953c4 98011->98028 98013 8986c4 98041 895333 21 API calls 2 library calls 98013->98041 98015 8986be 98015->98013 98017 8953c4 __wsopen_s 26 API calls 98015->98017 98025 8986f6 98015->98025 98016 8953c4 __wsopen_s 26 API calls 98018 898702 CloseHandle 98016->98018 98021 8986ed 98017->98021 98018->98013 98022 89870e GetLastError 98018->98022 98019 89871c 98020 89873e 98019->98020 98042 88f2a3 20 API calls __dosmaperr 98019->98042 98020->98007 98024 8953c4 __wsopen_s 26 API calls 98021->98024 98022->98013 98024->98025 98025->98013 98025->98016 98026->98007 98027->98009 98029 8953d1 98028->98029 98033 8953e6 98028->98033 98030 88f2c6 __dosmaperr 20 API calls 98029->98030 98032 8953d6 98030->98032 98031 88f2c6 __dosmaperr 20 API calls 98034 895416 98031->98034 98035 88f2d9 __dosmaperr 20 API calls 98032->98035 98033->98031 98036 89540b 98033->98036 98037 88f2d9 __dosmaperr 20 API calls 98034->98037 98038 8953de 98035->98038 98036->98015 98039 89541e 98037->98039 98038->98015 98040 8927ec __fread_nolock 26 API calls 98039->98040 98040->98038 98041->98019 98042->98020 98044 869cc2 _wcslen 98043->98044 98045 87fe0b 22 API calls 98044->98045 98046 869cea __fread_nolock 98045->98046 98047 87fddb 22 API calls 98046->98047 98048 869d00 98047->98048 98048->97590 98049 8b3a41 98053 8d10c0 98049->98053 98051 8b3a4c 98052 8d10c0 53 API calls 98051->98052 98052->98051 98054 8d10fa 98053->98054 98058 8d10cd 98053->98058 98054->98051 98055 8d10fc 98097 87fa11 53 API calls 98055->98097 98056 8d1101 98064 867510 98056->98064 98058->98054 98058->98055 98058->98056 98062 8d10f4 98058->98062 98096 86b270 39 API calls 98062->98096 98065 867525 98064->98065 98081 867522 98064->98081 98066 86752d 98065->98066 98067 86755b 98065->98067 98098 8851c6 26 API calls 98066->98098 98070 8a500f 98067->98070 98071 86756d 98067->98071 98077 8a50f6 98067->98077 98080 87fe0b 22 API calls 98070->98080 98082 8a5088 98070->98082 98099 87fb21 51 API calls 98071->98099 98072 8a510e 98072->98072 98075 87fddb 22 API calls 98078 867547 98075->98078 98076 86753d 98076->98075 98101 885183 26 API calls 98077->98101 98079 869cb3 22 API calls 98078->98079 98079->98081 98083 8a5058 98080->98083 98087 866350 98081->98087 98100 87fb21 51 API calls 98082->98100 98084 87fddb 22 API calls 98083->98084 98085 8a507f 98084->98085 98086 869cb3 22 API calls 98085->98086 98086->98082 98088 866362 98087->98088 98089 8a4a51 98087->98089 98102 866373 98088->98102 98112 864a88 22 API calls __fread_nolock 98089->98112 98092 86636e 98092->98054 98093 8a4a5b 98094 8a4a67 98093->98094 98095 86a8c7 22 API calls 98093->98095 98095->98094 98096->98054 98097->98056 98098->98076 98099->98076 98100->98077 98101->98072 98103 8663b6 __fread_nolock 98102->98103 98104 866382 98102->98104 98103->98092 98104->98103 98105 8a4a82 98104->98105 98106 8663a9 98104->98106 98108 87fddb 22 API calls 98105->98108 98113 86a587 98106->98113 98109 8a4a91 98108->98109 98110 87fe0b 22 API calls 98109->98110 98111 8a4ac5 __fread_nolock 98110->98111 98112->98093 98114 86a59d 98113->98114 98117 86a598 __fread_nolock 98113->98117 98115 8af80f 98114->98115 98116 87fe0b 22 API calls 98114->98116 98116->98117 98117->98103 98118 861cad SystemParametersInfoW 98119 8b2a00 98133 86d7b0 messages 98119->98133 98120 86db11 PeekMessageW 98120->98133 98121 86d807 GetInputState 98121->98120 98121->98133 98123 8b1cbe TranslateAcceleratorW 98123->98133 98124 86da04 timeGetTime 98124->98133 98125 86db73 TranslateMessage DispatchMessageW 98126 86db8f PeekMessageW 98125->98126 98126->98133 98127 86dbaf Sleep 98144 86dbc0 98127->98144 98128 8b2b74 Sleep 98128->98144 98129 87e551 timeGetTime 98129->98144 98130 8b1dda timeGetTime 98245 87e300 23 API calls 98130->98245 98133->98120 98133->98121 98133->98123 98133->98124 98133->98125 98133->98126 98133->98127 98133->98128 98133->98130 98140 86d9d5 98133->98140 98147 86ec40 207 API calls 98133->98147 98151 86dd50 98133->98151 98158 86dfd0 98133->98158 98186 871310 98133->98186 98243 86bf40 207 API calls 2 library calls 98133->98243 98244 87edf6 IsDialogMessageW GetClassLongW 98133->98244 98246 8d3a2a 23 API calls 98133->98246 98247 8d359c 82 API calls __wsopen_s 98133->98247 98134 8b2c0b GetExitCodeProcess 98135 8b2c21 WaitForSingleObject 98134->98135 98136 8b2c37 CloseHandle 98134->98136 98135->98133 98135->98136 98136->98144 98137 8b2a31 98137->98140 98138 8f29bf GetForegroundWindow 98138->98144 98141 8b2ca9 Sleep 98141->98133 98144->98129 98144->98133 98144->98134 98144->98137 98144->98138 98144->98140 98144->98141 98248 8e5658 23 API calls 98144->98248 98249 8ce97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98144->98249 98250 8cd4dc 47 API calls 98144->98250 98147->98133 98152 86dd83 98151->98152 98153 86dd6f 98151->98153 98252 8d359c 82 API calls __wsopen_s 98152->98252 98251 86d260 207 API calls 2 library calls 98153->98251 98155 86dd7a 98155->98133 98157 8b2f75 98157->98157 98159 86e010 98158->98159 98160 8b2f7a 98159->98160 98163 86e075 98159->98163 98161 86ec40 207 API calls 98160->98161 98162 8b2f8c 98161->98162 98175 86e0dc messages 98162->98175 98255 8d359c 82 API calls __wsopen_s 98162->98255 98163->98175 98256 880242 5 API calls __Init_thread_wait 98163->98256 98167 8b2fca 98169 86a961 22 API calls 98167->98169 98167->98175 98168 86a961 22 API calls 98168->98175 98170 8b2fe4 98169->98170 98257 8800a3 29 API calls __onexit 98170->98257 98174 8b2fee 98258 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98174->98258 98175->98168 98178 86ec40 207 API calls 98175->98178 98180 86a8c7 22 API calls 98175->98180 98181 86e3e1 98175->98181 98182 8704f0 22 API calls 98175->98182 98183 8d359c 82 API calls 98175->98183 98253 86a81b 41 API calls 98175->98253 98254 87a308 207 API calls 98175->98254 98259 880242 5 API calls __Init_thread_wait 98175->98259 98260 8800a3 29 API calls __onexit 98175->98260 98261 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98175->98261 98262 8e47d4 207 API calls 98175->98262 98263 8e68c1 207 API calls 98175->98263 98178->98175 98180->98175 98181->98133 98182->98175 98183->98175 98187 871376 98186->98187 98188 8717b0 98186->98188 98189 8b6331 98187->98189 98193 871940 9 API calls 98187->98193 98421 880242 5 API calls __Init_thread_wait 98188->98421 98380 8e709c 98189->98380 98191 8717ba 98194 8717fb 98191->98194 98197 869cb3 22 API calls 98191->98197 98196 8713a0 98193->98196 98200 8b6346 98194->98200 98202 87182c 98194->98202 98195 8b633d 98195->98133 98198 871940 9 API calls 98196->98198 98207 8717d4 98197->98207 98199 8713b6 98198->98199 98199->98194 98201 8713ec 98199->98201 98426 8d359c 82 API calls __wsopen_s 98200->98426 98201->98200 98226 871408 __fread_nolock 98201->98226 98423 86aceb 23 API calls messages 98202->98423 98205 871839 98424 87d217 207 API calls 98205->98424 98206 8b6369 98206->98133 98422 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98207->98422 98210 8b636e 98210->98206 98427 8d359c 82 API calls __wsopen_s 98210->98427 98211 87152f 98213 8b63d1 98211->98213 98214 87153c 98211->98214 98429 8e5745 54 API calls _wcslen 98213->98429 98216 871940 9 API calls 98214->98216 98218 871549 98216->98218 98217 87fddb 22 API calls 98217->98226 98221 8b64fa 98218->98221 98223 871940 9 API calls 98218->98223 98219 871872 98219->98189 98425 87faeb 23 API calls 98219->98425 98220 87fe0b 22 API calls 98220->98226 98221->98206 98430 8d359c 82 API calls __wsopen_s 98221->98430 98228 871563 98223->98228 98225 86ec40 207 API calls 98225->98226 98226->98205 98226->98206 98226->98210 98226->98211 98226->98217 98226->98220 98226->98225 98227 8b63b2 98226->98227 98428 8d359c 82 API calls __wsopen_s 98227->98428 98228->98221 98230 86a8c7 22 API calls 98228->98230 98232 8715c7 messages 98228->98232 98230->98232 98231 871940 9 API calls 98231->98232 98232->98206 98232->98219 98232->98221 98232->98231 98235 87167b messages 98232->98235 98264 8d744a 98232->98264 98320 8d83da 98232->98320 98323 8ee204 98232->98323 98359 866246 98232->98359 98363 866216 98232->98363 98368 8e958b 98232->98368 98371 8df0ec 98232->98371 98233 87171d 98233->98133 98235->98233 98420 87ce17 22 API calls messages 98235->98420 98243->98133 98244->98133 98245->98133 98246->98133 98247->98133 98248->98144 98249->98144 98250->98144 98251->98155 98252->98157 98253->98175 98254->98175 98255->98175 98256->98167 98257->98174 98258->98175 98259->98175 98260->98175 98261->98175 98262->98175 98263->98175 98265 8d7469 98264->98265 98266 8d7474 98264->98266 98439 86b567 39 API calls 98265->98439 98270 86a961 22 API calls 98266->98270 98305 8d7554 98266->98305 98268 87fddb 22 API calls 98269 8d7587 98268->98269 98272 87fe0b 22 API calls 98269->98272 98271 8d7495 98270->98271 98273 86a961 22 API calls 98271->98273 98274 8d7598 98272->98274 98275 8d749e 98273->98275 98276 866246 CloseHandle 98274->98276 98277 867510 53 API calls 98275->98277 98278 8d75a3 98276->98278 98279 8d74aa 98277->98279 98280 86a961 22 API calls 98278->98280 98440 86525f 22 API calls 98279->98440 98282 8d75ab 98280->98282 98284 866246 CloseHandle 98282->98284 98283 8d74bf 98285 866350 22 API calls 98283->98285 98286 8d75b2 98284->98286 98287 8d74f2 98285->98287 98288 867510 53 API calls 98286->98288 98289 8d754a 98287->98289 98441 8cd4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 98287->98441 98290 8d75be 98288->98290 98443 86b567 39 API calls 98289->98443 98292 866246 CloseHandle 98290->98292 98293 8d75c8 98292->98293 98431 865745 98293->98431 98295 8d7502 98295->98289 98296 8d7506 98295->98296 98298 869cb3 22 API calls 98296->98298 98300 8d7513 98298->98300 98442 8cd2c1 26 API calls 98300->98442 98301 8d76de GetLastError 98304 8d76f7 98301->98304 98302 8d75ea 98444 8653de 27 API calls messages 98302->98444 98307 866216 CloseHandle 98304->98307 98305->98268 98318 8d76a4 98305->98318 98307->98318 98308 8d751c 98308->98289 98309 8d75f8 98445 8653c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98309->98445 98311 8d7645 98312 87fddb 22 API calls 98311->98312 98314 8d7679 98312->98314 98313 8d75ff 98313->98311 98446 8cccff 98313->98446 98316 86a961 22 API calls 98314->98316 98317 8d7686 98316->98317 98317->98318 98450 8c417d 22 API calls __fread_nolock 98317->98450 98318->98232 98453 8d98e3 98320->98453 98322 8d83ea 98322->98232 98324 86a961 22 API calls 98323->98324 98325 8ee21b 98324->98325 98326 867510 53 API calls 98325->98326 98327 8ee22a 98326->98327 98328 866270 22 API calls 98327->98328 98329 8ee23d 98328->98329 98330 867510 53 API calls 98329->98330 98331 8ee24a 98330->98331 98332 8ee2c7 98331->98332 98333 8ee262 98331->98333 98334 867510 53 API calls 98332->98334 98557 86b567 39 API calls 98333->98557 98336 8ee2cc 98334->98336 98337 8ee2d9 98336->98337 98342 8ee314 98336->98342 98560 869c6e 22 API calls 98337->98560 98338 8ee267 98338->98337 98340 8ee280 98338->98340 98558 866d25 22 API calls __fread_nolock 98340->98558 98341 8ee32c 98343 8ee345 98341->98343 98562 86b567 39 API calls 98341->98562 98342->98341 98561 86b567 39 API calls 98342->98561 98347 86a8c7 22 API calls 98343->98347 98349 8ee35f 98347->98349 98348 8ee28d 98350 866350 22 API calls 98348->98350 98538 8c92c8 98349->98538 98352 8ee29b 98350->98352 98559 866d25 22 API calls __fread_nolock 98352->98559 98354 8ee2b4 98355 866350 22 API calls 98354->98355 98357 8ee2c2 98355->98357 98356 8ee2e6 98356->98232 98563 8662b5 22 API calls 98357->98563 98360 866250 98359->98360 98361 86625f 98359->98361 98360->98232 98361->98360 98362 866264 CloseHandle 98361->98362 98362->98360 98364 866246 CloseHandle 98363->98364 98365 86621e 98364->98365 98366 866246 CloseHandle 98365->98366 98367 86622d messages 98366->98367 98367->98232 98576 8e7f59 98368->98576 98370 8e959b 98370->98232 98372 867510 53 API calls 98371->98372 98373 8df126 98372->98373 98660 869e90 98373->98660 98375 8df136 98376 8df15b 98375->98376 98377 86ec40 207 API calls 98375->98377 98379 8df15f 98376->98379 98688 869c6e 22 API calls 98376->98688 98377->98376 98379->98232 98381 8e70db 98380->98381 98382 8e70f5 98380->98382 98707 8d359c 82 API calls __wsopen_s 98381->98707 98696 8e5689 98382->98696 98386 86ec40 206 API calls 98387 8e7164 98386->98387 98388 8e71ff 98387->98388 98392 8e71a6 98387->98392 98413 8e70ed 98387->98413 98389 8e7205 98388->98389 98390 8e7253 98388->98390 98708 8d1119 22 API calls 98389->98708 98391 867510 53 API calls 98390->98391 98390->98413 98393 8e7265 98391->98393 98395 8d0acc 22 API calls 98392->98395 98396 86aec9 22 API calls 98393->98396 98398 8e71de 98395->98398 98399 8e7289 CharUpperBuffW 98396->98399 98397 8e7228 98709 86a673 22 API calls 98397->98709 98401 871310 206 API calls 98398->98401 98403 8e72a3 98399->98403 98401->98413 98402 8e7230 98710 86bf40 207 API calls 2 library calls 98402->98710 98404 8e72aa 98403->98404 98405 8e72f6 98403->98405 98703 8d0acc 98404->98703 98407 867510 53 API calls 98405->98407 98408 8e72fe 98407->98408 98711 87e300 23 API calls 98408->98711 98412 871310 206 API calls 98412->98413 98413->98195 98414 8e7308 98414->98413 98415 867510 53 API calls 98414->98415 98416 8e7323 98415->98416 98712 86a673 22 API calls 98416->98712 98418 8e7333 98713 86bf40 207 API calls 2 library calls 98418->98713 98420->98235 98421->98191 98422->98194 98423->98205 98424->98219 98425->98219 98426->98206 98427->98206 98428->98206 98429->98228 98430->98206 98432 86575c CreateFileW 98431->98432 98433 8a4035 98431->98433 98434 86577b 98432->98434 98433->98434 98435 8a403b CreateFileW 98433->98435 98434->98301 98434->98302 98435->98434 98436 8a4063 98435->98436 98451 8654c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98436->98451 98438 8a406e 98438->98434 98439->98266 98440->98283 98441->98295 98442->98308 98443->98305 98444->98309 98445->98313 98447 8ccd0e 98446->98447 98448 8ccd19 WriteFile 98446->98448 98452 8ccc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98447->98452 98448->98311 98450->98318 98451->98438 98452->98448 98454 8d99e8 98453->98454 98455 8d9902 98453->98455 98510 8d9caa 39 API calls 98454->98510 98457 87fddb 22 API calls 98455->98457 98458 8d9909 98457->98458 98460 87fe0b 22 API calls 98458->98460 98459 8d99ca 98459->98322 98461 8d991a 98460->98461 98463 866246 CloseHandle 98461->98463 98462 8d9ac5 98504 8d1e96 98462->98504 98465 8d9925 98463->98465 98466 86a961 22 API calls 98465->98466 98469 8d992d 98466->98469 98467 8d9acc 98474 8cccff 4 API calls 98467->98474 98468 8d99a2 98468->98459 98468->98462 98470 8d9a33 98468->98470 98471 866246 CloseHandle 98469->98471 98472 867510 53 API calls 98470->98472 98473 8d9934 98471->98473 98485 8d9a3a 98472->98485 98475 867510 53 API calls 98473->98475 98498 8d9aa8 98474->98498 98478 8d9940 98475->98478 98476 8d9abb 98526 8ccd57 30 API calls 98476->98526 98480 866246 CloseHandle 98478->98480 98479 8d9a6e 98511 866270 98479->98511 98483 8d994a 98480->98483 98482 866246 CloseHandle 98486 8d9b1e 98482->98486 98487 865745 5 API calls 98483->98487 98485->98476 98485->98479 98489 866216 CloseHandle 98486->98489 98490 8d9959 98487->98490 98488 8d9a8e 98516 8633c6 98488->98516 98489->98459 98493 8d995d 98490->98493 98494 8d99c2 98490->98494 98491 86a8c7 22 API calls 98491->98488 98508 8653de 27 API calls messages 98493->98508 98496 866216 CloseHandle 98494->98496 98496->98459 98498->98459 98498->98482 98500 8d996b 98509 8653c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98500->98509 98502 8d9972 98502->98468 98503 8cccff 4 API calls 98502->98503 98503->98468 98505 8d1e9f 98504->98505 98506 8d1ea4 98504->98506 98527 8d0f67 24 API calls __fread_nolock 98505->98527 98506->98467 98508->98500 98509->98502 98510->98468 98512 87fe0b 22 API calls 98511->98512 98513 866295 98512->98513 98514 87fddb 22 API calls 98513->98514 98515 8662a3 98514->98515 98515->98488 98515->98491 98517 8a30bb 98516->98517 98518 8633dd 98516->98518 98520 87fddb 22 API calls 98517->98520 98528 8633ee 98518->98528 98522 8a30c5 _wcslen 98520->98522 98521 8633e8 98525 8ccd57 30 API calls 98521->98525 98523 87fe0b 22 API calls 98522->98523 98524 8a30fe __fread_nolock 98523->98524 98525->98498 98526->98498 98527->98506 98529 8633fe _wcslen 98528->98529 98530 8a311d 98529->98530 98531 863411 98529->98531 98532 87fddb 22 API calls 98530->98532 98533 86a587 22 API calls 98531->98533 98534 8a3127 98532->98534 98535 86341e __fread_nolock 98533->98535 98536 87fe0b 22 API calls 98534->98536 98535->98521 98537 8a3157 __fread_nolock 98536->98537 98539 86a961 22 API calls 98538->98539 98540 8c92de 98539->98540 98541 866270 22 API calls 98540->98541 98542 8c92f2 98541->98542 98548 8c9314 98542->98548 98564 8c8e54 98542->98564 98545 8c8e54 41 API calls 98545->98548 98548->98545 98549 8c93b3 98548->98549 98550 866350 22 API calls 98548->98550 98553 8c9397 98548->98553 98572 866d25 22 API calls __fread_nolock 98548->98572 98551 86a8c7 22 API calls 98549->98551 98552 8c93c2 98549->98552 98550->98548 98551->98552 98552->98357 98573 866d25 22 API calls __fread_nolock 98553->98573 98555 8c93a7 98556 866350 22 API calls 98555->98556 98556->98549 98557->98338 98558->98348 98559->98354 98560->98356 98561->98341 98562->98343 98563->98356 98565 8c8e74 _wcslen 98564->98565 98566 8c8f63 98565->98566 98568 8c8ea9 98565->98568 98570 8c8f68 98565->98570 98566->98548 98571 866d25 22 API calls __fread_nolock 98566->98571 98568->98566 98574 87ce60 41 API calls 98568->98574 98570->98566 98575 87ce60 41 API calls 98570->98575 98571->98548 98572->98548 98573->98555 98574->98568 98575->98570 98577 867510 53 API calls 98576->98577 98578 8e7f90 98577->98578 98599 8e7fd5 messages 98578->98599 98614 8e8cd3 98578->98614 98580 8e8281 98581 8e844f 98580->98581 98586 8e828f 98580->98586 98655 8e8ee4 60 API calls 98581->98655 98584 8e845e 98585 8e846a 98584->98585 98584->98586 98585->98599 98627 8e7e86 98586->98627 98587 867510 53 API calls 98607 8e8049 98587->98607 98592 8e82c8 98642 87fc70 98592->98642 98595 8e82e8 98648 8d359c 82 API calls __wsopen_s 98595->98648 98596 8e8302 98649 8663eb 22 API calls 98596->98649 98599->98370 98600 8e82f3 GetCurrentProcess TerminateProcess 98600->98596 98601 8e8311 98650 866a50 22 API calls 98601->98650 98603 8e832a 98604 8e8352 98603->98604 98651 8704f0 22 API calls 98603->98651 98606 8e84c5 98604->98606 98653 8704f0 22 API calls 98604->98653 98654 86aceb 23 API calls messages 98604->98654 98656 8e8b7b 75 API calls 98604->98656 98606->98599 98611 8e84d9 FreeLibrary 98606->98611 98607->98580 98607->98587 98607->98599 98646 8c417d 22 API calls __fread_nolock 98607->98646 98647 8e851d 42 API calls _strftime 98607->98647 98608 8e8341 98652 8e8b7b 75 API calls 98608->98652 98611->98599 98615 86aec9 22 API calls 98614->98615 98616 8e8cee CharLowerBuffW 98615->98616 98617 8c8e54 41 API calls 98616->98617 98618 8e8d0f 98617->98618 98620 86a961 22 API calls 98618->98620 98625 8e8d48 _wcslen 98618->98625 98621 8e8d2a 98620->98621 98657 866d25 22 API calls __fread_nolock 98621->98657 98623 8e8d3e 98624 8693b2 22 API calls 98623->98624 98624->98625 98626 8e8e5e _wcslen 98625->98626 98658 8e851d 42 API calls _strftime 98625->98658 98626->98607 98628 8e7ea1 98627->98628 98632 8e7eec 98627->98632 98629 87fe0b 22 API calls 98628->98629 98630 8e7ec3 98629->98630 98631 87fddb 22 API calls 98630->98631 98630->98632 98631->98630 98633 8e9096 98632->98633 98634 8e92ab messages 98633->98634 98638 8e90ba _strcat _wcslen 98633->98638 98634->98592 98635 86b38f 39 API calls 98635->98638 98636 86b567 39 API calls 98636->98638 98637 86b6b5 39 API calls 98637->98638 98638->98634 98638->98635 98638->98636 98638->98637 98639 867510 53 API calls 98638->98639 98640 88ea0c 21 API calls ___std_exception_copy 98638->98640 98659 8cefae 24 API calls _wcslen 98638->98659 98639->98638 98640->98638 98644 87fc85 98642->98644 98643 87fd1d VirtualProtect 98645 87fceb 98643->98645 98644->98643 98644->98645 98645->98595 98645->98596 98646->98607 98647->98607 98648->98600 98649->98601 98650->98603 98651->98608 98652->98604 98653->98604 98654->98604 98655->98584 98656->98604 98657->98623 98658->98626 98659->98638 98661 866270 22 API calls 98660->98661 98666 869eb5 98661->98666 98662 869fd2 98663 86a4a1 22 API calls 98662->98663 98664 869fec 98663->98664 98664->98375 98666->98662 98668 86a6c3 22 API calls 98666->98668 98669 86a12c __fread_nolock 98666->98669 98670 8af7c4 98666->98670 98671 8af699 98666->98671 98680 86a405 98666->98680 98683 86a587 22 API calls 98666->98683 98684 86a4a1 22 API calls 98666->98684 98685 86aec9 22 API calls 98666->98685 98689 864573 41 API calls _wcslen 98666->98689 98691 8648c8 23 API calls 98666->98691 98692 8649bd 22 API calls __fread_nolock 98666->98692 98693 86a673 22 API calls 98666->98693 98668->98666 98669->98670 98669->98680 98694 8c96e2 84 API calls __wsopen_s 98670->98694 98676 87fddb 22 API calls 98671->98676 98674 8af7d2 98677 86a4a1 22 API calls 98674->98677 98678 8af754 98676->98678 98679 8af7e8 98677->98679 98681 87fe0b 22 API calls 98678->98681 98679->98664 98680->98664 98695 8c96e2 84 API calls __wsopen_s 98680->98695 98681->98669 98683->98666 98684->98666 98686 86a0db CharUpperBuffW 98685->98686 98690 86a673 22 API calls 98686->98690 98688->98379 98689->98666 98690->98666 98691->98666 98692->98666 98693->98666 98694->98674 98695->98664 98697 8e56a4 98696->98697 98698 8e56f2 98696->98698 98699 87fe0b 22 API calls 98697->98699 98698->98386 98701 8e56c6 98699->98701 98700 87fddb 22 API calls 98700->98701 98701->98698 98701->98700 98714 8d0a59 22 API calls 98701->98714 98704 8d0ada 98703->98704 98706 8d0b13 98703->98706 98705 87fddb 22 API calls 98704->98705 98704->98706 98705->98706 98706->98412 98707->98413 98708->98397 98709->98402 98710->98413 98711->98414 98712->98418 98713->98413 98714->98701 98715 898402 98720 8981be 98715->98720 98718 89842a 98725 8981ef try_get_first_available_module 98720->98725 98722 8983ee 98739 8927ec 26 API calls __fread_nolock 98722->98739 98724 898343 98724->98718 98732 8a0984 98724->98732 98728 898338 98725->98728 98735 888e0b 40 API calls 2 library calls 98725->98735 98727 89838c 98727->98728 98736 888e0b 40 API calls 2 library calls 98727->98736 98728->98724 98738 88f2d9 20 API calls __dosmaperr 98728->98738 98730 8983ab 98730->98728 98737 888e0b 40 API calls 2 library calls 98730->98737 98740 8a0081 98732->98740 98734 8a099f 98734->98718 98735->98727 98736->98730 98737->98728 98738->98722 98739->98724 98742 8a008d __FrameHandler3::FrameUnwindToState 98740->98742 98741 8a009b 98798 88f2d9 20 API calls __dosmaperr 98741->98798 98742->98741 98745 8a00d4 98742->98745 98744 8a00a0 98799 8927ec 26 API calls __fread_nolock 98744->98799 98751 8a065b 98745->98751 98750 8a00aa __fread_nolock 98750->98734 98801 8a042f 98751->98801 98754 8a068d 98833 88f2c6 20 API calls __dosmaperr 98754->98833 98755 8a06a6 98819 895221 98755->98819 98758 8a0692 98834 88f2d9 20 API calls __dosmaperr 98758->98834 98759 8a06ab 98760 8a06cb 98759->98760 98761 8a06b4 98759->98761 98832 8a039a CreateFileW 98760->98832 98835 88f2c6 20 API calls __dosmaperr 98761->98835 98765 8a06b9 98836 88f2d9 20 API calls __dosmaperr 98765->98836 98766 8a0781 GetFileType 98769 8a078c GetLastError 98766->98769 98770 8a07d3 98766->98770 98768 8a0756 GetLastError 98838 88f2a3 20 API calls __dosmaperr 98768->98838 98839 88f2a3 20 API calls __dosmaperr 98769->98839 98841 89516a 21 API calls 2 library calls 98770->98841 98771 8a0704 98771->98766 98771->98768 98837 8a039a CreateFileW 98771->98837 98775 8a079a CloseHandle 98775->98758 98778 8a07c3 98775->98778 98777 8a0749 98777->98766 98777->98768 98840 88f2d9 20 API calls __dosmaperr 98778->98840 98780 8a07f4 98781 8a0840 98780->98781 98842 8a05ab 72 API calls 3 library calls 98780->98842 98786 8a086d 98781->98786 98843 8a014d 72 API calls 4 library calls 98781->98843 98782 8a07c8 98782->98758 98785 8a0866 98785->98786 98787 8a087e 98785->98787 98788 8986ae __wsopen_s 29 API calls 98786->98788 98789 8a00f8 98787->98789 98790 8a08fc CloseHandle 98787->98790 98788->98789 98800 8a0121 LeaveCriticalSection __wsopen_s 98789->98800 98844 8a039a CreateFileW 98790->98844 98792 8a0927 98793 8a095d 98792->98793 98794 8a0931 GetLastError 98792->98794 98793->98789 98845 88f2a3 20 API calls __dosmaperr 98794->98845 98796 8a093d 98846 895333 21 API calls 2 library calls 98796->98846 98798->98744 98799->98750 98800->98750 98802 8a0450 98801->98802 98807 8a046a 98801->98807 98802->98807 98854 88f2d9 20 API calls __dosmaperr 98802->98854 98805 8a045f 98855 8927ec 26 API calls __fread_nolock 98805->98855 98847 8a03bf 98807->98847 98808 8a04a2 98809 8a04d1 98808->98809 98856 88f2d9 20 API calls __dosmaperr 98808->98856 98817 8a0524 98809->98817 98858 88d70d 26 API calls 2 library calls 98809->98858 98812 8a051f 98814 8a059e 98812->98814 98812->98817 98813 8a04c6 98857 8927ec 26 API calls __fread_nolock 98813->98857 98859 8927fc 11 API calls _abort 98814->98859 98817->98754 98817->98755 98818 8a05aa 98820 89522d __FrameHandler3::FrameUnwindToState 98819->98820 98862 892f5e EnterCriticalSection 98820->98862 98823 895259 98866 895000 98823->98866 98826 8952a4 __fread_nolock 98826->98759 98827 895234 98827->98823 98828 8952c7 EnterCriticalSection 98827->98828 98830 89527b 98827->98830 98828->98830 98831 8952d4 LeaveCriticalSection 98828->98831 98863 89532a 98830->98863 98831->98827 98832->98771 98833->98758 98834->98789 98835->98765 98836->98758 98837->98777 98838->98758 98839->98775 98840->98782 98841->98780 98842->98781 98843->98785 98844->98792 98845->98796 98846->98793 98850 8a03d7 98847->98850 98848 8a03f2 98848->98808 98850->98848 98860 88f2d9 20 API calls __dosmaperr 98850->98860 98851 8a0416 98861 8927ec 26 API calls __fread_nolock 98851->98861 98853 8a0421 98853->98808 98854->98805 98855->98807 98856->98813 98857->98809 98858->98812 98859->98818 98860->98851 98861->98853 98862->98827 98874 892fa6 LeaveCriticalSection 98863->98874 98865 895331 98865->98826 98867 894c7d __dosmaperr 20 API calls 98866->98867 98869 895012 98867->98869 98868 89501f 98870 8929c8 _free 20 API calls 98868->98870 98869->98868 98875 893405 11 API calls 2 library calls 98869->98875 98872 895071 98870->98872 98872->98830 98873 895147 EnterCriticalSection 98872->98873 98873->98830 98874->98865 98875->98869 98876 8a2ba5 98877 862b25 98876->98877 98878 8a2baf 98876->98878 98904 862b83 7 API calls 98877->98904 98919 863a5a 98878->98919 98882 8a2bb8 98884 869cb3 22 API calls 98882->98884 98886 8a2bc6 98884->98886 98885 862b2f 98896 862b44 98885->98896 98908 863837 98885->98908 98887 8a2bce 98886->98887 98888 8a2bf5 98886->98888 98890 8633c6 22 API calls 98887->98890 98891 8633c6 22 API calls 98888->98891 98892 8a2bd9 98890->98892 98893 8a2bf1 GetForegroundWindow ShellExecuteW 98891->98893 98897 866350 22 API calls 98892->98897 98898 8a2c26 98893->98898 98895 862b5f 98902 862b66 SetCurrentDirectoryW 98895->98902 98896->98895 98918 8630f2 Shell_NotifyIconW ___scrt_fastfail 98896->98918 98900 8a2be7 98897->98900 98898->98895 98901 8633c6 22 API calls 98900->98901 98901->98893 98903 862b7a 98902->98903 98926 862cd4 7 API calls 98904->98926 98906 862b2a 98907 862c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98906->98907 98907->98885 98909 863862 ___scrt_fastfail 98908->98909 98927 864212 98909->98927 98912 8638e8 98914 863906 Shell_NotifyIconW 98912->98914 98915 8a3386 Shell_NotifyIconW 98912->98915 98931 863923 98914->98931 98917 86391c 98917->98896 98918->98895 98920 8a1f50 __wsopen_s 98919->98920 98921 863a67 GetModuleFileNameW 98920->98921 98922 869cb3 22 API calls 98921->98922 98923 863a8d 98922->98923 98924 863aa2 23 API calls 98923->98924 98925 863a97 98924->98925 98925->98882 98926->98906 98928 8638b7 98927->98928 98929 8a35a4 98927->98929 98928->98912 98953 8cc874 42 API calls _strftime 98928->98953 98929->98928 98930 8a35ad DestroyIcon 98929->98930 98930->98928 98932 863a13 98931->98932 98933 86393f 98931->98933 98932->98917 98934 866270 22 API calls 98933->98934 98935 86394d 98934->98935 98936 8a3393 LoadStringW 98935->98936 98937 86395a 98935->98937 98939 8a33ad 98936->98939 98938 866b57 22 API calls 98937->98938 98940 86396f 98938->98940 98943 86a8c7 22 API calls 98939->98943 98947 863994 ___scrt_fastfail 98939->98947 98941 8a33c9 98940->98941 98942 86397c 98940->98942 98945 866350 22 API calls 98941->98945 98942->98939 98944 863986 98942->98944 98943->98947 98946 866350 22 API calls 98944->98946 98948 8a33d7 98945->98948 98946->98947 98950 8639f9 Shell_NotifyIconW 98947->98950 98948->98947 98949 8633c6 22 API calls 98948->98949 98951 8a33f9 98949->98951 98950->98932 98952 8633c6 22 API calls 98951->98952 98952->98947 98953->98912 98954 863156 98957 863170 98954->98957 98958 863187 98957->98958 98959 8631e9 98958->98959 98960 86318c 98958->98960 98961 8631eb 98958->98961 98962 8631d0 DefWindowProcW 98959->98962 98965 863265 PostQuitMessage 98960->98965 98966 863199 98960->98966 98963 8a2dfb 98961->98963 98964 8631f1 98961->98964 98967 86316a 98962->98967 99006 8618e2 10 API calls 98963->99006 98968 86321d SetTimer RegisterWindowMessageW 98964->98968 98969 8631f8 98964->98969 98965->98967 98971 8631a4 98966->98971 98972 8a2e7c 98966->98972 98968->98967 98976 863246 CreatePopupMenu 98968->98976 98973 8a2d9c 98969->98973 98974 863201 KillTimer 98969->98974 98977 8a2e68 98971->98977 98978 8631ae 98971->98978 99011 8cbf30 34 API calls ___scrt_fastfail 98972->99011 98981 8a2da1 98973->98981 98982 8a2dd7 MoveWindow 98973->98982 99002 8630f2 Shell_NotifyIconW ___scrt_fastfail 98974->99002 98975 8a2e1c 99007 87e499 42 API calls 98975->99007 98976->98967 99010 8cc161 27 API calls ___scrt_fastfail 98977->99010 98986 8a2e4d 98978->98986 98987 8631b9 98978->98987 98980 8a2e8e 98980->98962 98980->98967 98990 8a2dc6 SetFocus 98981->98990 98991 8a2da7 98981->98991 98982->98967 98986->98962 99009 8c0ad7 22 API calls 98986->99009 98988 8631c4 98987->98988 98989 863253 98987->98989 98988->98962 99008 8630f2 Shell_NotifyIconW ___scrt_fastfail 98988->99008 99004 86326f 44 API calls ___scrt_fastfail 98989->99004 98990->98967 98991->98988 98995 8a2db0 98991->98995 98992 863214 99003 863c50 DeleteObject DestroyWindow 98992->99003 98993 863263 98993->98967 99005 8618e2 10 API calls 98995->99005 99000 8a2e41 99001 863837 49 API calls 99000->99001 99001->98959 99002->98992 99003->98967 99004->98993 99005->98967 99006->98975 99007->98988 99008->99000 99009->98959 99010->98993 99011->98980 99012 862e37 99013 86a961 22 API calls 99012->99013 99014 862e4d 99013->99014 99091 864ae3 99014->99091 99016 862e6b 99017 863a5a 24 API calls 99016->99017 99018 862e7f 99017->99018 99019 869cb3 22 API calls 99018->99019 99020 862e8c 99019->99020 99021 864ecb 94 API calls 99020->99021 99022 862ea5 99021->99022 99023 8a2cb0 99022->99023 99024 862ead 99022->99024 99025 8d2cf9 80 API calls 99023->99025 99027 86a8c7 22 API calls 99024->99027 99026 8a2cc3 99025->99026 99028 864f39 68 API calls 99026->99028 99029 8a2ccf 99026->99029 99030 862ec3 99027->99030 99028->99029 99032 864f39 68 API calls 99029->99032 99105 866f88 22 API calls 99030->99105 99034 8a2ce5 99032->99034 99033 862ecf 99035 869cb3 22 API calls 99033->99035 99121 863084 22 API calls 99034->99121 99036 862edc 99035->99036 99106 86a81b 41 API calls 99036->99106 99038 862eec 99041 869cb3 22 API calls 99038->99041 99040 8a2d02 99122 863084 22 API calls 99040->99122 99042 862f12 99041->99042 99107 86a81b 41 API calls 99042->99107 99044 8a2d1e 99046 863a5a 24 API calls 99044->99046 99047 8a2d44 99046->99047 99123 863084 22 API calls 99047->99123 99048 862f21 99051 86a961 22 API calls 99048->99051 99050 8a2d50 99052 86a8c7 22 API calls 99050->99052 99053 862f3f 99051->99053 99054 8a2d5e 99052->99054 99108 863084 22 API calls 99053->99108 99124 863084 22 API calls 99054->99124 99057 862f4b 99109 884a28 40 API calls 3 library calls 99057->99109 99058 8a2d6d 99063 86a8c7 22 API calls 99058->99063 99060 862f59 99060->99034 99061 862f63 99060->99061 99110 884a28 40 API calls 3 library calls 99061->99110 99065 8a2d83 99063->99065 99064 862f6e 99064->99040 99066 862f78 99064->99066 99125 863084 22 API calls 99065->99125 99111 884a28 40 API calls 3 library calls 99066->99111 99068 8a2d90 99070 862f83 99070->99044 99071 862f8d 99070->99071 99112 884a28 40 API calls 3 library calls 99071->99112 99073 862f98 99074 862fdc 99073->99074 99113 863084 22 API calls 99073->99113 99074->99058 99075 862fe8 99074->99075 99075->99068 99115 8663eb 22 API calls 99075->99115 99078 862fbf 99080 86a8c7 22 API calls 99078->99080 99079 862ff8 99116 866a50 22 API calls 99079->99116 99081 862fcd 99080->99081 99114 863084 22 API calls 99081->99114 99084 863006 99117 8670b0 23 API calls 99084->99117 99088 863021 99089 863065 99088->99089 99118 866f88 22 API calls 99088->99118 99119 8670b0 23 API calls 99088->99119 99120 863084 22 API calls 99088->99120 99092 864af0 __wsopen_s 99091->99092 99093 866b57 22 API calls 99092->99093 99094 864b22 99092->99094 99093->99094 99103 864b58 99094->99103 99126 864c6d 99094->99126 99096 864c6d 22 API calls 99096->99103 99097 869cb3 22 API calls 99099 864c52 99097->99099 99098 869cb3 22 API calls 99098->99103 99100 86515f 22 API calls 99099->99100 99102 864c5e 99100->99102 99101 86515f 22 API calls 99101->99103 99102->99016 99103->99096 99103->99098 99103->99101 99104 864c29 99103->99104 99104->99097 99104->99102 99105->99033 99106->99038 99107->99048 99108->99057 99109->99060 99110->99064 99111->99070 99112->99073 99113->99078 99114->99074 99115->99079 99116->99084 99117->99088 99118->99088 99119->99088 99120->99088 99121->99040 99122->99044 99123->99050 99124->99058 99125->99068 99127 86aec9 22 API calls 99126->99127 99128 864c78 99127->99128 99128->99094 99129 8803fb 99130 880407 __FrameHandler3::FrameUnwindToState 99129->99130 99158 87feb1 99130->99158 99132 88040e 99133 880561 99132->99133 99136 880438 99132->99136 99185 88083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99133->99185 99135 880568 99186 884e52 28 API calls _abort 99135->99186 99147 880477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99136->99147 99169 89247d 99136->99169 99138 88056e 99187 884e04 28 API calls _abort 99138->99187 99141 880576 99143 880457 99145 8804d8 99177 880959 99145->99177 99147->99145 99181 884e1a 38 API calls 2 library calls 99147->99181 99149 8804de 99150 8804f3 99149->99150 99182 880992 GetModuleHandleW 99150->99182 99152 8804fa 99152->99135 99153 8804fe 99152->99153 99154 880507 99153->99154 99183 884df5 28 API calls _abort 99153->99183 99184 880040 13 API calls 2 library calls 99154->99184 99157 88050f 99157->99143 99159 87feba 99158->99159 99188 880698 IsProcessorFeaturePresent 99159->99188 99161 87fec6 99189 882c94 10 API calls 3 library calls 99161->99189 99163 87fecb 99164 87fecf 99163->99164 99190 892317 99163->99190 99164->99132 99167 87fee6 99167->99132 99172 892494 99169->99172 99170 880a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99171 880451 99170->99171 99171->99143 99173 892421 99171->99173 99172->99170 99174 892450 99173->99174 99175 880a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99174->99175 99176 892479 99175->99176 99176->99147 99241 882340 99177->99241 99180 88097f 99180->99149 99181->99145 99182->99152 99183->99154 99184->99157 99185->99135 99186->99138 99187->99141 99188->99161 99189->99163 99194 89d1f6 99190->99194 99193 882cbd 8 API calls 3 library calls 99193->99164 99195 89d213 99194->99195 99198 89d20f 99194->99198 99195->99198 99200 894bfb 99195->99200 99197 87fed8 99197->99167 99197->99193 99212 880a8c 99198->99212 99201 894c07 __FrameHandler3::FrameUnwindToState 99200->99201 99219 892f5e EnterCriticalSection 99201->99219 99203 894c0e 99220 8950af 99203->99220 99205 894c1d 99211 894c2c 99205->99211 99233 894a8f 29 API calls 99205->99233 99208 894c27 99234 894b45 GetStdHandle GetFileType 99208->99234 99209 894c3d __fread_nolock 99209->99195 99235 894c48 LeaveCriticalSection _abort 99211->99235 99213 880a95 99212->99213 99214 880a97 IsProcessorFeaturePresent 99212->99214 99213->99197 99216 880c5d 99214->99216 99240 880c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 99216->99240 99218 880d40 99218->99197 99219->99203 99221 8950bb __FrameHandler3::FrameUnwindToState 99220->99221 99222 8950c8 99221->99222 99223 8950df 99221->99223 99237 88f2d9 20 API calls __dosmaperr 99222->99237 99236 892f5e EnterCriticalSection 99223->99236 99226 8950cd 99238 8927ec 26 API calls __fread_nolock 99226->99238 99228 8950d7 __fread_nolock 99228->99205 99230 895000 __wsopen_s 21 API calls 99231 8950eb 99230->99231 99231->99230 99232 895117 99231->99232 99239 89513e LeaveCriticalSection _abort 99232->99239 99233->99208 99234->99211 99235->99209 99236->99231 99237->99226 99238->99228 99239->99228 99240->99218 99242 88096c GetStartupInfoW 99241->99242 99242->99180 99243 861033 99248 864c91 99243->99248 99247 861042 99249 86a961 22 API calls 99248->99249 99250 864cff 99249->99250 99256 863af0 99250->99256 99253 864d9c 99254 861038 99253->99254 99259 8651f7 22 API calls __fread_nolock 99253->99259 99255 8800a3 29 API calls __onexit 99254->99255 99255->99247 99260 863b1c 99256->99260 99259->99253 99261 863b0f 99260->99261 99262 863b29 99260->99262 99261->99253 99262->99261 99263 863b30 RegOpenKeyExW 99262->99263 99263->99261 99264 863b4a RegQueryValueExW 99263->99264 99265 863b80 RegCloseKey 99264->99265 99266 863b6b 99264->99266 99265->99261 99266->99265 99267 86f7bf 99268 86fcb6 99267->99268 99269 86f7d3 99267->99269 99304 86aceb 23 API calls messages 99268->99304 99271 86fcc2 99269->99271 99272 87fddb 22 API calls 99269->99272 99305 86aceb 23 API calls messages 99271->99305 99274 86f7e5 99272->99274 99274->99271 99275 86f83e 99274->99275 99276 86fd3d 99274->99276 99278 871310 207 API calls 99275->99278 99291 86ed9d messages 99275->99291 99306 8d1155 22 API calls 99276->99306 99294 86ec76 messages 99278->99294 99279 8b4beb 99310 8d359c 82 API calls __wsopen_s 99279->99310 99280 86fef7 99287 86a8c7 22 API calls 99280->99287 99280->99291 99282 86f3ae messages 99282->99291 99307 8d359c 82 API calls __wsopen_s 99282->99307 99284 8b4600 99289 86a8c7 22 API calls 99284->99289 99284->99291 99285 8b4b0b 99308 8d359c 82 API calls __wsopen_s 99285->99308 99287->99291 99289->99291 99292 86a8c7 22 API calls 99292->99294 99293 880242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 99293->99294 99294->99279 99294->99280 99294->99282 99294->99284 99294->99285 99294->99291 99294->99292 99294->99293 99295 86fbe3 99294->99295 99296 86a961 22 API calls 99294->99296 99299 87fddb 22 API calls 99294->99299 99300 8800a3 29 API calls pre_c_initialization 99294->99300 99301 8801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 99294->99301 99302 8701e0 207 API calls 2 library calls 99294->99302 99303 8706a0 41 API calls messages 99294->99303 99295->99282 99295->99291 99297 8b4bdc 99295->99297 99296->99294 99309 8d359c 82 API calls __wsopen_s 99297->99309 99299->99294 99300->99294 99301->99294 99302->99294 99303->99294 99304->99271 99305->99276 99306->99291 99307->99291 99308->99291 99309->99279 99310->99291 99311 86105b 99316 86344d 99311->99316 99313 86106a 99347 8800a3 29 API calls __onexit 99313->99347 99315 861074 99317 86345d __wsopen_s 99316->99317 99318 86a961 22 API calls 99317->99318 99319 863513 99318->99319 99320 863a5a 24 API calls 99319->99320 99321 86351c 99320->99321 99348 863357 99321->99348 99324 8633c6 22 API calls 99325 863535 99324->99325 99326 86515f 22 API calls 99325->99326 99327 863544 99326->99327 99328 86a961 22 API calls 99327->99328 99329 86354d 99328->99329 99330 86a6c3 22 API calls 99329->99330 99331 863556 RegOpenKeyExW 99330->99331 99332 8a3176 RegQueryValueExW 99331->99332 99336 863578 99331->99336 99333 8a320c RegCloseKey 99332->99333 99334 8a3193 99332->99334 99333->99336 99339 8a321e _wcslen 99333->99339 99335 87fe0b 22 API calls 99334->99335 99337 8a31ac 99335->99337 99336->99313 99338 865722 22 API calls 99337->99338 99340 8a31b7 RegQueryValueExW 99338->99340 99339->99336 99341 864c6d 22 API calls 99339->99341 99345 869cb3 22 API calls 99339->99345 99346 86515f 22 API calls 99339->99346 99342 8a31ee messages 99340->99342 99343 8a31d4 99340->99343 99341->99339 99342->99333 99344 866b57 22 API calls 99343->99344 99344->99342 99345->99339 99346->99339 99347->99315 99349 8a1f50 __wsopen_s 99348->99349 99350 863364 GetFullPathNameW 99349->99350 99351 863386 99350->99351 99352 866b57 22 API calls 99351->99352 99353 8633a4 99352->99353 99353->99324 99354 861098 99359 8642de 99354->99359 99358 8610a7 99360 86a961 22 API calls 99359->99360 99361 8642f5 GetVersionExW 99360->99361 99362 866b57 22 API calls 99361->99362 99363 864342 99362->99363 99364 8693b2 22 API calls 99363->99364 99375 864378 99363->99375 99365 86436c 99364->99365 99367 8637a0 22 API calls 99365->99367 99366 86441b GetCurrentProcess IsWow64Process 99368 864437 99366->99368 99367->99375 99369 86444f LoadLibraryA 99368->99369 99370 8a3824 GetSystemInfo 99368->99370 99371 864460 GetProcAddress 99369->99371 99372 86449c GetSystemInfo 99369->99372 99371->99372 99373 864470 GetNativeSystemInfo 99371->99373 99374 864476 99372->99374 99373->99374 99377 86109d 99374->99377 99378 86447a FreeLibrary 99374->99378 99375->99366 99376 8a37df 99375->99376 99379 8800a3 29 API calls __onexit 99377->99379 99378->99377 99379->99358

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 234 8642de-86434d call 86a961 GetVersionExW call 866b57 239 864353 234->239 240 8a3617-8a362a 234->240 241 864355-864357 239->241 242 8a362b-8a362f 240->242 243 86435d-8643bc call 8693b2 call 8637a0 241->243 244 8a3656 241->244 245 8a3632-8a363e 242->245 246 8a3631 242->246 262 8643c2-8643c4 243->262 263 8a37df-8a37e6 243->263 249 8a365d-8a3660 244->249 245->242 248 8a3640-8a3642 245->248 246->245 248->241 251 8a3648-8a364f 248->251 252 8a3666-8a36a8 249->252 253 86441b-864435 GetCurrentProcess IsWow64Process 249->253 251->240 255 8a3651 251->255 252->253 256 8a36ae-8a36b1 252->256 258 864437 253->258 259 864494-86449a 253->259 255->244 260 8a36db-8a36e5 256->260 261 8a36b3-8a36bd 256->261 264 86443d-864449 258->264 259->264 268 8a36f8-8a3702 260->268 269 8a36e7-8a36f3 260->269 265 8a36ca-8a36d6 261->265 266 8a36bf-8a36c5 261->266 262->249 267 8643ca-8643dd 262->267 270 8a37e8 263->270 271 8a3806-8a3809 263->271 272 86444f-86445e LoadLibraryA 264->272 273 8a3824-8a3828 GetSystemInfo 264->273 265->253 266->253 276 8643e3-8643e5 267->276 277 8a3726-8a372f 267->277 279 8a3704-8a3710 268->279 280 8a3715-8a3721 268->280 269->253 278 8a37ee 270->278 281 8a380b-8a381a 271->281 282 8a37f4-8a37fc 271->282 274 864460-86446e GetProcAddress 272->274 275 86449c-8644a6 GetSystemInfo 272->275 274->275 283 864470-864474 GetNativeSystemInfo 274->283 284 864476-864478 275->284 285 8a374d-8a3762 276->285 286 8643eb-8643ee 276->286 287 8a373c-8a3748 277->287 288 8a3731-8a3737 277->288 278->282 279->253 280->253 281->278 289 8a381c-8a3822 281->289 282->271 283->284 292 864481-864493 284->292 293 86447a-86447b FreeLibrary 284->293 290 8a376f-8a377b 285->290 291 8a3764-8a376a 285->291 294 8643f4-86440f 286->294 295 8a3791-8a3794 286->295 287->253 288->253 289->282 290->253 291->253 293->292 297 864415 294->297 298 8a3780-8a378c 294->298 295->253 296 8a379a-8a37c1 295->296 299 8a37ce-8a37da 296->299 300 8a37c3-8a37c9 296->300 297->253 298->253 299->253 300->253
                                      APIs
                                      • GetVersionExW.KERNEL32(?), ref: 0086430D
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      • GetCurrentProcess.KERNEL32(?,008FCB64,00000000,?,?), ref: 00864422
                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00864429
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00864454
                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00864466
                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00864474
                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0086447B
                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 008644A0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                      • API String ID: 3290436268-3101561225
                                      • Opcode ID: 5316c30d2ec5a7deedcef43a25dc8b3aac3b300eca47dfe8322c6f7d2d1a9f7c
                                      • Instruction ID: 44fff0d9425037a58ea2df1c79fca2cc3cdbd75adb0e2f9afe426249ffcc58e1
                                      • Opcode Fuzzy Hash: 5316c30d2ec5a7deedcef43a25dc8b3aac3b300eca47dfe8322c6f7d2d1a9f7c
                                      • Instruction Fuzzy Hash: 04A1A26A92E2C4DFD712DB797C415A97FE4FB36304B0958A9E081D3B32D6204648FF26

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 529 8642a2-8642ba CreateStreamOnHGlobal 530 8642bc-8642d3 FindResourceExW 529->530 531 8642da-8642dd 529->531 532 8a35ba-8a35c9 LoadResource 530->532 533 8642d9 530->533 532->533 534 8a35cf-8a35dd SizeofResource 532->534 533->531 534->533 535 8a35e3-8a35ee LockResource 534->535 535->533 536 8a35f4-8a35fc 535->536 537 8a3600-8a3612 536->537 537->533
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,008650AA,?,?,00000000,00000000), ref: 008642B2
                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,008650AA,?,?,00000000,00000000), ref: 008642C9
                                      • LoadResource.KERNEL32(?,00000000,?,?,008650AA,?,?,00000000,00000000,?,?,?,?,?,?,00864F20), ref: 008A35BE
                                      • SizeofResource.KERNEL32(?,00000000,?,?,008650AA,?,?,00000000,00000000,?,?,?,?,?,?,00864F20), ref: 008A35D3
                                      • LockResource.KERNEL32(008650AA,?,?,008650AA,?,?,00000000,00000000,?,?,?,?,?,?,00864F20,?), ref: 008A35E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                      • String ID: SCRIPT
                                      • API String ID: 3051347437-3967369404
                                      • Opcode ID: 42f6408148c37115c4657b4bb2d32ca030ff1e103cc05e0dfb37eba78fb433ff
                                      • Instruction ID: 3f972801b5342f96966915d0b630290744c6e811ffdd636d57bdf5a2bc536dfd
                                      • Opcode Fuzzy Hash: 42f6408148c37115c4657b4bb2d32ca030ff1e103cc05e0dfb37eba78fb433ff
                                      • Instruction Fuzzy Hash: 1E117C70200705BFE7218B65DD58F2B7BB9FBC5B51F204169F412D6250DBB2DD10C620

                                      Control-flow Graph

                                      APIs
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00862B6B
                                        • Part of subcall function 00863A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00931418,?,00862E7F,?,?,?,00000000), ref: 00863A78
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,00922224), ref: 008A2C10
                                      • ShellExecuteW.SHELL32(00000000,?,?,00922224), ref: 008A2C17
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                      • String ID: runas
                                      • API String ID: 448630720-4000483414
                                      • Opcode ID: 6cd8d49b06eb1122255f98f965be65397a68d5466c9896a36f065484de52ceaa
                                      • Instruction ID: ee180fa2e451ef46538af1e96c9d960f4d62f8da1dbdd3fa6a48c5367fbb4681
                                      • Opcode Fuzzy Hash: 6cd8d49b06eb1122255f98f965be65397a68d5466c9896a36f065484de52ceaa
                                      • Instruction Fuzzy Hash: D711DF31208345AAC715FF68E952EBEB7A8FB91310F46042CF082D21B2CF318A4AD713
                                      APIs
                                      • GetInputState.USER32 ref: 0086D807
                                      • timeGetTime.WINMM ref: 0086DA07
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0086DB28
                                      • TranslateMessage.USER32(?), ref: 0086DB7B
                                      • DispatchMessageW.USER32(?), ref: 0086DB89
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0086DB9F
                                      • Sleep.KERNEL32(0000000A), ref: 0086DBB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                      • String ID:
                                      • API String ID: 2189390790-0
                                      • Opcode ID: 642ac1a441ab2b5904e21fab79b98aefac908a42bb8e8dcb30738d4f72a774b3
                                      • Instruction ID: cbd06788fc90cda30e30f16c3baad7d26572e1d745d36fdd9fc8ca1011377ebd
                                      • Opcode Fuzzy Hash: 642ac1a441ab2b5904e21fab79b98aefac908a42bb8e8dcb30738d4f72a774b3
                                      • Instruction Fuzzy Hash: DD42BD30A08345DFD729DF28C894BAABBE1FB85314F198559E455CB3A2D770E844CB92

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00862D07
                                      • RegisterClassExW.USER32(00000030), ref: 00862D31
                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00862D42
                                      • InitCommonControlsEx.COMCTL32(?), ref: 00862D5F
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00862D6F
                                      • LoadIconW.USER32(000000A9), ref: 00862D85
                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00862D94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                      • API String ID: 2914291525-1005189915
                                      • Opcode ID: 842aac180994b3bdcf6d7f488de030b89d0212c1732e9ee5733a23b8e31a2a6a
                                      • Instruction ID: e208ba5f4d13f407dff745ffee897835e7756a87ddf5807ada70959778912ad3
                                      • Opcode Fuzzy Hash: 842aac180994b3bdcf6d7f488de030b89d0212c1732e9ee5733a23b8e31a2a6a
                                      • Instruction Fuzzy Hash: 4521C0B591521CEFDB00EFA8E989BEDBBB4FB08700F10811AF611A62A0D7B55644DF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 302 8a065b-8a068b call 8a042f 305 8a068d-8a0698 call 88f2c6 302->305 306 8a06a6-8a06b2 call 895221 302->306 311 8a069a-8a06a1 call 88f2d9 305->311 312 8a06cb-8a0714 call 8a039a 306->312 313 8a06b4-8a06c9 call 88f2c6 call 88f2d9 306->313 322 8a097d-8a0983 311->322 320 8a0781-8a078a GetFileType 312->320 321 8a0716-8a071f 312->321 313->311 326 8a078c-8a07bd GetLastError call 88f2a3 CloseHandle 320->326 327 8a07d3-8a07d6 320->327 324 8a0721-8a0725 321->324 325 8a0756-8a077c GetLastError call 88f2a3 321->325 324->325 331 8a0727-8a0754 call 8a039a 324->331 325->311 326->311 341 8a07c3-8a07ce call 88f2d9 326->341 329 8a07d8-8a07dd 327->329 330 8a07df-8a07e5 327->330 334 8a07e9-8a0837 call 89516a 329->334 330->334 335 8a07e7 330->335 331->320 331->325 344 8a0839-8a0845 call 8a05ab 334->344 345 8a0847-8a086b call 8a014d 334->345 335->334 341->311 344->345 351 8a086f-8a0879 call 8986ae 344->351 352 8a087e-8a08c1 345->352 353 8a086d 345->353 351->322 354 8a08e2-8a08f0 352->354 355 8a08c3-8a08c7 352->355 353->351 358 8a097b 354->358 359 8a08f6-8a08fa 354->359 355->354 357 8a08c9-8a08dd 355->357 357->354 358->322 359->358 361 8a08fc-8a092f CloseHandle call 8a039a 359->361 364 8a0963-8a0977 361->364 365 8a0931-8a095d GetLastError call 88f2a3 call 895333 361->365 364->358 365->364
                                      APIs
                                        • Part of subcall function 008A039A: CreateFileW.KERNELBASE(00000000,00000000,?,008A0704,?,?,00000000,?,008A0704,00000000,0000000C), ref: 008A03B7
                                      • GetLastError.KERNEL32 ref: 008A076F
                                      • __dosmaperr.LIBCMT ref: 008A0776
                                      • GetFileType.KERNELBASE(00000000), ref: 008A0782
                                      • GetLastError.KERNEL32 ref: 008A078C
                                      • __dosmaperr.LIBCMT ref: 008A0795
                                      • CloseHandle.KERNEL32(00000000), ref: 008A07B5
                                      • CloseHandle.KERNEL32(?), ref: 008A08FF
                                      • GetLastError.KERNEL32 ref: 008A0931
                                      • __dosmaperr.LIBCMT ref: 008A0938
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                      • String ID: H
                                      • API String ID: 4237864984-2852464175
                                      • Opcode ID: cb1c6d8cdb5112478579e515728c049021f1aad5c555bf0a9a94f8d683dbcc48
                                      • Instruction ID: 44b15b53d3ca145fc343ce635d4a892bfe1ddbc09861884ef2d65f718bad4e19
                                      • Opcode Fuzzy Hash: cb1c6d8cdb5112478579e515728c049021f1aad5c555bf0a9a94f8d683dbcc48
                                      • Instruction Fuzzy Hash: 58A1F332A141088FEF19AF68DC51BAE7BA0FB4A324F14015DF815DB392DB359912DF92

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00863A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00931418,?,00862E7F,?,?,?,00000000), ref: 00863A78
                                        • Part of subcall function 00863357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00863379
                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0086356A
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 008A318D
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 008A31CE
                                      • RegCloseKey.ADVAPI32(?), ref: 008A3210
                                      • _wcslen.LIBCMT ref: 008A3277
                                      • _wcslen.LIBCMT ref: 008A3286
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                      • API String ID: 98802146-2727554177
                                      • Opcode ID: 2a9dba7d4a1b8dd1641fd195e8bac3e8ff5a62f6766b65d4c75c342e67459f28
                                      • Instruction ID: 6899ad5d9fde70b762d6166e9e3e9a5c6b79907543e27f867fef1947630cf2db
                                      • Opcode Fuzzy Hash: 2a9dba7d4a1b8dd1641fd195e8bac3e8ff5a62f6766b65d4c75c342e67459f28
                                      • Instruction Fuzzy Hash: 2771C1714183059EC314EF69EC819ABBBE8FF85B40F40042EF585D72A0EB349A48DF62

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00862B8E
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00862B9D
                                      • LoadIconW.USER32(00000063), ref: 00862BB3
                                      • LoadIconW.USER32(000000A4), ref: 00862BC5
                                      • LoadIconW.USER32(000000A2), ref: 00862BD7
                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00862BEF
                                      • RegisterClassExW.USER32(?), ref: 00862C40
                                        • Part of subcall function 00862CD4: GetSysColorBrush.USER32(0000000F), ref: 00862D07
                                        • Part of subcall function 00862CD4: RegisterClassExW.USER32(00000030), ref: 00862D31
                                        • Part of subcall function 00862CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00862D42
                                        • Part of subcall function 00862CD4: InitCommonControlsEx.COMCTL32(?), ref: 00862D5F
                                        • Part of subcall function 00862CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00862D6F
                                        • Part of subcall function 00862CD4: LoadIconW.USER32(000000A9), ref: 00862D85
                                        • Part of subcall function 00862CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00862D94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                      • String ID: #$0$AutoIt v3
                                      • API String ID: 423443420-4155596026
                                      • Opcode ID: 1a556f11f95dfd42f2c564701ca22610a410c4056150b87d3978300796d8e06d
                                      • Instruction ID: 7a882d170be273ff806ad44a00fcabca5c0e0557f88281fa33481202d5e4374c
                                      • Opcode Fuzzy Hash: 1a556f11f95dfd42f2c564701ca22610a410c4056150b87d3978300796d8e06d
                                      • Instruction Fuzzy Hash: 10212971E24318ABDB109FAAED55BA97FB4FB48B50F00401AF600E66B0D7B11644EF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 443 863170-863185 444 863187-86318a 443->444 445 8631e5-8631e7 443->445 447 86318c-863193 444->447 448 8631eb 444->448 445->444 446 8631e9 445->446 449 8631d0-8631d8 DefWindowProcW 446->449 452 863265-86326d PostQuitMessage 447->452 453 863199-86319e 447->453 450 8a2dfb-8a2e23 call 8618e2 call 87e499 448->450 451 8631f1-8631f6 448->451 454 8631de-8631e4 449->454 486 8a2e28-8a2e2f 450->486 456 86321d-863244 SetTimer RegisterWindowMessageW 451->456 457 8631f8-8631fb 451->457 455 863219-86321b 452->455 459 8631a4-8631a8 453->459 460 8a2e7c-8a2e90 call 8cbf30 453->460 455->454 456->455 464 863246-863251 CreatePopupMenu 456->464 461 8a2d9c-8a2d9f 457->461 462 863201-863214 KillTimer call 8630f2 call 863c50 457->462 465 8a2e68-8a2e77 call 8cc161 459->465 466 8631ae-8631b3 459->466 460->455 478 8a2e96 460->478 469 8a2da1-8a2da5 461->469 470 8a2dd7-8a2df6 MoveWindow 461->470 462->455 464->455 465->455 474 8a2e4d-8a2e54 466->474 475 8631b9-8631be 466->475 479 8a2dc6-8a2dd2 SetFocus 469->479 480 8a2da7-8a2daa 469->480 470->455 474->449 481 8a2e5a-8a2e63 call 8c0ad7 474->481 476 8631c4-8631ca 475->476 477 863253-863263 call 86326f 475->477 476->449 476->486 477->455 478->449 479->455 480->476 487 8a2db0-8a2dc1 call 8618e2 480->487 481->449 486->449 491 8a2e35-8a2e48 call 8630f2 call 863837 486->491 487->455 491->449
                                      APIs
                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0086316A,?,?), ref: 008631D8
                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,0086316A,?,?), ref: 00863204
                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00863227
                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0086316A,?,?), ref: 00863232
                                      • CreatePopupMenu.USER32 ref: 00863246
                                      • PostQuitMessage.USER32(00000000), ref: 00863267
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                      • String ID: TaskbarCreated
                                      • API String ID: 129472671-2362178303
                                      • Opcode ID: eba9a4bad8957628a94f6665e7422191833e317c47902064bfb2a38c0c840f4a
                                      • Instruction ID: 0b1c05bd61696d277aa70ac4cfd31628d590ddfb39fd88f495ee55c28e538097
                                      • Opcode Fuzzy Hash: eba9a4bad8957628a94f6665e7422191833e317c47902064bfb2a38c0c840f4a
                                      • Instruction Fuzzy Hash: 3C411A31254208A7EB252B7CAD5DF793A59FB06345F060125F602C67B2CB71DF50DB62

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 499 1b4f220-1b4f272 call 1b4f120 CreateFileW 502 1b4f274-1b4f276 499->502 503 1b4f27b-1b4f288 499->503 504 1b4f3d4-1b4f3d8 502->504 506 1b4f28a-1b4f296 503->506 507 1b4f29b-1b4f2b2 VirtualAlloc 503->507 506->504 508 1b4f2b4-1b4f2b6 507->508 509 1b4f2bb-1b4f2e1 CreateFileW 507->509 508->504 511 1b4f305-1b4f31f ReadFile 509->511 512 1b4f2e3-1b4f300 509->512 513 1b4f321-1b4f33e 511->513 514 1b4f343-1b4f347 511->514 512->504 513->504 516 1b4f368-1b4f37f WriteFile 514->516 517 1b4f349-1b4f366 514->517 518 1b4f381-1b4f3a8 516->518 519 1b4f3aa-1b4f3cf CloseHandle VirtualFree 516->519 517->504 518->504 519->504
                                      APIs
                                      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 01B4F265
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                      • Instruction ID: 8ced9fd08ecd02dadce90569cb2c762633b88eb957c9dce25a390584dc52cfcb
                                      • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                      • Instruction Fuzzy Hash: A251FB75A50208FBEF24DFA8CC89FEE7778AF48700F108658F609EB180DB7496449B60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 539 862c63-862cd3 CreateWindowExW * 2 ShowWindow * 2
                                      APIs
                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00862C91
                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00862CB2
                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00861CAD,?), ref: 00862CC6
                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00861CAD,?), ref: 00862CCF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$CreateShow
                                      • String ID: AutoIt v3$edit
                                      • API String ID: 1584632944-3779509399
                                      • Opcode ID: 5f836340ef83cddebadcf302dd975efcec2d0fd04ae05cf162f26ae5726fbb95
                                      • Instruction ID: 45b5a090a1575cbcaab4edd4ef15a43ae44392cf3e2fd24b69b2df5441726fa7
                                      • Opcode Fuzzy Hash: 5f836340ef83cddebadcf302dd975efcec2d0fd04ae05cf162f26ae5726fbb95
                                      • Instruction Fuzzy Hash: D6F0DA756542987AEB311727AC08EB76EBDE7C6F50B00005AFA00E35B0C6651C58EEB0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 654 1b50cd0-1b50e1f call 1b4e900 call 1b50bc0 CreateFileW 661 1b50e26-1b50e36 654->661 662 1b50e21 654->662 665 1b50e3d-1b50e57 VirtualAlloc 661->665 666 1b50e38 661->666 663 1b50ef3-1b50ef8 662->663 667 1b50e5e-1b50e75 ReadFile 665->667 668 1b50e59 665->668 666->663 669 1b50e77 667->669 670 1b50e79-1b50e8e call 1b4f970 667->670 668->663 669->663 672 1b50e93-1b50ecd call 1b50c00 call 1b4fbc0 670->672 677 1b50ecf-1b50ee4 call 1b50c50 672->677 678 1b50ee9-1b50ef1 672->678 677->678 678->663
                                      APIs
                                        • Part of subcall function 01B50BC0: Sleep.KERNELBASE(000001F4), ref: 01B50BD1
                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01B50E15
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: CreateFileSleep
                                      • String ID: 7GEW9JLDW8ZOUXGY
                                      • API String ID: 2694422964-989239075
                                      • Opcode ID: f6af9a505aaa589bc9611bc114b8474d6102967ec1bd3c113dbdfada1b45e938
                                      • Instruction ID: d11758f042a11ae2f9d5cb7f2dbcabf76ff92a1ccbbd9ba843a1be2020dbc45e
                                      • Opcode Fuzzy Hash: f6af9a505aaa589bc9611bc114b8474d6102967ec1bd3c113dbdfada1b45e938
                                      • Instruction Fuzzy Hash: BD618F30D04289EBEF15EBB4D814BEEBB75AF19700F104598E648BB2C0DBB91B45CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 717 863b1c-863b27 718 863b99-863b9b 717->718 719 863b29-863b2e 717->719 720 863b8c-863b8f 718->720 719->718 721 863b30-863b48 RegOpenKeyExW 719->721 721->718 722 863b4a-863b69 RegQueryValueExW 721->722 723 863b80-863b8b RegCloseKey 722->723 724 863b6b-863b76 722->724 723->720 725 863b90-863b97 724->725 726 863b78-863b7a 724->726 727 863b7e 725->727 726->727 727->723
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00863B0F,SwapMouseButtons,00000004,?), ref: 00863B40
                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00863B0F,SwapMouseButtons,00000004,?), ref: 00863B61
                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00863B0F,SwapMouseButtons,00000004,?), ref: 00863B83
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: Control Panel\Mouse
                                      • API String ID: 3677997916-824357125
                                      • Opcode ID: 3fd2dc18ea678de97c4b4dfb9cfa14f51d66ea18afa94497d26fd5dbccf2199c
                                      • Instruction ID: 4a51d38c5004cf6a4181732902196b92cd8df9287224fdef162d9eb12c9aad7e
                                      • Opcode Fuzzy Hash: 3fd2dc18ea678de97c4b4dfb9cfa14f51d66ea18afa94497d26fd5dbccf2199c
                                      • Instruction Fuzzy Hash: D61157B1610208FFDB208FA4DC84EEEBBB8FF41764B11846AA801D7110E6319F409BA0
                                      Strings
                                      • Variable must be of type 'Object'., xrefs: 008B32B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Variable must be of type 'Object'.
                                      • API String ID: 0-109567571
                                      • Opcode ID: cdb1b9703dd0383a1d1f621419c7fe2c1a55ca737c7004102a741aaa87b6e57b
                                      • Instruction ID: c54c1814e36a4068d524e65b278bc468c6a1a4501230b8ed5d8897fcd5da9b90
                                      • Opcode Fuzzy Hash: cdb1b9703dd0383a1d1f621419c7fe2c1a55ca737c7004102a741aaa87b6e57b
                                      • Instruction Fuzzy Hash: BDC2AE79A00219CFCB24CF58C880AAEB7B1FF19714F268169E916EB391D771ED41CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1239 863923-863939 1240 863a13-863a17 1239->1240 1241 86393f-863954 call 866270 1239->1241 1244 8a3393-8a33a2 LoadStringW 1241->1244 1245 86395a-863976 call 866b57 1241->1245 1247 8a33ad-8a33b6 1244->1247 1251 8a33c9-8a33e5 call 866350 call 863fcf 1245->1251 1252 86397c-863980 1245->1252 1249 863994-863a0e call 882340 call 863a18 call 884983 Shell_NotifyIconW call 86988f 1247->1249 1250 8a33bc-8a33c4 call 86a8c7 1247->1250 1249->1240 1250->1249 1251->1249 1265 8a33eb-8a3409 call 8633c6 call 863fcf call 8633c6 1251->1265 1252->1247 1254 863986-86398f call 866350 1252->1254 1254->1249 1265->1249
                                      APIs
                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 008A33A2
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00863A04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: IconLoadNotifyShell_String_wcslen
                                      • String ID: Line:
                                      • API String ID: 2289894680-1585850449
                                      • Opcode ID: b65a44b68558bbad3bf1602a1e0bcb7d16cec1b49e854b7a0fc9fa8f4602307a
                                      • Instruction ID: eb45e4b53b9b5fe42ea6c33f72b5b79ed6afe697c722243cad85705cb6a32183
                                      • Opcode Fuzzy Hash: b65a44b68558bbad3bf1602a1e0bcb7d16cec1b49e854b7a0fc9fa8f4602307a
                                      • Instruction Fuzzy Hash: CA31AF71408304AAD725EB24EC45BEBB7E8FB45714F05492AF599D32E1EB709A48CBC3

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1275 87fddb-87fdde 1276 87fded-87fdf0 call 88ea0c 1275->1276 1278 87fdf5-87fdf8 1276->1278 1279 87fde0-87fdeb call 884ead 1278->1279 1280 87fdfa-87fdfb 1278->1280 1279->1276 1283 87fdfc-87fe00 1279->1283 1284 87fe06-88066d call 88059c call 8832a4 1283->1284 1285 88066e-880690 call 8805cf call 8832a4 1283->1285 1284->1285 1295 880692 1285->1295 1296 880697 1285->1296 1295->1296
                                      APIs
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00880668
                                        • Part of subcall function 008832A4: RaiseException.KERNEL32(?,?,?,0088068A,?,00931444,?,?,?,?,?,?,0088068A,00861129,00928738,00861129), ref: 00883304
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00880685
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Exception@8Throw$ExceptionRaise
                                      • String ID: Unknown exception
                                      • API String ID: 3476068407-410509341
                                      • Opcode ID: a81aa21c5ad99a581d29a31fa93c429a00b59670445600c797aa895359960b1c
                                      • Instruction ID: 26630b8f12b0868722b7e0b809355b299b1d66d88300d88b05a1eb2333f40118
                                      • Opcode Fuzzy Hash: a81aa21c5ad99a581d29a31fa93c429a00b59670445600c797aa895359960b1c
                                      • Instruction Fuzzy Hash: 0AF0C83490030D778B10F6A9E846C5E7B6CFE50714B608531BA28D5596EF71DA19CF92
                                      APIs
                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 01B4F945
                                      • ExitProcess.KERNEL32(00000000), ref: 01B4F964
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: Process$CreateExit
                                      • String ID: D
                                      • API String ID: 126409537-2746444292
                                      • Opcode ID: 8e3ba9fc2c51f8adf90e9822168422d2e6d76900810f8c5233ba2e98edbc58fa
                                      • Instruction ID: c70954f7e33be4091607faf0398f967c3f92f4dbc925a98e8d8867ca0ba344c9
                                      • Opcode Fuzzy Hash: 8e3ba9fc2c51f8adf90e9822168422d2e6d76900810f8c5233ba2e98edbc58fa
                                      • Instruction Fuzzy Hash: 03F0EC7594024DABDF64EFE4CC49FEE777CBF04701F008548FA0A9A184DB7496088B61
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 008E82F5
                                      • TerminateProcess.KERNEL32(00000000), ref: 008E82FC
                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 008E84DD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$CurrentFreeLibraryTerminate
                                      • String ID:
                                      • API String ID: 146820519-0
                                      • Opcode ID: 80354a4e7764364732b2c6f317de05b6e9a54642815ea4ff7b3f65f57bf010f2
                                      • Instruction ID: c4cda8f857326e21b87e36a2a5f0a80dd904c236839ba404321249aeb98b3028
                                      • Opcode Fuzzy Hash: 80354a4e7764364732b2c6f317de05b6e9a54642815ea4ff7b3f65f57bf010f2
                                      • Instruction Fuzzy Hash: DA125971A08341DFC714DF29C484A2ABBE5FF85318F04895DE989CB392DB71E945CB92
                                      APIs
                                        • Part of subcall function 00861BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00861BF4
                                        • Part of subcall function 00861BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00861BFC
                                        • Part of subcall function 00861BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00861C07
                                        • Part of subcall function 00861BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00861C12
                                        • Part of subcall function 00861BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00861C1A
                                        • Part of subcall function 00861BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00861C22
                                        • Part of subcall function 00861B4A: RegisterWindowMessageW.USER32(00000004,?,008612C4), ref: 00861BA2
                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0086136A
                                      • OleInitialize.OLE32 ref: 00861388
                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 008A24AB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                      • String ID:
                                      • API String ID: 1986988660-0
                                      • Opcode ID: d4fc85dceb7017957f937fc39eebddea633b4f3da45dabab24e3d52d7af4afa4
                                      • Instruction ID: 0eb41deedb59cd40c6affd0231ae3ac7a4e8614745f935d986288d11e0e2fe35
                                      • Opcode Fuzzy Hash: d4fc85dceb7017957f937fc39eebddea633b4f3da45dabab24e3d52d7af4afa4
                                      • Instruction Fuzzy Hash: 5271DCB59393048FC788DFBDAD496653BE4FB88344B19822AE10AC7372EB704445EF56
                                      APIs
                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,008985CC,?,00928CC8,0000000C), ref: 00898704
                                      • GetLastError.KERNEL32(?,008985CC,?,00928CC8,0000000C), ref: 0089870E
                                      • __dosmaperr.LIBCMT ref: 00898739
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseErrorHandleLast__dosmaperr
                                      • String ID:
                                      • API String ID: 2583163307-0
                                      • Opcode ID: df5b58ae951edd3c458d3dd39e11ddcd88606c12231e3194b1ebe5ee99afc2c6
                                      • Instruction ID: 0b7778f4bc14a9de42a11814f2cb1e924f25d30b882304b328d55a9d361203e1
                                      • Opcode Fuzzy Hash: df5b58ae951edd3c458d3dd39e11ddcd88606c12231e3194b1ebe5ee99afc2c6
                                      • Instruction Fuzzy Hash: 73016B33604221A7CE227278AC49B7E6B49FB93778F3D0119F904CF2D2DEA08C81D291
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 008717F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID: CALL
                                      • API String ID: 1385522511-4196123274
                                      • Opcode ID: 820191198d19dcefef77d5fb4af0824993a94ac7ff713bace80e617e84fcd42e
                                      • Instruction ID: 1f8b0de701f07b0036bdb25fb97c2f18dc4fc10f31ba40ab8c7862586b6aa9a1
                                      • Opcode Fuzzy Hash: 820191198d19dcefef77d5fb4af0824993a94ac7ff713bace80e617e84fcd42e
                                      • Instruction Fuzzy Hash: E6229B706082019FCB14DF18C488A2ABBF1FF89314F18892DF59ACB766D735E955CB92
                                      APIs
                                      • GetOpenFileNameW.COMDLG32(?), ref: 008A2C8C
                                        • Part of subcall function 00863AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00863A97,?,?,00862E7F,?,?,?,00000000), ref: 00863AC2
                                        • Part of subcall function 00862DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00862DC4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Name$Path$FileFullLongOpen
                                      • String ID: X
                                      • API String ID: 779396738-3081909835
                                      • Opcode ID: 9f09bf087ab32bcd216fe4ca79a86f686447b34c2ac7e2a12a88e8d385081fb4
                                      • Instruction ID: 541904b3d7df00d548fb33e83087b02d865c46ae60af10e9a019ab23b9e47f67
                                      • Opcode Fuzzy Hash: 9f09bf087ab32bcd216fe4ca79a86f686447b34c2ac7e2a12a88e8d385081fb4
                                      • Instruction Fuzzy Hash: 87219371A0029C9FDB11EF98D845BEE7BF8FF49314F008059E405E7245DBB45A898F62
                                      APIs
                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00863908
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_
                                      • String ID:
                                      • API String ID: 1144537725-0
                                      • Opcode ID: 77045d6a46dd35b488092f5c053dba9b03356d3efca52db0b6bce0eaf790336e
                                      • Instruction ID: 3aa71b151c6895e01b67d8f18a957d8d4ab486366f3d5d55153d3facc7034fc6
                                      • Opcode Fuzzy Hash: 77045d6a46dd35b488092f5c053dba9b03356d3efca52db0b6bce0eaf790336e
                                      • Instruction Fuzzy Hash: C0316F715087019FD721DF24D885BDBBBE8FB49708F00092EF59AD7250E771AA44CB52
                                      APIs
                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0086949C,?,00008000), ref: 00865773
                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0086949C,?,00008000), ref: 008A4052
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: bd5421e4307781f958bf3079e02249d0e13b747c541f488d56bd0b686ee19209
                                      • Instruction ID: 85c3f30f9a2f5cd5393099df65e480cce86f0dced7ef113c580aaecdac370acd
                                      • Opcode Fuzzy Hash: bd5421e4307781f958bf3079e02249d0e13b747c541f488d56bd0b686ee19209
                                      • Instruction Fuzzy Hash: 23019230145625B6E7300A2ACC0EF977F98FF02BB4F118300BA9CAA1E0CBB45854CB90
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0086BB4E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID:
                                      • API String ID: 1385522511-0
                                      • Opcode ID: 9b645f89b5cb2d1f8a83153a25b48103b8a9e728f41ace376734c7cfc5b21c26
                                      • Instruction ID: a51ec20c5c9a314ae4e341aaa5e5c5bedf89ea5102dcb1a060bfb131407da7a4
                                      • Opcode Fuzzy Hash: 9b645f89b5cb2d1f8a83153a25b48103b8a9e728f41ace376734c7cfc5b21c26
                                      • Instruction Fuzzy Hash: 8C328831A042099FDB24CF58C894ABAB7B9FF48358F168069E905EB361D774ED81CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LoadString
                                      • String ID:
                                      • API String ID: 2948472770-0
                                      • Opcode ID: 3bc3d766dafe72f1389ee26e3275d88eda7f7c31f04523b21faf6b4192c00be6
                                      • Instruction ID: c960250d223ca485d812696d688116a4db12609c851abb20a898d655899fcf26
                                      • Opcode Fuzzy Hash: 3bc3d766dafe72f1389ee26e3275d88eda7f7c31f04523b21faf6b4192c00be6
                                      • Instruction Fuzzy Hash: A0D16C34A0424AEFCB14EF99C8819ADBBB5FF49314F15415AE905EB391EB30AD81CF91
                                      APIs
                                        • Part of subcall function 01B4F1E0: GetFileAttributesW.KERNELBASE(?), ref: 01B4F1EB
                                      • CreateDirectoryW.KERNELBASE(?,00000000), ref: 01B4FAC3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: AttributesCreateDirectoryFile
                                      • String ID:
                                      • API String ID: 3401506121-0
                                      • Opcode ID: 09230641626f58d2440b91cf2196f42f3c302c73ddedf944f08b8523d271a23a
                                      • Instruction ID: fa7f09c419d160aa79e8b9e93b4d00ef38046d19f97d02b4ee9419c343d1b87a
                                      • Opcode Fuzzy Hash: 09230641626f58d2440b91cf2196f42f3c302c73ddedf944f08b8523d271a23a
                                      • Instruction Fuzzy Hash: EB518331A1120997EF14EFA4C854BEF7339EF58340F1085A9E609F7290EB799B44CBA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                      • Instruction ID: d17638ae0d2c5eaa40e19bd0b857c6512872afbf3e908f97dd626acab41d1a5e
                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                      • Instruction Fuzzy Hash: 27311274A00109DBC729CF5AD480969FBA2FF89304B24C2A5E909CF65AD731EEC1CBC0
                                      APIs
                                        • Part of subcall function 00864E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00864EDD,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864E9C
                                        • Part of subcall function 00864E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00864EAE
                                        • Part of subcall function 00864E90: FreeLibrary.KERNEL32(00000000,?,?,00864EDD,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864EC0
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864EFD
                                        • Part of subcall function 00864E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,008A3CDE,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864E62
                                        • Part of subcall function 00864E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00864E74
                                        • Part of subcall function 00864E59: FreeLibrary.KERNEL32(00000000,?,?,008A3CDE,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864E87
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressFreeProc
                                      • String ID:
                                      • API String ID: 2632591731-0
                                      • Opcode ID: 7cea03b73ad3ce4cd6f1a679ba3b512b2af2e08a0c28a2f8769f4418976eb0f4
                                      • Instruction ID: 8117e7d640c64c12822f941bae4fd3bc457f228dd8b4a395cc06548942700f2e
                                      • Opcode Fuzzy Hash: 7cea03b73ad3ce4cd6f1a679ba3b512b2af2e08a0c28a2f8769f4418976eb0f4
                                      • Instruction Fuzzy Hash: D011E332600209EADB15BB78DC02FAD77A5FF40720F21842EF542EA1C1EE719A059792
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: __wsopen_s
                                      • String ID:
                                      • API String ID: 3347428461-0
                                      • Opcode ID: a68ac53927176083dfc9bcb21fafae6f24d9a0fe4ec2f6b28d4c8dffea3c6db7
                                      • Instruction ID: 769761bccac91061181a5477c8c6fc70fe667bdf65b692a3af5d48affa3fbdbb
                                      • Opcode Fuzzy Hash: a68ac53927176083dfc9bcb21fafae6f24d9a0fe4ec2f6b28d4c8dffea3c6db7
                                      • Instruction Fuzzy Hash: C711187590410AEFCF05DF58E94199A7BF9FF49314F144069F808EB312DA31DA11CBA5
                                      APIs
                                        • Part of subcall function 00894C7D: RtlAllocateHeap.NTDLL(00000008,00861129,00000000,?,00892E29,00000001,00000364,?,?,?,0088F2DE,00893863,00931444,?,0087FDF5,?), ref: 00894CBE
                                      • _free.LIBCMT ref: 0089506C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AllocateHeap_free
                                      • String ID:
                                      • API String ID: 614378929-0
                                      • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                      • Instruction ID: 973ee3fb03f5659f0a987c7c9a951acbc6993dece087020d4baa2845c8e8b787
                                      • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                      • Instruction Fuzzy Hash: 29012B72204B056BE722DE599841A5AFBE8FB85370F29061DE184C3280E6306805C7B4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                      • Instruction ID: a50052d66fb8c18a3733b443e019f1cc61e40c2e297ad62067c1ebf758e3763e
                                      • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                      • Instruction Fuzzy Hash: 07F0F432510A14AADA317E6D8C05B5A3798FF72334F180715F425D22E2EB70A802C7A7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID:
                                      • API String ID: 176396367-0
                                      • Opcode ID: 925dd5c5bacb953470c4b1c403d787b0688307d40fd5fb7636ab76acd22fdb11
                                      • Instruction ID: 45b14f81ce5cdd911dcdcc354d2dbce6bd824891af7db059fbc4341772c721ec
                                      • Opcode Fuzzy Hash: 925dd5c5bacb953470c4b1c403d787b0688307d40fd5fb7636ab76acd22fdb11
                                      • Instruction Fuzzy Hash: 2DF0A4B36006056ED7249F2DD806A67BB98FB44760F10852AF619CB1D1DB31E5148BA0
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,00861129,00000000,?,00892E29,00000001,00000364,?,?,?,0088F2DE,00893863,00931444,?,0087FDF5,?), ref: 00894CBE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 4ee2498791704d3151ce6f19e510c11bbd6b400e4b61766bd4dbf284b92f0e89
                                      • Instruction ID: d38b253ac5fd1b82fd050178c811427f0aa65ef2e76139e45398af301c180753
                                      • Opcode Fuzzy Hash: 4ee2498791704d3151ce6f19e510c11bbd6b400e4b61766bd4dbf284b92f0e89
                                      • Instruction Fuzzy Hash: A7F0E9326062286FDF217F769D05F5A3788FF817B9B1C6215B815E6191CB70D80286E1
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,00931444,?,0087FDF5,?,?,0086A976,00000010,00931440,008613FC,?,008613C6,?,00861129), ref: 00893852
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 266e436d6639ec766a9ca5469ee856dbf84098e6e8dcceacfcbaabb918262c9c
                                      • Instruction ID: ae89d8b8dd03ae013485e3fc4d45b7037d3757a2690ed43ccdccf6e30857e7fc
                                      • Opcode Fuzzy Hash: 266e436d6639ec766a9ca5469ee856dbf84098e6e8dcceacfcbaabb918262c9c
                                      • Instruction Fuzzy Hash: E6E0ED32100229A7EE213A7B9D04B9A3689FF427B4F0D0031BD15F2991CB60DE0192E2
                                      APIs
                                      • FreeLibrary.KERNEL32(?,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864F6D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 55587f56da73f15f3f8ddc290714ea917f14de40b5dbf6272c67c870ecd290af
                                      • Instruction ID: 33715442ab5af96e0328afbc93606f5895f7969feaf402c7811b6898d6543c36
                                      • Opcode Fuzzy Hash: 55587f56da73f15f3f8ddc290714ea917f14de40b5dbf6272c67c870ecd290af
                                      • Instruction Fuzzy Hash: 06F03071105751CFDB399F64D490C2AB7E4FF24319311997EE1DAC2511CB319844DF10
                                      APIs
                                      • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,008AEE51,00923630,00000002), ref: 008CCD26
                                        • Part of subcall function 008CCC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,008CCD19,?,?,?), ref: 008CCC59
                                        • Part of subcall function 008CCC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,008CCD19,?,?,?,?,008AEE51,00923630,00000002), ref: 008CCC6E
                                        • Part of subcall function 008CCC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,008CCD19,?,?,?,?,008AEE51,00923630,00000002), ref: 008CCC7A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: File$Pointer$Write
                                      • String ID:
                                      • API String ID: 3847668363-0
                                      • Opcode ID: 2c9d098a81e7aab132fdb7fb1657fed96c703dd746e9cb09e5d7853f27f4ac71
                                      • Instruction ID: 0deaaa9452be36eab94e853ed649697c4801c88021e82a10f5c770e78ea44c5f
                                      • Opcode Fuzzy Hash: 2c9d098a81e7aab132fdb7fb1657fed96c703dd746e9cb09e5d7853f27f4ac71
                                      • Instruction Fuzzy Hash: 6DE06576400704EFC7219F5ADD00CAABBF8FF84360710852FE956C2110D371EA54DB60
                                      APIs
                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00862DC4
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LongNamePath_wcslen
                                      • String ID:
                                      • API String ID: 541455249-0
                                      • Opcode ID: 7dee888f37e52b5bac1c899d2c9e07fe477110eb0b341c19c9a8c2ca05119d37
                                      • Instruction ID: d774425025750aa1bf72be3975d2f15e29713ec369c795cde09a733dd1e5376e
                                      • Opcode Fuzzy Hash: 7dee888f37e52b5bac1c899d2c9e07fe477110eb0b341c19c9a8c2ca05119d37
                                      • Instruction Fuzzy Hash: 56E0CD766001245BCB11965C9C05FEA77DDFFC87A0F054071FD09D7248DA70AD80C551
                                      APIs
                                        • Part of subcall function 00863837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00863908
                                        • Part of subcall function 0086D730: GetInputState.USER32 ref: 0086D807
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00862B6B
                                        • Part of subcall function 008630F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0086314E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                      • String ID:
                                      • API String ID: 3667716007-0
                                      • Opcode ID: 4cfb66b994af142ef36652f531e1630e27e1cf78f02173a2cf442ede6c657811
                                      • Instruction ID: f8f134a1eceb34d24f51df6b9ffc3085fb387b79a4ad2e51ba072fd317478d32
                                      • Opcode Fuzzy Hash: 4cfb66b994af142ef36652f531e1630e27e1cf78f02173a2cf442ede6c657811
                                      • Instruction Fuzzy Hash: DAE0262130424402C608BB7CA8168BDA349FBD1351F02043EF082C32B2CE2046498213
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?), ref: 01B4F1EB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                      • Instruction ID: 994533b7622bd1de00361582069ac8f974048cfc7a7ab7daae753eeee77669bf
                                      • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                      • Instruction Fuzzy Hash: 17E0867150520CEFD718CEACC804AB977A4D705310F108798F615C3180D6308940A614
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?), ref: 01B4F1BB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                      • Instruction ID: 4849982888589b02ae852d1ba466b354651e9a2bc41d3b8c6b0f345d2cb1dafc
                                      • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                      • Instruction Fuzzy Hash: BCD0A73090520CEBCB14CFBDDC049EA73A8D705320F008799FD15C3280D7319940A750
                                      APIs
                                      • CreateFileW.KERNELBASE(00000000,00000000,?,008A0704,?,?,00000000,?,008A0704,00000000,0000000C), ref: 008A03B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: c6899e9a5851495497fa4e71e77b664d0ef7ec5685dc2f4db9bf77fff04ae909
                                      • Instruction ID: 481e8bf994446d4654033d0487c6aa0047c99ec44e2a4219c8b691e1a7ec5e68
                                      • Opcode Fuzzy Hash: c6899e9a5851495497fa4e71e77b664d0ef7ec5685dc2f4db9bf77fff04ae909
                                      • Instruction Fuzzy Hash: F0D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014000BE1856020C732E971EB90
                                      APIs
                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00861CBC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: InfoParametersSystem
                                      • String ID:
                                      • API String ID: 3098949447-0
                                      • Opcode ID: f369d404304fdf72cbac02036d720a01d19afae15642dc4605114da970c3ed58
                                      • Instruction ID: 8ab2bee73a1439da8dcb51432bf12e604535e89f20e7ec479d153903e68f286c
                                      • Opcode Fuzzy Hash: f369d404304fdf72cbac02036d720a01d19afae15642dc4605114da970c3ed58
                                      • Instruction Fuzzy Hash: 46C09236298308AFF3148B90BD4AF207765B34CB01F048001F609AA5F3C3A22924FE50
                                      APIs
                                        • Part of subcall function 00865745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0086949C,?,00008000), ref: 00865773
                                      • GetLastError.KERNEL32(00000002,00000000), ref: 008D76DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateErrorFileLast
                                      • String ID:
                                      • API String ID: 1214770103-0
                                      • Opcode ID: c4536578778576e48c85abd1b898de2d88106d3bc8a3134b2ace6aa0d5ae4910
                                      • Instruction ID: 6119d7229c136ba40763a193ed6cc0e8730a7b0d74e6ea7804d50c499271bef6
                                      • Opcode Fuzzy Hash: c4536578778576e48c85abd1b898de2d88106d3bc8a3134b2ace6aa0d5ae4910
                                      • Instruction Fuzzy Hash: 7B817C306087019FC714EF28D491A69B7E5FF99314F05462EF8969B3A2EB30ED45CB92
                                      APIs
                                      • Sleep.KERNELBASE(000001F4), ref: 01B50BD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                      • Instruction ID: 5820e2fcd572ba6f92907ccf087b044cfdae70b48a306cf060a5a0f68d6deea0
                                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                      • Instruction Fuzzy Hash: 03E0BF7494410DEFDB00EFA4D5496DE7BB4EF04301F1005A1FD05D7681DB319E548A62
                                      APIs
                                      • CloseHandle.KERNELBASE(?,?,00000000,008A24E0), ref: 00866266
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: 622880a7af78538c6f55064085c0173e0daeef8fb326c3aa657583641fde5e98
                                      • Instruction ID: f7d0e93e50e69dd21daf9251ca5cd0ea3de36388345f8c8e3b507f88ca9fedb6
                                      • Opcode Fuzzy Hash: 622880a7af78538c6f55064085c0173e0daeef8fb326c3aa657583641fde5e98
                                      • Instruction Fuzzy Hash: 70E0B675400B01CFC3324F1AE814412FBF5FFE13653224A2ED0E592660E3B05896DF90
                                      APIs
                                      • Sleep.KERNELBASE(000001F4), ref: 01B50BD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                      • Instruction ID: e3f38b6f423c11e38b7d8cbf0a6636634d5c13bbddccc84efc1ceb87dec44df3
                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                      • Instruction Fuzzy Hash: 43E0E67494410DDFDB00EFB4D54969E7FB4EF04301F1001A1FD01D2281D7319D508A62
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 008F961A
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008F965B
                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 008F969F
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008F96C9
                                      • SendMessageW.USER32 ref: 008F96F2
                                      • GetKeyState.USER32(00000011), ref: 008F978B
                                      • GetKeyState.USER32(00000009), ref: 008F9798
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008F97AE
                                      • GetKeyState.USER32(00000010), ref: 008F97B8
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008F97E9
                                      • SendMessageW.USER32 ref: 008F9810
                                      • SendMessageW.USER32(?,00001030,?,008F7E95), ref: 008F9918
                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 008F992E
                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 008F9941
                                      • SetCapture.USER32(?), ref: 008F994A
                                      • ClientToScreen.USER32(?,?), ref: 008F99AF
                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008F99BC
                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008F99D6
                                      • ReleaseCapture.USER32 ref: 008F99E1
                                      • GetCursorPos.USER32(?), ref: 008F9A19
                                      • ScreenToClient.USER32(?,?), ref: 008F9A26
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 008F9A80
                                      • SendMessageW.USER32 ref: 008F9AAE
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 008F9AEB
                                      • SendMessageW.USER32 ref: 008F9B1A
                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 008F9B3B
                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 008F9B4A
                                      • GetCursorPos.USER32(?), ref: 008F9B68
                                      • ScreenToClient.USER32(?,?), ref: 008F9B75
                                      • GetParent.USER32(?), ref: 008F9B93
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 008F9BFA
                                      • SendMessageW.USER32 ref: 008F9C2B
                                      • ClientToScreen.USER32(?,?), ref: 008F9C84
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 008F9CB4
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 008F9CDE
                                      • SendMessageW.USER32 ref: 008F9D01
                                      • ClientToScreen.USER32(?,?), ref: 008F9D4E
                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 008F9D82
                                        • Part of subcall function 00879944: GetWindowLongW.USER32(?,000000EB), ref: 00879952
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F9E05
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                      • String ID: @GUI_DRAGID$F
                                      • API String ID: 3429851547-4164748364
                                      • Opcode ID: 5488e7656344174f1b6ff1453f018e145b22a2157e7d3ddac6e2bb21e739371b
                                      • Instruction ID: 4e69fecc435ad53ecc90ee12c6c9594e6361d8a3f8474159f42049c20c9e3032
                                      • Opcode Fuzzy Hash: 5488e7656344174f1b6ff1453f018e145b22a2157e7d3ddac6e2bb21e739371b
                                      • Instruction Fuzzy Hash: 9C426630208208AFDB24DF78C844BBABBE5FF58714F100619F699C72A1E735A964DF52
                                      APIs
                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008F48F3
                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 008F4908
                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 008F4927
                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 008F494B
                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 008F495C
                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 008F497B
                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008F49AE
                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008F49D4
                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 008F4A0F
                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 008F4A56
                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 008F4A7E
                                      • IsMenu.USER32(?), ref: 008F4A97
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008F4AF2
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008F4B20
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F4B94
                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 008F4BE3
                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 008F4C82
                                      • wsprintfW.USER32 ref: 008F4CAE
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008F4CC9
                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 008F4CF1
                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 008F4D13
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008F4D33
                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 008F4D5A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                      • String ID: %d/%02d/%02d
                                      • API String ID: 4054740463-328681919
                                      • Opcode ID: 3f16da9c1e3972683ef2acaa3035f63cfbcc466a4d25eb8af5eca90d6b32def0
                                      • Instruction ID: 863db88c300602ccca12a884e30560adf9ce4fa9d1d1699cd0f183eebd3ab57c
                                      • Opcode Fuzzy Hash: 3f16da9c1e3972683ef2acaa3035f63cfbcc466a4d25eb8af5eca90d6b32def0
                                      • Instruction Fuzzy Hash: 3912CF7160025CABEB249F38CC49FBF7BA8FF45714F10512AF61ADA2A1DB749A41CB50
                                      APIs
                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0087F998
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008BF474
                                      • IsIconic.USER32(00000000), ref: 008BF47D
                                      • ShowWindow.USER32(00000000,00000009), ref: 008BF48A
                                      • SetForegroundWindow.USER32(00000000), ref: 008BF494
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008BF4AA
                                      • GetCurrentThreadId.KERNEL32 ref: 008BF4B1
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008BF4BD
                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 008BF4CE
                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 008BF4D6
                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 008BF4DE
                                      • SetForegroundWindow.USER32(00000000), ref: 008BF4E1
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 008BF4F6
                                      • keybd_event.USER32(00000012,00000000), ref: 008BF501
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 008BF50B
                                      • keybd_event.USER32(00000012,00000000), ref: 008BF510
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 008BF519
                                      • keybd_event.USER32(00000012,00000000), ref: 008BF51E
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 008BF528
                                      • keybd_event.USER32(00000012,00000000), ref: 008BF52D
                                      • SetForegroundWindow.USER32(00000000), ref: 008BF530
                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 008BF557
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 4125248594-2988720461
                                      • Opcode ID: 84928023c09315811c961f2edb7e70f9b833212aa258880109d2b288a1d1c91b
                                      • Instruction ID: 476671dec85c13e1a68c8ce6ba61222cbf6668e1c5abe7090405732a255d5019
                                      • Opcode Fuzzy Hash: 84928023c09315811c961f2edb7e70f9b833212aa258880109d2b288a1d1c91b
                                      • Instruction Fuzzy Hash: 4D312171A4021CBBEB216BB55D4AFBF7E6CFB44B50F100069FB05E61D1D6B15E10EA60
                                      APIs
                                        • Part of subcall function 008C16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008C170D
                                        • Part of subcall function 008C16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008C173A
                                        • Part of subcall function 008C16C3: GetLastError.KERNEL32 ref: 008C174A
                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 008C1286
                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 008C12A8
                                      • CloseHandle.KERNEL32(?), ref: 008C12B9
                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008C12D1
                                      • GetProcessWindowStation.USER32 ref: 008C12EA
                                      • SetProcessWindowStation.USER32(00000000), ref: 008C12F4
                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 008C1310
                                        • Part of subcall function 008C10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008C11FC), ref: 008C10D4
                                        • Part of subcall function 008C10BF: CloseHandle.KERNEL32(?,?,008C11FC), ref: 008C10E9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                      • String ID: $default$winsta0
                                      • API String ID: 22674027-1027155976
                                      • Opcode ID: c2e2dbd402124f0f32dde374ac2b683b306439ec27f109810eb9000ddda5db6c
                                      • Instruction ID: 97a8ababb78d6c818d4d6e619d6b422da28695acc9a6617ced790f1369cad9eb
                                      • Opcode Fuzzy Hash: c2e2dbd402124f0f32dde374ac2b683b306439ec27f109810eb9000ddda5db6c
                                      • Instruction Fuzzy Hash: 46817871900209ABDF259FA8DD89FEE7BBAFF05704F144169F910E62A2D734CA44CB25
                                      APIs
                                        • Part of subcall function 008C10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008C1114
                                        • Part of subcall function 008C10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C1120
                                        • Part of subcall function 008C10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C112F
                                        • Part of subcall function 008C10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C1136
                                        • Part of subcall function 008C10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008C114D
                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008C0BCC
                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008C0C00
                                      • GetLengthSid.ADVAPI32(?), ref: 008C0C17
                                      • GetAce.ADVAPI32(?,00000000,?), ref: 008C0C51
                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008C0C6D
                                      • GetLengthSid.ADVAPI32(?), ref: 008C0C84
                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 008C0C8C
                                      • HeapAlloc.KERNEL32(00000000), ref: 008C0C93
                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008C0CB4
                                      • CopySid.ADVAPI32(00000000), ref: 008C0CBB
                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008C0CEA
                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008C0D0C
                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008C0D1E
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C0D45
                                      • HeapFree.KERNEL32(00000000), ref: 008C0D4C
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C0D55
                                      • HeapFree.KERNEL32(00000000), ref: 008C0D5C
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C0D65
                                      • HeapFree.KERNEL32(00000000), ref: 008C0D6C
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 008C0D78
                                      • HeapFree.KERNEL32(00000000), ref: 008C0D7F
                                        • Part of subcall function 008C1193: GetProcessHeap.KERNEL32(00000008,008C0BB1,?,00000000,?,008C0BB1,?), ref: 008C11A1
                                        • Part of subcall function 008C1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,008C0BB1,?), ref: 008C11A8
                                        • Part of subcall function 008C1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,008C0BB1,?), ref: 008C11B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                      • String ID:
                                      • API String ID: 4175595110-0
                                      • Opcode ID: 5bb6bc13b804d3029a754f4e05bc67e3ef216abf62747a6b852f79711982ab54
                                      • Instruction ID: f4f88baefa69540c2ff51aff4d9d645a26f7c5618b485436dc081bd0784ea132
                                      • Opcode Fuzzy Hash: 5bb6bc13b804d3029a754f4e05bc67e3ef216abf62747a6b852f79711982ab54
                                      • Instruction Fuzzy Hash: 81714A7290020AEBDF109FA4DD44FAEBBB8FF04740F144619EA15E6191D775EA05CF60
                                      APIs
                                      • OpenClipboard.USER32(008FCC08), ref: 008DEB29
                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 008DEB37
                                      • GetClipboardData.USER32(0000000D), ref: 008DEB43
                                      • CloseClipboard.USER32 ref: 008DEB4F
                                      • GlobalLock.KERNEL32(00000000), ref: 008DEB87
                                      • CloseClipboard.USER32 ref: 008DEB91
                                      • GlobalUnlock.KERNEL32(00000000), ref: 008DEBBC
                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 008DEBC9
                                      • GetClipboardData.USER32(00000001), ref: 008DEBD1
                                      • GlobalLock.KERNEL32(00000000), ref: 008DEBE2
                                      • GlobalUnlock.KERNEL32(00000000), ref: 008DEC22
                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 008DEC38
                                      • GetClipboardData.USER32(0000000F), ref: 008DEC44
                                      • GlobalLock.KERNEL32(00000000), ref: 008DEC55
                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 008DEC77
                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 008DEC94
                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 008DECD2
                                      • GlobalUnlock.KERNEL32(00000000), ref: 008DECF3
                                      • CountClipboardFormats.USER32 ref: 008DED14
                                      • CloseClipboard.USER32 ref: 008DED59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                      • String ID:
                                      • API String ID: 420908878-0
                                      • Opcode ID: 4548af1c260eaa2807bc7afbc87a5c433d3854a79d10567d7bf221a87851ee1f
                                      • Instruction ID: 0a19c4579d387d74d2d182b59554c9534062f8b499a13dabe059472fc74c6b1c
                                      • Opcode Fuzzy Hash: 4548af1c260eaa2807bc7afbc87a5c433d3854a79d10567d7bf221a87851ee1f
                                      • Instruction Fuzzy Hash: AE617B342082099FD310EF28D985F3A77A9FB94714F15461EF456DB3A1DB31EA09CB62
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 008D69BE
                                      • FindClose.KERNEL32(00000000), ref: 008D6A12
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008D6A4E
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008D6A75
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 008D6AB2
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 008D6ADF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                      • API String ID: 3830820486-3289030164
                                      • Opcode ID: a9b4f449fa721a9fe9e6f551a45c87bdca5be2baece0dba549f4485ea9a0184e
                                      • Instruction ID: a05140412db6611906cc995d71fb280feed33111ea3d7e48b3d60135b0920aef
                                      • Opcode Fuzzy Hash: a9b4f449fa721a9fe9e6f551a45c87bdca5be2baece0dba549f4485ea9a0184e
                                      • Instruction Fuzzy Hash: 69D13C72508344AAC710EBA4C981EABB7ECFF98704F44491EF589D7291EB74DA44CB63
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 008D9663
                                      • GetFileAttributesW.KERNEL32(?), ref: 008D96A1
                                      • SetFileAttributesW.KERNEL32(?,?), ref: 008D96BB
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 008D96D3
                                      • FindClose.KERNEL32(00000000), ref: 008D96DE
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 008D96FA
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D974A
                                      • SetCurrentDirectoryW.KERNEL32(00926B7C), ref: 008D9768
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 008D9772
                                      • FindClose.KERNEL32(00000000), ref: 008D977F
                                      • FindClose.KERNEL32(00000000), ref: 008D978F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                      • String ID: *.*
                                      • API String ID: 1409584000-438819550
                                      • Opcode ID: 1e0985e58879ee3e352b1d036032baae3edebf4f62fe145ac245ce7e0a855d7d
                                      • Instruction ID: 5c236dd6d9b827262d160e1ac6c541f48a2c62d6f122669ebb830ecb4260437f
                                      • Opcode Fuzzy Hash: 1e0985e58879ee3e352b1d036032baae3edebf4f62fe145ac245ce7e0a855d7d
                                      • Instruction Fuzzy Hash: 1B31C03254121E6ADF14AFB4ED08EEE77ACFF49320F104256F855E22A0DB30DA44CB10
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 008D97BE
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 008D9819
                                      • FindClose.KERNEL32(00000000), ref: 008D9824
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 008D9840
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D9890
                                      • SetCurrentDirectoryW.KERNEL32(00926B7C), ref: 008D98AE
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 008D98B8
                                      • FindClose.KERNEL32(00000000), ref: 008D98C5
                                      • FindClose.KERNEL32(00000000), ref: 008D98D5
                                        • Part of subcall function 008CDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 008CDB00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                      • String ID: *.*
                                      • API String ID: 2640511053-438819550
                                      • Opcode ID: 5c50f82982bf28ab67a38bcdfafdf69c63ce64dff6df667816e013e95b042e4b
                                      • Instruction ID: e3eba200df133424e6be91d368a304efe21b9f535697248ce54d8f4bac2a85de
                                      • Opcode Fuzzy Hash: 5c50f82982bf28ab67a38bcdfafdf69c63ce64dff6df667816e013e95b042e4b
                                      • Instruction Fuzzy Hash: 1131C33254021D6EDF10AFB4EC48EEE77ACFF46724F144266E890E22A0DB31DA44DB20
                                      APIs
                                      • GetLocalTime.KERNEL32(?), ref: 008D8257
                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 008D8267
                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 008D8273
                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008D8310
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D8324
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D8356
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008D838C
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D8395
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CurrentDirectoryTime$File$Local$System
                                      • String ID: *.*
                                      • API String ID: 1464919966-438819550
                                      • Opcode ID: 183ac2919a71af2491c299559bbe77f921366f7850795d76f89bad845785e855
                                      • Instruction ID: 03b780499e4d24101276d6d65f4639b2e1b0b6f08060fc2d08147cc85916e0b8
                                      • Opcode Fuzzy Hash: 183ac2919a71af2491c299559bbe77f921366f7850795d76f89bad845785e855
                                      • Instruction Fuzzy Hash: 466137725043459FCB14EF68C8449AEB3E8FF89314F04892EF999D7251EB31E945CB92
                                      APIs
                                        • Part of subcall function 00863AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00863A97,?,?,00862E7F,?,?,?,00000000), ref: 00863AC2
                                        • Part of subcall function 008CE199: GetFileAttributesW.KERNEL32(?,008CCF95), ref: 008CE19A
                                      • FindFirstFileW.KERNEL32(?,?), ref: 008CD122
                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 008CD1DD
                                      • MoveFileW.KERNEL32(?,?), ref: 008CD1F0
                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 008CD20D
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 008CD237
                                        • Part of subcall function 008CD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,008CD21C,?,?), ref: 008CD2B2
                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 008CD253
                                      • FindClose.KERNEL32(00000000), ref: 008CD264
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                      • String ID: \*.*
                                      • API String ID: 1946585618-1173974218
                                      • Opcode ID: 78de0a84a85a31cc46e128eb4c7c380118c838c08be4905039dcc9e6ac50fdd9
                                      • Instruction ID: 2cf336f905af74acccf97c451b8e669fc5e4a9fb9418905b34094054de33b62e
                                      • Opcode Fuzzy Hash: 78de0a84a85a31cc46e128eb4c7c380118c838c08be4905039dcc9e6ac50fdd9
                                      • Instruction Fuzzy Hash: B7614B3180120DAACF05EBE4DA92EEDB7B9FF15300F254169E441B7191EB30AF09DB62
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                      • String ID:
                                      • API String ID: 1737998785-0
                                      • Opcode ID: 1c7a6c0750f4d67d8f57bb9669c020b8aa6b658846538ea7ce8793b0f544f193
                                      • Instruction ID: 780eb403d18c83716e40ab7d2b00883d46f175019b859f351d337d051184cb03
                                      • Opcode Fuzzy Hash: 1c7a6c0750f4d67d8f57bb9669c020b8aa6b658846538ea7ce8793b0f544f193
                                      • Instruction Fuzzy Hash: 05417A35208611AFD720EF29D888F29BBA1FF44318F14819AE459CF762CB75ED41CB90
                                      APIs
                                        • Part of subcall function 008C16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008C170D
                                        • Part of subcall function 008C16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008C173A
                                        • Part of subcall function 008C16C3: GetLastError.KERNEL32 ref: 008C174A
                                      • ExitWindowsEx.USER32(?,00000000), ref: 008CE932
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                      • String ID: $ $@$SeShutdownPrivilege
                                      • API String ID: 2234035333-3163812486
                                      • Opcode ID: f0cc547f424f84fbc9f87ddd381f2525e3dfbe30a3d278522ad845c6d94ae449
                                      • Instruction ID: dfbd680e849721e6f6999c40a97b9f0413e2a3f3b1818f9b6f266d82dda4bae1
                                      • Opcode Fuzzy Hash: f0cc547f424f84fbc9f87ddd381f2525e3dfbe30a3d278522ad845c6d94ae449
                                      • Instruction Fuzzy Hash: 7B014932610218ABEB5426B89C8AFBFB67CF715744F140529FC03E31D2DAB0DC48C2A0
                                      APIs
                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 008E1276
                                      • WSAGetLastError.WSOCK32 ref: 008E1283
                                      • bind.WSOCK32(00000000,?,00000010), ref: 008E12BA
                                      • WSAGetLastError.WSOCK32 ref: 008E12C5
                                      • closesocket.WSOCK32(00000000), ref: 008E12F4
                                      • listen.WSOCK32(00000000,00000005), ref: 008E1303
                                      • WSAGetLastError.WSOCK32 ref: 008E130D
                                      • closesocket.WSOCK32(00000000), ref: 008E133C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                      • String ID:
                                      • API String ID: 540024437-0
                                      • Opcode ID: 9ad3d449cc931c273f76c852bd97a3271125bb1ff76067819c12cc27644bab4e
                                      • Instruction ID: 4b510a1b5b27545238e9d47f380589c2e786c03106b8e989f6eefd3bc55686f9
                                      • Opcode Fuzzy Hash: 9ad3d449cc931c273f76c852bd97a3271125bb1ff76067819c12cc27644bab4e
                                      • Instruction Fuzzy Hash: 14418F316001449FDB10DF69C988B69BBE5FF46318F188198E956DF292C771ED81CBE1
                                      APIs
                                      • _free.LIBCMT ref: 0089B9D4
                                      • _free.LIBCMT ref: 0089B9F8
                                      • _free.LIBCMT ref: 0089BB7F
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00903700), ref: 0089BB91
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0093121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0089BC09
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00931270,000000FF,?,0000003F,00000000,?), ref: 0089BC36
                                      • _free.LIBCMT ref: 0089BD4B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                      • String ID:
                                      • API String ID: 314583886-0
                                      • Opcode ID: f5cf8394752b90c8b2e8008416bdaaf172cc522d1c31049074a9a9e5c823d978
                                      • Instruction ID: c622ab272f20f6baf46c56aa0bec0da15c532da7f411c545ab1cb0a5fc5e1e84
                                      • Opcode Fuzzy Hash: f5cf8394752b90c8b2e8008416bdaaf172cc522d1c31049074a9a9e5c823d978
                                      • Instruction Fuzzy Hash: 31C10771A04219AFDF20FF68AE41BAA7BE9FF41320F1C416AE494D7291E7309E41DB51
                                      APIs
                                        • Part of subcall function 00863AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00863A97,?,?,00862E7F,?,?,?,00000000), ref: 00863AC2
                                        • Part of subcall function 008CE199: GetFileAttributesW.KERNEL32(?,008CCF95), ref: 008CE19A
                                      • FindFirstFileW.KERNEL32(?,?), ref: 008CD420
                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 008CD470
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 008CD481
                                      • FindClose.KERNEL32(00000000), ref: 008CD498
                                      • FindClose.KERNEL32(00000000), ref: 008CD4A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                      • String ID: \*.*
                                      • API String ID: 2649000838-1173974218
                                      • Opcode ID: 05f3f3c1cfed4f8e8609ad8ab9eb19a9673596ba61982835f595856dcc62fa35
                                      • Instruction ID: b60f00b04f05c014933fdb686a92989cccb86d805e85a9743e629d68c1aa97e4
                                      • Opcode Fuzzy Hash: 05f3f3c1cfed4f8e8609ad8ab9eb19a9673596ba61982835f595856dcc62fa35
                                      • Instruction Fuzzy Hash: 8B315A310083459BC209EF68D991DAFB7A8FE92304F454A2DF4D5D3291EB30EA09DB67
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: __floor_pentium4
                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                      • API String ID: 4168288129-2761157908
                                      • Opcode ID: 5dfa2271f8e87094d5e02b5239876019cd7082c04cdb0750601997990558526c
                                      • Instruction ID: f476e141bc8a54e128978307b958cdae902f457745fc5ae60e5ae53395c4b525
                                      • Opcode Fuzzy Hash: 5dfa2271f8e87094d5e02b5239876019cd7082c04cdb0750601997990558526c
                                      • Instruction Fuzzy Hash: 9DC23871E086288FDF29EE289D407EAB7B5FB44305F1941EAD54DE7241E774AE818F40
                                      APIs
                                      • _wcslen.LIBCMT ref: 008D64DC
                                      • CoInitialize.OLE32(00000000), ref: 008D6639
                                      • CoCreateInstance.OLE32(008FFCF8,00000000,00000001,008FFB68,?), ref: 008D6650
                                      • CoUninitialize.OLE32 ref: 008D68D4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                      • String ID: .lnk
                                      • API String ID: 886957087-24824748
                                      • Opcode ID: ef8a688d9e00a27274c8fc09f0b582a5a8d8c77e32ba8be5f1779cea39175405
                                      • Instruction ID: ceb9096262f320df8ceea6ef85ee75c117f27b99ae72b1aa14c60f0661539e1a
                                      • Opcode Fuzzy Hash: ef8a688d9e00a27274c8fc09f0b582a5a8d8c77e32ba8be5f1779cea39175405
                                      • Instruction Fuzzy Hash: 45D13971508245AFC304EF28C881E6BB7E9FF94704F01496DF595CB291EB71E949CBA2
                                      APIs
                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 008E22E8
                                        • Part of subcall function 008DE4EC: GetWindowRect.USER32(?,?), ref: 008DE504
                                      • GetDesktopWindow.USER32 ref: 008E2312
                                      • GetWindowRect.USER32(00000000), ref: 008E2319
                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 008E2355
                                      • GetCursorPos.USER32(?), ref: 008E2381
                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008E23DF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                      • String ID:
                                      • API String ID: 2387181109-0
                                      • Opcode ID: 1e24dad0775678e2793b6d569808728885e503bd70cef7645e7a18a6c2f47cbf
                                      • Instruction ID: f990f89906c64e6a18028ca708397c1bad058e4c96d4be847dca08c2e3d7d5d3
                                      • Opcode Fuzzy Hash: 1e24dad0775678e2793b6d569808728885e503bd70cef7645e7a18a6c2f47cbf
                                      • Instruction Fuzzy Hash: 9431BE72504359ABC720DF65C845F6BBBAAFB89314F00091DF985D7291DA34EA08CB92
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 008D9B78
                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 008D9C8B
                                        • Part of subcall function 008D3874: GetInputState.USER32 ref: 008D38CB
                                        • Part of subcall function 008D3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008D3966
                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 008D9BA8
                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 008D9C75
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                      • String ID: *.*
                                      • API String ID: 1972594611-438819550
                                      • Opcode ID: b320af305dc5573025890f67c7e4037ee48872c69452ad7f63d34dd0a686155d
                                      • Instruction ID: 1b3debfff5a04c088deb4ffb2da145ce74acad734aa8f541709e1749d67029fb
                                      • Opcode Fuzzy Hash: b320af305dc5573025890f67c7e4037ee48872c69452ad7f63d34dd0a686155d
                                      • Instruction Fuzzy Hash: 7F41507194420AAFCF14DF68D945AEE7BB8FF05310F144156E445E32A1EB309E44CF61
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 84065295618406520561840652a5618406520561840652056184065205618406520561840652056184065205618406526561840652656184065285618406529561$ERCP$VUUU$VUUU$VUUU$VUUU
                                      • API String ID: 0-3228688113
                                      • Opcode ID: c56517d108cd99cada2bb499ef85f6a7bbd1cb676029230ef043675c07e43e9e
                                      • Instruction ID: 2f6e33a25a30670865e9af45b70e2169372d855da9125e1f286e9218ef99c2fe
                                      • Opcode Fuzzy Hash: c56517d108cd99cada2bb499ef85f6a7bbd1cb676029230ef043675c07e43e9e
                                      • Instruction Fuzzy Hash: 77A27E70A0061ACBEF24CF58C8447ADB7B1FF55314F2582AAE819E7784EB749D91CB90
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00879A4E
                                      • GetSysColor.USER32(0000000F), ref: 00879B23
                                      • SetBkColor.GDI32(?,00000000), ref: 00879B36
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Color$LongProcWindow
                                      • String ID:
                                      • API String ID: 3131106179-0
                                      • Opcode ID: be6b00c65d56e87110ab9a51b5f060f9aa9fabd7ac418e7845bfcda25496bdb9
                                      • Instruction ID: 0095736fb274e853d535c89ce224fa60d0a53050e8d6940ca314d94b8bb5fd1b
                                      • Opcode Fuzzy Hash: be6b00c65d56e87110ab9a51b5f060f9aa9fabd7ac418e7845bfcda25496bdb9
                                      • Instruction Fuzzy Hash: C9A1397010D528AEE728EA3C8C48EBB7A9DFB82354F158109F186C67EDCA25DD01D776
                                      APIs
                                        • Part of subcall function 008E304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008E307A
                                        • Part of subcall function 008E304E: _wcslen.LIBCMT ref: 008E309B
                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 008E185D
                                      • WSAGetLastError.WSOCK32 ref: 008E1884
                                      • bind.WSOCK32(00000000,?,00000010), ref: 008E18DB
                                      • WSAGetLastError.WSOCK32 ref: 008E18E6
                                      • closesocket.WSOCK32(00000000), ref: 008E1915
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                      • String ID:
                                      • API String ID: 1601658205-0
                                      • Opcode ID: 7af58d188c3ad3374b3e4df9bd6f2e18ad9f802f15b1311dbbce89ae7ee99f47
                                      • Instruction ID: 92f4e8bd79919c18a38c13ad386d3ec04dc28e77fef9d293b7672fa0e939ced8
                                      • Opcode Fuzzy Hash: 7af58d188c3ad3374b3e4df9bd6f2e18ad9f802f15b1311dbbce89ae7ee99f47
                                      • Instruction Fuzzy Hash: A1519371A002509FDB10AF28C88AF6A77A5FB45718F498098F946DF393D771AD41CBA2
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                      • String ID:
                                      • API String ID: 292994002-0
                                      • Opcode ID: a970f537998ad3fc5abc8dea9f9e6a2df27bdac611e09d785fc73805f06dd689
                                      • Instruction ID: acfe5736338833ac87e5622cd874554b8881a6cd9ecc0db7e526087396f62177
                                      • Opcode Fuzzy Hash: a970f537998ad3fc5abc8dea9f9e6a2df27bdac611e09d785fc73805f06dd689
                                      • Instruction Fuzzy Hash: E6218D31740219DFDB209F3AC888F7A7BA5FF95324B198068E946CB251CB75ED42CB91
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 008EA6AC
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 008EA6BA
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • Process32NextW.KERNEL32(00000000,?), ref: 008EA79C
                                      • CloseHandle.KERNEL32(00000000), ref: 008EA7AB
                                        • Part of subcall function 0087CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,008A3303,?), ref: 0087CE8A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                      • String ID:
                                      • API String ID: 1991900642-0
                                      • Opcode ID: 0ad3999a4684f2e8973e487ac3085ba2e4446ddff6e58ecaabd43ffca9a52a3b
                                      • Instruction ID: b89f2da0564d5237ccc6ae26baf4d43aeb29d900520a7fc98b18efe8e7548af6
                                      • Opcode Fuzzy Hash: 0ad3999a4684f2e8973e487ac3085ba2e4446ddff6e58ecaabd43ffca9a52a3b
                                      • Instruction Fuzzy Hash: FC513B715083509FD314DF29C886A6BBBE8FF89754F01892DF589D7291EB30E904CB92
                                      APIs
                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 008CAAAC
                                      • SetKeyboardState.USER32(00000080), ref: 008CAAC8
                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 008CAB36
                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 008CAB88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: KeyboardState$InputMessagePostSend
                                      • String ID:
                                      • API String ID: 432972143-0
                                      • Opcode ID: b2c3bdb039f3b3f197f4b021f3e5635158432875341dc31d9137640661f183d5
                                      • Instruction ID: ab71d0f411263f4dc454f9506ec873408a960a878c25f227ca4cdb79f7ac52ca
                                      • Opcode Fuzzy Hash: b2c3bdb039f3b3f197f4b021f3e5635158432875341dc31d9137640661f183d5
                                      • Instruction Fuzzy Hash: 1C31F370A4020CAEEB298A68CC05FFA7BB6FB54328F04421EF181D61D1D775CE81C762
                                      APIs
                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 008DCE89
                                      • GetLastError.KERNEL32(?,00000000), ref: 008DCEEA
                                      • SetEvent.KERNEL32(?,?,00000000), ref: 008DCEFE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorEventFileInternetLastRead
                                      • String ID:
                                      • API String ID: 234945975-0
                                      • Opcode ID: 2d33109786392b3783ce1d10d5c0b53b0340d1ab0784578c07c79136d8153e80
                                      • Instruction ID: 675820962afc87eb96a43bdd05da87246a881d24091c1063cbc855c9bdb4887d
                                      • Opcode Fuzzy Hash: 2d33109786392b3783ce1d10d5c0b53b0340d1ab0784578c07c79136d8153e80
                                      • Instruction Fuzzy Hash: 8921AFB150030A9BDB20DFA5C949BA777FCFB50358F10451EE546D2251EB70EE04DB60
                                      APIs
                                      • lstrlenW.KERNEL32(?,008A5222), ref: 008CDBCE
                                      • GetFileAttributesW.KERNEL32(?), ref: 008CDBDD
                                      • FindFirstFileW.KERNEL32(?,?), ref: 008CDBEE
                                      • FindClose.KERNEL32(00000000), ref: 008CDBFA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                      • String ID:
                                      • API String ID: 2695905019-0
                                      • Opcode ID: a1c6365b7b0129f15d29aff5ea48b1459839b878b28033e6b003a03db36637d7
                                      • Instruction ID: 014d7e00693838803fc855c136b9a033ff51aa91a5d8e6af340acb73791c8429
                                      • Opcode Fuzzy Hash: a1c6365b7b0129f15d29aff5ea48b1459839b878b28033e6b003a03db36637d7
                                      • Instruction Fuzzy Hash: 97F0A030810A185782207B78AE0DDBA377CFF01334B10471AF836C22E0EBB0AA94C695
                                      APIs
                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 008C82AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: lstrlen
                                      • String ID: ($|
                                      • API String ID: 1659193697-1631851259
                                      • Opcode ID: b3fbe77560f872e49560b91e1fb535ae7fbed13cd410ca475986a6d23ba9a7c2
                                      • Instruction ID: 8e62d4aba04a4466e001b393f7679618a23dd317cc90874a25790669274c20d6
                                      • Opcode Fuzzy Hash: b3fbe77560f872e49560b91e1fb535ae7fbed13cd410ca475986a6d23ba9a7c2
                                      • Instruction Fuzzy Hash: DC322275A00605DFCB28CF69C480E6AB7F0FF48710B15856EE59ADB7A1EB70E981CB44
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 008D5CC1
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 008D5D17
                                      • FindClose.KERNEL32(?), ref: 008D5D5F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Find$File$CloseFirstNext
                                      • String ID:
                                      • API String ID: 3541575487-0
                                      • Opcode ID: 8f6b23f73d4c2d2d219950544ef446ae5dee6f814859983524cb89a54f12b739
                                      • Instruction ID: 72d033fd82b015544d0a5c79145a535c09608186206cbc12c099a43f6fc75d43
                                      • Opcode Fuzzy Hash: 8f6b23f73d4c2d2d219950544ef446ae5dee6f814859983524cb89a54f12b739
                                      • Instruction Fuzzy Hash: 975179346046059FC714DF28C494EAAB7E5FF49314F14866EE99ACB3A1DB30E944CBA1
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 0089271A
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00892724
                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00892731
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                      • String ID:
                                      • API String ID: 3906539128-0
                                      • Opcode ID: 90e3c87b6620a26b8cbc11cc665e6256a0ee214bfc3db66d1f5264f361d7e047
                                      • Instruction ID: 2c0ac37b623a9f256750d2264f7a353d7bb800683f7497512f72f518698f0b89
                                      • Opcode Fuzzy Hash: 90e3c87b6620a26b8cbc11cc665e6256a0ee214bfc3db66d1f5264f361d7e047
                                      • Instruction Fuzzy Hash: 0C31C47495122CABCB21EF68DD88B9CB7B8FF08310F5041EAE41CA6260E7309F858F45
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 008D51DA
                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 008D5238
                                      • SetErrorMode.KERNEL32(00000000), ref: 008D52A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DiskFreeSpace
                                      • String ID:
                                      • API String ID: 1682464887-0
                                      • Opcode ID: 0510af7fd2e94a3f1b360d9fef891d52fd79c926536ed6866723da8a195ba962
                                      • Instruction ID: ee2d6406fa93cbe81b5e53571c3f9a498b48b7850307d65da09a236683ee5d15
                                      • Opcode Fuzzy Hash: 0510af7fd2e94a3f1b360d9fef891d52fd79c926536ed6866723da8a195ba962
                                      • Instruction Fuzzy Hash: 43316175A00518DFDB00DF54D884EADBBB4FF48314F058099E845DB392DB71E959CB91
                                      APIs
                                        • Part of subcall function 0087FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00880668
                                        • Part of subcall function 0087FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00880685
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008C170D
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008C173A
                                      • GetLastError.KERNEL32 ref: 008C174A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                      • String ID:
                                      • API String ID: 577356006-0
                                      • Opcode ID: ea052f6502bd6dc7dfacc5270b033b9dd85d7db5e9c247b00a7c9a5c3ed5b626
                                      • Instruction ID: 25f3daf182a9b2df5c8dd4e480d7ece8635d8ac716447b4c06739e60fbc73c7a
                                      • Opcode Fuzzy Hash: ea052f6502bd6dc7dfacc5270b033b9dd85d7db5e9c247b00a7c9a5c3ed5b626
                                      • Instruction Fuzzy Hash: 9B1182B1414208BFD7189F64DCC6E6ABBB9FB45754B20852EE05696246EB70FC41CA20
                                      APIs
                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 008CD608
                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 008CD645
                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 008CD650
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseControlCreateDeviceFileHandle
                                      • String ID:
                                      • API String ID: 33631002-0
                                      • Opcode ID: 536fd5d1f31022ee88d602e72b6fe77429ff09c4c3084ae504c40d37a7ccbb9c
                                      • Instruction ID: 616b2e9820424cd448f2272f0fe62e3b6ba65b1df4b2131124e3b6b2cd76e293
                                      • Opcode Fuzzy Hash: 536fd5d1f31022ee88d602e72b6fe77429ff09c4c3084ae504c40d37a7ccbb9c
                                      • Instruction Fuzzy Hash: 49113C75E05228BBDB109FA99D45FAFBBBCFB45B50F108126F904E7290D6704A05CBA1
                                      APIs
                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 008C168C
                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 008C16A1
                                      • FreeSid.ADVAPI32(?), ref: 008C16B1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                      • String ID:
                                      • API String ID: 3429775523-0
                                      • Opcode ID: 03b2750e2526b7e2e33896e33f439652c52b7f0a14cead541abcdb4cadf643cc
                                      • Instruction ID: 747fcfca87aff0cff837d468db71a6931038483f8c7df5dca3d842fbc5133906
                                      • Opcode Fuzzy Hash: 03b2750e2526b7e2e33896e33f439652c52b7f0a14cead541abcdb4cadf643cc
                                      • Instruction Fuzzy Hash: 69F0F47195030DFBDF00DFF49D89EAEBBBCFB08604F504965E501E2181E774AA449A54
                                      APIs
                                      • GetCurrentProcess.KERNEL32(008928E9,?,00884CBE,008928E9,009288B8,0000000C,00884E15,008928E9,00000002,00000000,?,008928E9), ref: 00884D09
                                      • TerminateProcess.KERNEL32(00000000,?,00884CBE,008928E9,009288B8,0000000C,00884E15,008928E9,00000002,00000000,?,008928E9), ref: 00884D10
                                      • ExitProcess.KERNEL32 ref: 00884D22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$CurrentExitTerminate
                                      • String ID:
                                      • API String ID: 1703294689-0
                                      • Opcode ID: 17a888fe8140dfb5136ac1bd465abd65932974ac6dd269048a78b330af1662e6
                                      • Instruction ID: 7e02713ae4727d54346cb7ebcaae349f28b2d3a8e1f3ad5f20c2b1f1aaa917d3
                                      • Opcode Fuzzy Hash: 17a888fe8140dfb5136ac1bd465abd65932974ac6dd269048a78b330af1662e6
                                      • Instruction Fuzzy Hash: 18E0B632000149ABCF12BF64DE09E687B69FB41781B144014FC06CA222DB35EE52DB80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /
                                      • API String ID: 0-2043925204
                                      • Opcode ID: 1cba93232f05992a5bdddf3f042bab38b68f1bdef3e2de0bb4579c39bb9c89ea
                                      • Instruction ID: 47825d0b19aacc7bcd48a5a679b84d494785deb81b0066739ce3309cd8814cfb
                                      • Opcode Fuzzy Hash: 1cba93232f05992a5bdddf3f042bab38b68f1bdef3e2de0bb4579c39bb9c89ea
                                      • Instruction Fuzzy Hash: AA413972900219AFCF24AFB9DC49EBB77B8FB84354F544269F905D7280E6719D81CB50
                                      APIs
                                      • GetUserNameW.ADVAPI32(?,?), ref: 008BD28C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: NameUser
                                      • String ID: X64
                                      • API String ID: 2645101109-893830106
                                      • Opcode ID: 1ff347c2496ee07de9a94e8c8b2b05c47c0b1e9e08ee8260741449a961d721b0
                                      • Instruction ID: 7d410c3093f0ca683d5ef62ea17d3a250d5b2027df4b159a0bd8d183d0e9b567
                                      • Opcode Fuzzy Hash: 1ff347c2496ee07de9a94e8c8b2b05c47c0b1e9e08ee8260741449a961d721b0
                                      • Instruction Fuzzy Hash: C6D0C9B580121DEACB94CBA0DC88DD9B37CFF14309F104155F10AE2100DB3096498F10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                      • Instruction ID: c291b345f708fcb01c2430b528aa4732f8eb7f6d0d94d43f74c632a7687017b0
                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                      • Instruction Fuzzy Hash: 7F020C71E002199BDF14DFA9D8806ADFBF2FF48314F25816AE919E7384D731AA41CB94
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 008D6918
                                      • FindClose.KERNEL32(00000000), ref: 008D6961
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: 3b32c1d25fbc968bf96b339b80946436d45f76ecb9846485ba4131e4574bd36b
                                      • Instruction ID: e6cabc0dc635dcb29e5b5397cea6c9ee214b7706d3f090e138db3425826cdcbc
                                      • Opcode Fuzzy Hash: 3b32c1d25fbc968bf96b339b80946436d45f76ecb9846485ba4131e4574bd36b
                                      • Instruction Fuzzy Hash: 7D1193316142049FC710DF69D484A26BBE5FF85328F15C69AE469CF3A2DB70EC05CB91
                                      APIs
                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,008E4891,?,?,00000035,?), ref: 008D37E4
                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,008E4891,?,?,00000035,?), ref: 008D37F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorFormatLastMessage
                                      • String ID:
                                      • API String ID: 3479602957-0
                                      • Opcode ID: f9cc82a31deb0535236c7bf17a5e23d8ac84c27f0ca2cbd024a433aafc27f256
                                      • Instruction ID: 63429ea93488b9c050d5c493dc82b062290f8aadab486ae41d4415c6c33fb335
                                      • Opcode Fuzzy Hash: f9cc82a31deb0535236c7bf17a5e23d8ac84c27f0ca2cbd024a433aafc27f256
                                      • Instruction Fuzzy Hash: A6F0E5B06052292AEB20177A8C4DFEB3BAEFFC5761F000276F509E22C1D9709A04C6B1
                                      APIs
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 008CB25D
                                      • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 008CB270
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: InputSendkeybd_event
                                      • String ID:
                                      • API String ID: 3536248340-0
                                      • Opcode ID: 51295cc534035fb1036fe73da3eb7b09365cfd0538c6b4749dfbd29a3c5356a5
                                      • Instruction ID: a4f8b12876959fb5b43248a655e7885ea1ef81c1ef8684556a6f2f30eb01e405
                                      • Opcode Fuzzy Hash: 51295cc534035fb1036fe73da3eb7b09365cfd0538c6b4749dfbd29a3c5356a5
                                      • Instruction Fuzzy Hash: CFF01D7180424DABDB059FA4C806BBE7BB4FF08309F008409F955A6191C379D615DF94
                                      APIs
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008C11FC), ref: 008C10D4
                                      • CloseHandle.KERNEL32(?,?,008C11FC), ref: 008C10E9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AdjustCloseHandlePrivilegesToken
                                      • String ID:
                                      • API String ID: 81990902-0
                                      • Opcode ID: ce3743471fc4eadd215a5565a565c76c372bc652aeb0b044982e935a4c789158
                                      • Instruction ID: 061fd22962c93b1548fcd56958ac397c164b95caca2e6682bf3b13716469045a
                                      • Opcode Fuzzy Hash: ce3743471fc4eadd215a5565a565c76c372bc652aeb0b044982e935a4c789158
                                      • Instruction Fuzzy Hash: 4AE04F32008600AEE7252B26FC09E737BA9FF04310F10C82DF5A5C04B6DB62AC90DB10
                                      Strings
                                      • Variable is not of type 'Object'., xrefs: 008B0C40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Variable is not of type 'Object'.
                                      • API String ID: 0-1840281001
                                      • Opcode ID: 841187087d82f0ab513687cae53e815413ccae02386e537e32cfe08b1f3b1588
                                      • Instruction ID: 1c7caa33d6306aa5214dd08c7a1df2bf540ed45fc798d3f26e329423967c7610
                                      • Opcode Fuzzy Hash: 841187087d82f0ab513687cae53e815413ccae02386e537e32cfe08b1f3b1588
                                      • Instruction Fuzzy Hash: D1327730900218DBCF14DF94D891AFEB7B5FF09308F258069E846EB292DB75AE45CB61
                                      APIs
                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00896766,?,?,00000008,?,?,0089FEFE,00000000), ref: 00896998
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID:
                                      • API String ID: 3997070919-0
                                      • Opcode ID: bb892f21236348d47f0f7d55d3d5c3e82b0fedfbc3d0c05c809da36a25507d56
                                      • Instruction ID: 74e8038dc23ec21e4a2af3cb14270e9fab399ce201f1a6975fcaf99298acbccf
                                      • Opcode Fuzzy Hash: bb892f21236348d47f0f7d55d3d5c3e82b0fedfbc3d0c05c809da36a25507d56
                                      • Instruction Fuzzy Hash: 85B15E31610608DFDB15DF28C48AB657BE0FF45368F29C658E89ADF2A2D335D9A1CB40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 48651891ed0f7787237e72c8eb83427ad46444d5bd3bf611af9710cc4bac46cf
                                      • Instruction ID: 2c57f6ef0dc07f5df1b62a38b2dba9d2ccff8e49aa7b57e1a32cb5566170794a
                                      • Opcode Fuzzy Hash: 48651891ed0f7787237e72c8eb83427ad46444d5bd3bf611af9710cc4bac46cf
                                      • Instruction Fuzzy Hash: F6123C75900229DBCB24CF58C880BEEB7F9FF48714F14819AE849EB355DB349A81CB95
                                      APIs
                                      • BlockInput.USER32(00000001), ref: 008DEABD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: BlockInput
                                      • String ID:
                                      • API String ID: 3456056419-0
                                      • Opcode ID: c317d59b83bac948c99420a3767292b160f46d064ab2e234b56d2fd6d8c77828
                                      • Instruction ID: 35e727d78796da2937942e0073e17e3e056c6815f7c986f3238fdc198177c7db
                                      • Opcode Fuzzy Hash: c317d59b83bac948c99420a3767292b160f46d064ab2e234b56d2fd6d8c77828
                                      • Instruction Fuzzy Hash: 08E01A312002159FC710EF69D804E9AB7E9FFA8764F01841AFC4ACB361DAB0A8408B91
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,008803EE), ref: 008809DA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 10c4a88b0fc47304e91b632b1d27acb74ea01cecf832add5d19960f8b27ead79
                                      • Instruction ID: 1b7b44cbb149d3c9e7f93c15b96ba098c95a200a791e6a11bb829217b4c3ceee
                                      • Opcode Fuzzy Hash: 10c4a88b0fc47304e91b632b1d27acb74ea01cecf832add5d19960f8b27ead79
                                      • Instruction Fuzzy Hash:
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0
                                      • API String ID: 0-4108050209
                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                      • Instruction ID: ab3841b89054d91ba6e7f4c4b98590884d10ba2c51ac561a893f0d5513bfba4f
                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                      • Instruction Fuzzy Hash: B9519B7160C7499BDB38B52C8C9D7BE2BB9FB12344F380539D886C7282D619EE01D35A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6af2569a1dad3be709091c791f3ab209395a9dec78dd48e01d58bc849de5afcd
                                      • Instruction ID: 5d45b18f34b7f4be6b14cdd6ee9feb8859cecdd6ae8d1058bd1ca7afc5812f0c
                                      • Opcode Fuzzy Hash: 6af2569a1dad3be709091c791f3ab209395a9dec78dd48e01d58bc849de5afcd
                                      • Instruction Fuzzy Hash: 7332F122D7DF014DDB23A634CC26336A649AFB73C5F19D737E81AB59A6EB29C4835100
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a38e3e944a436996d6e62025ee61393379143e3cad01475637bcb7da4231a9a
                                      • Instruction ID: 043a3ff6187619f259ac32d03c71a109a8645b940ec1fd647730b2847dbb0747
                                      • Opcode Fuzzy Hash: 2a38e3e944a436996d6e62025ee61393379143e3cad01475637bcb7da4231a9a
                                      • Instruction Fuzzy Hash: 45321332A041198BDF39CF29C4A0AFD7BA1FB85314F28856ED89ACB395D634DD81DB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 815a997b7e779459daff2477c1692cadf93d3e0dc5ba4610283d4a0122c6a33f
                                      • Instruction ID: b0ea52cb3344ca4557af69640e73a73c75cf13829d54e1482a80028176166d58
                                      • Opcode Fuzzy Hash: 815a997b7e779459daff2477c1692cadf93d3e0dc5ba4610283d4a0122c6a33f
                                      • Instruction Fuzzy Hash: 8022F2B0A04609DFEF14CFA8C881AAEB7F5FF45314F214129E816EB691EB359D50CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d466457de391430ab145fa9361e9b3976f157a42de67d1c275b43c23eaa7b1ce
                                      • Instruction ID: df2fb851861f5eb76cd9c53955d2e3193b3043e4c860abc7a6e6c84986747602
                                      • Opcode Fuzzy Hash: d466457de391430ab145fa9361e9b3976f157a42de67d1c275b43c23eaa7b1ce
                                      • Instruction Fuzzy Hash: EC02E6B1A00109EBDB04DF58D881AAEB7B5FF44304F118569E856DB391EB31EE11CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                      • Instruction ID: 19eb9dd19949ccd8edca0d3ec72a774cbb627ea8cf130895903aca99da31eb6b
                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                      • Instruction Fuzzy Hash: 2B9187722080A34ADF29563A853C17EFFE5FA923A131A079DD4F2CA1C1FE10D955D720
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                      • Instruction ID: f47f62af8c0171572479baef09984abf2902bd8c3ac7c919b9965f11f481f86f
                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                      • Instruction Fuzzy Hash: 019163722090A34ADF2D567A957C03DFFE9EA923B131A079ED4F2CA1C1FE14C5569720
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 770b2c7d63beae81c01e4e4047044fa64e934810c831c1bcc8ba91aa36aa8cdd
                                      • Instruction ID: 62a6b38b88ae1014485f3711357124dddf39ca69f238cfcf64509ef5f3354557
                                      • Opcode Fuzzy Hash: 770b2c7d63beae81c01e4e4047044fa64e934810c831c1bcc8ba91aa36aa8cdd
                                      • Instruction Fuzzy Hash: D9618A3120C71996DE38BA2C8D95BBE63B6FF51764F740919E843DB2C1DA11DE42C326
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 91944077cda06f88beafcfe2bad1d82ac2bc390a7d434b3478786efdab83536e
                                      • Instruction ID: afa51a2e97ae9b33906482fa908805ffa990495b1151768e53cd31ff71a2be18
                                      • Opcode Fuzzy Hash: 91944077cda06f88beafcfe2bad1d82ac2bc390a7d434b3478786efdab83536e
                                      • Instruction Fuzzy Hash: B0618B3164C70D97DE38BA2C4895BBF23B4FF52B44F301959E843DB285EA12ED428356
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                      • Instruction ID: de7a80f550bcc919465a42d1f3cffbb289c362e1df0a665f287026cc6d01f6ab
                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                      • Instruction Fuzzy Hash: 3F8184326080A309DF6D623A857D47EFFE5FA923A131A07ADD4F2CB1C5EE248555E720
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                      • Instruction ID: 1ced3d09af9fa93b326895b41b880236c8703b12b8b5f44a6b80bb2c0a84afa6
                                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                      • Instruction Fuzzy Hash: 1541C271D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 806528da07ba0cde31365d3c7fdf8581043303deed5595416382a7caf23e2230
                                      • Instruction ID: e492ad48b7ff4ef23e2ad0e9e34f7bf3dd77b62954a81d157208aa4037a5e268
                                      • Opcode Fuzzy Hash: 806528da07ba0cde31365d3c7fdf8581043303deed5595416382a7caf23e2230
                                      • Instruction Fuzzy Hash: 13219632620A158BD728CF79C82367A73E5F764324F15862EE4A7C37D0DE35A904DB40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                      • Instruction ID: dd89ab28897c09dfd7ffd03da01b4063198b0eb85e85cb9d7bf48b33585e7bac
                                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                      • Instruction Fuzzy Hash: 4B019278A00209EFCB89DF98C590AAEF7B5FB48310F2086D9DD09A7301D730AE51DB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                      • Instruction ID: 802085dbc6c4eb45b9b0792a5b7216b5b6bff9b0cdbe3cde44b2c154c2435965
                                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                      • Instruction Fuzzy Hash: D9018078A01109EFCB88DF98C590AAEF7B5FB88210F208699DC19A7301D730AE51DB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2031787943.0000000001B4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01B4E000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1b4e000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 008E2B30
                                      • DeleteObject.GDI32(00000000), ref: 008E2B43
                                      • DestroyWindow.USER32 ref: 008E2B52
                                      • GetDesktopWindow.USER32 ref: 008E2B6D
                                      • GetWindowRect.USER32(00000000), ref: 008E2B74
                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 008E2CA3
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 008E2CB1
                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2CF8
                                      • GetClientRect.USER32(00000000,?), ref: 008E2D04
                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 008E2D40
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2D62
                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2D75
                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2D80
                                      • GlobalLock.KERNEL32(00000000), ref: 008E2D89
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2D98
                                      • GlobalUnlock.KERNEL32(00000000), ref: 008E2DA1
                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2DA8
                                      • GlobalFree.KERNEL32(00000000), ref: 008E2DB3
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2DC5
                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,008FFC38,00000000), ref: 008E2DDB
                                      • GlobalFree.KERNEL32(00000000), ref: 008E2DEB
                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 008E2E11
                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 008E2E30
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E2E52
                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008E303F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                      • String ID: $AutoIt v3$DISPLAY$static
                                      • API String ID: 2211948467-2373415609
                                      • Opcode ID: 2a75428612a885ef92ac915c8eb3410acfe7b62d164ee18eeceea564d65852a2
                                      • Instruction ID: c87e04125f5bb885c17d57b0137f373e35b34d593ea478e07e0c8e612e3fec8a
                                      • Opcode Fuzzy Hash: 2a75428612a885ef92ac915c8eb3410acfe7b62d164ee18eeceea564d65852a2
                                      • Instruction Fuzzy Hash: 64027A71900209AFDB14DF69CD89EAE7BB9FB49314F008158F915EB2A1DB74AE41CF60
                                      APIs
                                      • SetTextColor.GDI32(?,00000000), ref: 008F712F
                                      • GetSysColorBrush.USER32(0000000F), ref: 008F7160
                                      • GetSysColor.USER32(0000000F), ref: 008F716C
                                      • SetBkColor.GDI32(?,000000FF), ref: 008F7186
                                      • SelectObject.GDI32(?,?), ref: 008F7195
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 008F71C0
                                      • GetSysColor.USER32(00000010), ref: 008F71C8
                                      • CreateSolidBrush.GDI32(00000000), ref: 008F71CF
                                      • FrameRect.USER32(?,?,00000000), ref: 008F71DE
                                      • DeleteObject.GDI32(00000000), ref: 008F71E5
                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 008F7230
                                      • FillRect.USER32(?,?,?), ref: 008F7262
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F7284
                                        • Part of subcall function 008F73E8: GetSysColor.USER32(00000012), ref: 008F7421
                                        • Part of subcall function 008F73E8: SetTextColor.GDI32(?,?), ref: 008F7425
                                        • Part of subcall function 008F73E8: GetSysColorBrush.USER32(0000000F), ref: 008F743B
                                        • Part of subcall function 008F73E8: GetSysColor.USER32(0000000F), ref: 008F7446
                                        • Part of subcall function 008F73E8: GetSysColor.USER32(00000011), ref: 008F7463
                                        • Part of subcall function 008F73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 008F7471
                                        • Part of subcall function 008F73E8: SelectObject.GDI32(?,00000000), ref: 008F7482
                                        • Part of subcall function 008F73E8: SetBkColor.GDI32(?,00000000), ref: 008F748B
                                        • Part of subcall function 008F73E8: SelectObject.GDI32(?,?), ref: 008F7498
                                        • Part of subcall function 008F73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008F74B7
                                        • Part of subcall function 008F73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008F74CE
                                        • Part of subcall function 008F73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008F74DB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                      • String ID:
                                      • API String ID: 4124339563-0
                                      • Opcode ID: 5a2b92351a6b1efc70fffe929cca60211c045c6285dd236fa08e8ed0786907fa
                                      • Instruction ID: aff59edb28cb6f15ccadc052819789a554ff2fa3013e81611a8df814127c19c6
                                      • Opcode Fuzzy Hash: 5a2b92351a6b1efc70fffe929cca60211c045c6285dd236fa08e8ed0786907fa
                                      • Instruction Fuzzy Hash: 4EA18072008309AFE7009F74DD48E7B7BA9FB89320F100A19FA62D61E1D771EA44CB61
                                      APIs
                                      • DestroyWindow.USER32(?,?), ref: 00878E14
                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 008B6AC5
                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 008B6AFE
                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 008B6F43
                                        • Part of subcall function 00878F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00878BE8,?,00000000,?,?,?,?,00878BBA,00000000,?), ref: 00878FC5
                                      • SendMessageW.USER32(?,00001053), ref: 008B6F7F
                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 008B6F96
                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 008B6FAC
                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 008B6FB7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                      • String ID: 0
                                      • API String ID: 2760611726-4108050209
                                      • Opcode ID: abd4390c0e1068db92a6bb64d22ea1cfc608f53c6b10ce69a5069abcd169541c
                                      • Instruction ID: a484e10b154ee28f7846719bcf3ed9c5be96b3fa9342c0a0b9175288dfd414ce
                                      • Opcode Fuzzy Hash: abd4390c0e1068db92a6bb64d22ea1cfc608f53c6b10ce69a5069abcd169541c
                                      • Instruction Fuzzy Hash: 52129C31604205DFDB25CF28D998BBABBE1FF44310F188469E489CB261DB35E962DF51
                                      APIs
                                      • DestroyWindow.USER32(00000000), ref: 008E273E
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 008E286A
                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008E28A9
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008E28B9
                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 008E2900
                                      • GetClientRect.USER32(00000000,?), ref: 008E290C
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 008E2955
                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 008E2964
                                      • GetStockObject.GDI32(00000011), ref: 008E2974
                                      • SelectObject.GDI32(00000000,00000000), ref: 008E2978
                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 008E2988
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008E2991
                                      • DeleteDC.GDI32(00000000), ref: 008E299A
                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008E29C6
                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 008E29DD
                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 008E2A1D
                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 008E2A31
                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 008E2A42
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 008E2A77
                                      • GetStockObject.GDI32(00000011), ref: 008E2A82
                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 008E2A8D
                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 008E2A97
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                      • API String ID: 2910397461-517079104
                                      • Opcode ID: 4670c6f2b80f75f7470889c25e45f44dde5b6467c583077b0d444dd987af0a66
                                      • Instruction ID: 3d77a62f0e2021153e7a742aceb3d1e765c377fb7e38db4aa48fe3ec9e2cae95
                                      • Opcode Fuzzy Hash: 4670c6f2b80f75f7470889c25e45f44dde5b6467c583077b0d444dd987af0a66
                                      • Instruction Fuzzy Hash: 38B15A71A10219AFEB14DFA8CD89FAE7BA9FB09714F004155F915EB2A0D774ED40CBA0
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 008D4AED
                                      • GetDriveTypeW.KERNEL32(?,008FCB68,?,\\.\,008FCC08), ref: 008D4BCA
                                      • SetErrorMode.KERNEL32(00000000,008FCB68,?,\\.\,008FCC08), ref: 008D4D36
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DriveType
                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                      • API String ID: 2907320926-4222207086
                                      • Opcode ID: 8178e791ae63624c4cf6799932f782271cf303cc68e8b8db7666353bbd828679
                                      • Instruction ID: ee8b18580c7e8b8f8c867c99fa07257e80c96b6f66e41d9c8c5bf3ab61524129
                                      • Opcode Fuzzy Hash: 8178e791ae63624c4cf6799932f782271cf303cc68e8b8db7666353bbd828679
                                      • Instruction Fuzzy Hash: A9619E3065620D9BCB14EB28DA82D7977B1FB84308B209617F806EBB95DF35ED41DB42
                                      APIs
                                      • GetSysColor.USER32(00000012), ref: 008F7421
                                      • SetTextColor.GDI32(?,?), ref: 008F7425
                                      • GetSysColorBrush.USER32(0000000F), ref: 008F743B
                                      • GetSysColor.USER32(0000000F), ref: 008F7446
                                      • CreateSolidBrush.GDI32(?), ref: 008F744B
                                      • GetSysColor.USER32(00000011), ref: 008F7463
                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 008F7471
                                      • SelectObject.GDI32(?,00000000), ref: 008F7482
                                      • SetBkColor.GDI32(?,00000000), ref: 008F748B
                                      • SelectObject.GDI32(?,?), ref: 008F7498
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 008F74B7
                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008F74CE
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 008F74DB
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008F752A
                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 008F7554
                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 008F7572
                                      • DrawFocusRect.USER32(?,?), ref: 008F757D
                                      • GetSysColor.USER32(00000011), ref: 008F758E
                                      • SetTextColor.GDI32(?,00000000), ref: 008F7596
                                      • DrawTextW.USER32(?,008F70F5,000000FF,?,00000000), ref: 008F75A8
                                      • SelectObject.GDI32(?,?), ref: 008F75BF
                                      • DeleteObject.GDI32(?), ref: 008F75CA
                                      • SelectObject.GDI32(?,?), ref: 008F75D0
                                      • DeleteObject.GDI32(?), ref: 008F75D5
                                      • SetTextColor.GDI32(?,?), ref: 008F75DB
                                      • SetBkColor.GDI32(?,?), ref: 008F75E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                      • String ID:
                                      • API String ID: 1996641542-0
                                      • Opcode ID: 7baff230db24d1afde70a2e60fd26507957fd69d64c3e64991d515402f75b8eb
                                      • Instruction ID: 5daf5fee796093b181754b1e1fcf3215bb14f394689799a4c1c069b3ee09cbde
                                      • Opcode Fuzzy Hash: 7baff230db24d1afde70a2e60fd26507957fd69d64c3e64991d515402f75b8eb
                                      • Instruction Fuzzy Hash: 00613E7290421CAFEB019FB4DD49EEE7FB9FB08320F114115FA15AB2A1D7759A50CBA0
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 008F1128
                                      • GetDesktopWindow.USER32 ref: 008F113D
                                      • GetWindowRect.USER32(00000000), ref: 008F1144
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F1199
                                      • DestroyWindow.USER32(?), ref: 008F11B9
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008F11ED
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008F120B
                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008F121D
                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 008F1232
                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 008F1245
                                      • IsWindowVisible.USER32(00000000), ref: 008F12A1
                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008F12BC
                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008F12D0
                                      • GetWindowRect.USER32(00000000,?), ref: 008F12E8
                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 008F130E
                                      • GetMonitorInfoW.USER32(00000000,?), ref: 008F1328
                                      • CopyRect.USER32(?,?), ref: 008F133F
                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 008F13AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                      • String ID: ($0$tooltips_class32
                                      • API String ID: 698492251-4156429822
                                      • Opcode ID: d80477913b7be71d1079ad806eb0467280f721a378ca4f0c3e3df384786b5826
                                      • Instruction ID: be452b8f52c9988c442393f46f6ed33c8550fe7873b1aa219ef3f3d7b6a99ffc
                                      • Opcode Fuzzy Hash: d80477913b7be71d1079ad806eb0467280f721a378ca4f0c3e3df384786b5826
                                      • Instruction Fuzzy Hash: 9CB16B71608345EFDB04DF74C988A6ABBE4FF84354F008918FA99DB2A1DB71D844CB92
                                      APIs
                                      • CharUpperBuffW.USER32(?,?), ref: 008F02E5
                                      • _wcslen.LIBCMT ref: 008F031F
                                      • _wcslen.LIBCMT ref: 008F0389
                                      • _wcslen.LIBCMT ref: 008F03F1
                                      • _wcslen.LIBCMT ref: 008F0475
                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008F04C5
                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008F0504
                                        • Part of subcall function 0087F9F2: _wcslen.LIBCMT ref: 0087F9FD
                                        • Part of subcall function 008C223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008C2258
                                        • Part of subcall function 008C223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008C228A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                      • API String ID: 1103490817-719923060
                                      • Opcode ID: 3d09d4035c12b64efb8cc2d4a63e8f963a398a59110610679ed16281c28bc777
                                      • Instruction ID: 54a915e39f8272512348f8137a560a18411e1421c69e3197784d8efbd8c86ae6
                                      • Opcode Fuzzy Hash: 3d09d4035c12b64efb8cc2d4a63e8f963a398a59110610679ed16281c28bc777
                                      • Instruction Fuzzy Hash: D8E18B312083098F8724DF28C55093AB7E6FF98318B15495DFA96EB3A6DB30ED45CB42
                                      APIs
                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00878968
                                      • GetSystemMetrics.USER32(00000007), ref: 00878970
                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0087899B
                                      • GetSystemMetrics.USER32(00000008), ref: 008789A3
                                      • GetSystemMetrics.USER32(00000004), ref: 008789C8
                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 008789E5
                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 008789F5
                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00878A28
                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00878A3C
                                      • GetClientRect.USER32(00000000,000000FF), ref: 00878A5A
                                      • GetStockObject.GDI32(00000011), ref: 00878A76
                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00878A81
                                        • Part of subcall function 0087912D: GetCursorPos.USER32(?), ref: 00879141
                                        • Part of subcall function 0087912D: ScreenToClient.USER32(00000000,?), ref: 0087915E
                                        • Part of subcall function 0087912D: GetAsyncKeyState.USER32(00000001), ref: 00879183
                                        • Part of subcall function 0087912D: GetAsyncKeyState.USER32(00000002), ref: 0087919D
                                      • SetTimer.USER32(00000000,00000000,00000028,008790FC), ref: 00878AA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                      • String ID: AutoIt v3 GUI
                                      • API String ID: 1458621304-248962490
                                      • Opcode ID: 775766cf4d141e7dfb2e3051115bc5dc9e7cf6f67cb98027ac1c4a2b198a7f08
                                      • Instruction ID: 7e0fe61129e1537f9389383337c37062a438db7e5ab6aed4e359b195a0256f09
                                      • Opcode Fuzzy Hash: 775766cf4d141e7dfb2e3051115bc5dc9e7cf6f67cb98027ac1c4a2b198a7f08
                                      • Instruction Fuzzy Hash: 83B16A71A00209DFDB14DFA8DD49BAA7BB5FB48314F108229FA19E72A0DB34E950CF55
                                      APIs
                                        • Part of subcall function 008C10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008C1114
                                        • Part of subcall function 008C10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C1120
                                        • Part of subcall function 008C10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C112F
                                        • Part of subcall function 008C10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C1136
                                        • Part of subcall function 008C10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008C114D
                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008C0DF5
                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008C0E29
                                      • GetLengthSid.ADVAPI32(?), ref: 008C0E40
                                      • GetAce.ADVAPI32(?,00000000,?), ref: 008C0E7A
                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008C0E96
                                      • GetLengthSid.ADVAPI32(?), ref: 008C0EAD
                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 008C0EB5
                                      • HeapAlloc.KERNEL32(00000000), ref: 008C0EBC
                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008C0EDD
                                      • CopySid.ADVAPI32(00000000), ref: 008C0EE4
                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008C0F13
                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008C0F35
                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008C0F47
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C0F6E
                                      • HeapFree.KERNEL32(00000000), ref: 008C0F75
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C0F7E
                                      • HeapFree.KERNEL32(00000000), ref: 008C0F85
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C0F8E
                                      • HeapFree.KERNEL32(00000000), ref: 008C0F95
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 008C0FA1
                                      • HeapFree.KERNEL32(00000000), ref: 008C0FA8
                                        • Part of subcall function 008C1193: GetProcessHeap.KERNEL32(00000008,008C0BB1,?,00000000,?,008C0BB1,?), ref: 008C11A1
                                        • Part of subcall function 008C1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,008C0BB1,?), ref: 008C11A8
                                        • Part of subcall function 008C1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,008C0BB1,?), ref: 008C11B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                      • String ID:
                                      • API String ID: 4175595110-0
                                      • Opcode ID: 7c202560448e8c8093b50f113b8f55b6e3378b6a18fc2aece8e75b4df5e73748
                                      • Instruction ID: e66539c983ccf7c607b14ac61a10f2a8dee1231eb5a6e3ff17b3810a07db9d13
                                      • Opcode Fuzzy Hash: 7c202560448e8c8093b50f113b8f55b6e3378b6a18fc2aece8e75b4df5e73748
                                      • Instruction Fuzzy Hash: 7C71347290020AEBDB209FA4DD48FAEBBB8FF05340F048119F959E6291DB31DA55CF60
                                      APIs
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008EC4BD
                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,008FCC08,00000000,?,00000000,?,?), ref: 008EC544
                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 008EC5A4
                                      • _wcslen.LIBCMT ref: 008EC5F4
                                      • _wcslen.LIBCMT ref: 008EC66F
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 008EC6B2
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 008EC7C1
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 008EC84D
                                      • RegCloseKey.ADVAPI32(?), ref: 008EC881
                                      • RegCloseKey.ADVAPI32(00000000), ref: 008EC88E
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 008EC960
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                      • API String ID: 9721498-966354055
                                      • Opcode ID: f6f99ee5c5c50402e3dd203832e030ab198c27e2c582b726dc739d2dce2a8da6
                                      • Instruction ID: 4de76320882e319033162ffe337b3d61dbf54571fb6bc317baacba4c4cc0d781
                                      • Opcode Fuzzy Hash: f6f99ee5c5c50402e3dd203832e030ab198c27e2c582b726dc739d2dce2a8da6
                                      • Instruction Fuzzy Hash: B61269356042519FC714DF19C885A2AB7E5FF89714F05889DF88ADB3A2DB31ED42CB82
                                      APIs
                                      • CharUpperBuffW.USER32(?,?), ref: 008F09C6
                                      • _wcslen.LIBCMT ref: 008F0A01
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008F0A54
                                      • _wcslen.LIBCMT ref: 008F0A8A
                                      • _wcslen.LIBCMT ref: 008F0B06
                                      • _wcslen.LIBCMT ref: 008F0B81
                                        • Part of subcall function 0087F9F2: _wcslen.LIBCMT ref: 0087F9FD
                                        • Part of subcall function 008C2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008C2BFA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                      • API String ID: 1103490817-4258414348
                                      • Opcode ID: 033464983259b254cba9df34607754963db43bb42d40ef2508edf2f460277b3b
                                      • Instruction ID: a3b0a03778d95e7c9074696101e0c7d499618785eecf246d6df4e207ebb35c1c
                                      • Opcode Fuzzy Hash: 033464983259b254cba9df34607754963db43bb42d40ef2508edf2f460277b3b
                                      • Instruction Fuzzy Hash: B2E169352083158FC714EF28C45092AB7E2FF98318B15895DF99AEB3A2D731ED45CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharUpper
                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                      • API String ID: 1256254125-909552448
                                      • Opcode ID: 1aa664a99df044f80ced7a4c83c3ef73aec8e828d2227d696826a12ae13a9cc4
                                      • Instruction ID: c08fabbefa87aaeeaedaf1aceb0c28e638263af8739f7d5660ce41a1db1c6e32
                                      • Opcode Fuzzy Hash: 1aa664a99df044f80ced7a4c83c3ef73aec8e828d2227d696826a12ae13a9cc4
                                      • Instruction Fuzzy Hash: 8B71E772E001BA8BCB20DE7EDD415BE3795FBA2764F210524F865E7284E631CD468391
                                      APIs
                                      • _wcslen.LIBCMT ref: 008F835A
                                      • _wcslen.LIBCMT ref: 008F836E
                                      • _wcslen.LIBCMT ref: 008F8391
                                      • _wcslen.LIBCMT ref: 008F83B4
                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008F83F2
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,008F5BF2), ref: 008F844E
                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008F8487
                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008F84CA
                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008F8501
                                      • FreeLibrary.KERNEL32(?), ref: 008F850D
                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 008F851D
                                      • DestroyIcon.USER32(?,?,?,?,?,008F5BF2), ref: 008F852C
                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 008F8549
                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 008F8555
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                      • String ID: .dll$.exe$.icl
                                      • API String ID: 799131459-1154884017
                                      • Opcode ID: 42faafffa07b0cef0e4f282f8831a890b0551182d5a7c0d080368e72836b9b6b
                                      • Instruction ID: 9c9102d4d5f91c5e608ec06cca4a4b469285f929ee379ebaceb8b3e9d32c65ee
                                      • Opcode Fuzzy Hash: 42faafffa07b0cef0e4f282f8831a890b0551182d5a7c0d080368e72836b9b6b
                                      • Instruction Fuzzy Hash: 6761BE7250021AFAEB14DF74CC45FBE77A8FB08711F10464AF915EA1E1DB74AA90CBA0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                      • API String ID: 0-1645009161
                                      • Opcode ID: 5b52adaceb65db25348468a51f7526c6e7c2d640b9e12ce6e2676e1ac844266a
                                      • Instruction ID: f475e8b4f23dd6c592336b469e097427b08d58b81d3a01bf4d09342e2d562812
                                      • Opcode Fuzzy Hash: 5b52adaceb65db25348468a51f7526c6e7c2d640b9e12ce6e2676e1ac844266a
                                      • Instruction Fuzzy Hash: F781C371604609ABEB20AF68CC42FBE37A8FF15304F154024FA05EB196EB74DA51C7E6
                                      APIs
                                      • LoadIconW.USER32(00000063), ref: 008C5A2E
                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 008C5A40
                                      • SetWindowTextW.USER32(?,?), ref: 008C5A57
                                      • GetDlgItem.USER32(?,000003EA), ref: 008C5A6C
                                      • SetWindowTextW.USER32(00000000,?), ref: 008C5A72
                                      • GetDlgItem.USER32(?,000003E9), ref: 008C5A82
                                      • SetWindowTextW.USER32(00000000,?), ref: 008C5A88
                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 008C5AA9
                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 008C5AC3
                                      • GetWindowRect.USER32(?,?), ref: 008C5ACC
                                      • _wcslen.LIBCMT ref: 008C5B33
                                      • SetWindowTextW.USER32(?,?), ref: 008C5B6F
                                      • GetDesktopWindow.USER32 ref: 008C5B75
                                      • GetWindowRect.USER32(00000000), ref: 008C5B7C
                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 008C5BD3
                                      • GetClientRect.USER32(?,?), ref: 008C5BE0
                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 008C5C05
                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 008C5C2F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                      • String ID:
                                      • API String ID: 895679908-0
                                      • Opcode ID: 82ce278cdedc2386f74e63fafa13aa169570d658d90d9525a96769f2b4753cb3
                                      • Instruction ID: 57866995479b5499cf4d9b2cd4675de7e94a87ffe09198e6a19a87b53d0145c5
                                      • Opcode Fuzzy Hash: 82ce278cdedc2386f74e63fafa13aa169570d658d90d9525a96769f2b4753cb3
                                      • Instruction Fuzzy Hash: 39710731900A09AFDB209FA9CE85FAEBBF5FB48714F10491CE546E25A0D775FA84CB50
                                      APIs
                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 008800C6
                                        • Part of subcall function 008800ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0093070C,00000FA0,31C67E85,?,?,?,?,008A23B3,000000FF), ref: 0088011C
                                        • Part of subcall function 008800ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,008A23B3,000000FF), ref: 00880127
                                        • Part of subcall function 008800ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,008A23B3,000000FF), ref: 00880138
                                        • Part of subcall function 008800ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0088014E
                                        • Part of subcall function 008800ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0088015C
                                        • Part of subcall function 008800ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0088016A
                                        • Part of subcall function 008800ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00880195
                                        • Part of subcall function 008800ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008801A0
                                      • ___scrt_fastfail.LIBCMT ref: 008800E7
                                        • Part of subcall function 008800A3: __onexit.LIBCMT ref: 008800A9
                                      Strings
                                      • InitializeConditionVariable, xrefs: 00880148
                                      • SleepConditionVariableCS, xrefs: 00880154
                                      • WakeAllConditionVariable, xrefs: 00880162
                                      • kernel32.dll, xrefs: 00880133
                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00880122
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                      • API String ID: 66158676-1714406822
                                      • Opcode ID: ff1e147a1a13bced1f8bbcd569bb248a8bf09508c6cec1763b057138b9afcc41
                                      • Instruction ID: 32ab59b24ff229595044927345818b74421a9a2d11fee6a0d8707ba5b00f9691
                                      • Opcode Fuzzy Hash: ff1e147a1a13bced1f8bbcd569bb248a8bf09508c6cec1763b057138b9afcc41
                                      • Instruction Fuzzy Hash: 1521D4336497196BE7607B78AD4AF3A3798FF45B61F000139FA06E6392DB649804CF91
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                      • API String ID: 176396367-1603158881
                                      • Opcode ID: 84ad87484a44da9328d119ef623d5530666396b1844ae18ef654f36567d115ce
                                      • Instruction ID: e2cae9a30370770617855598504b95b6e38bd6de15baaebfafd5dc1b87f32e73
                                      • Opcode Fuzzy Hash: 84ad87484a44da9328d119ef623d5530666396b1844ae18ef654f36567d115ce
                                      • Instruction Fuzzy Hash: 44E19132A00626ABCB289BB8D451FEDBBB4FF54714F55C12EE456E7240DB30EE468790
                                      APIs
                                      • CharLowerBuffW.USER32(00000000,00000000,008FCC08), ref: 008D4527
                                      • _wcslen.LIBCMT ref: 008D453B
                                      • _wcslen.LIBCMT ref: 008D4599
                                      • _wcslen.LIBCMT ref: 008D45F4
                                      • _wcslen.LIBCMT ref: 008D463F
                                      • _wcslen.LIBCMT ref: 008D46A7
                                        • Part of subcall function 0087F9F2: _wcslen.LIBCMT ref: 0087F9FD
                                      • GetDriveTypeW.KERNEL32(?,00926BF0,00000061), ref: 008D4743
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharDriveLowerType
                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                      • API String ID: 2055661098-1000479233
                                      • Opcode ID: cca1b36a68b5eff6036c06719cae15e2ec38d163d5bd6467bbfd416810bbe09d
                                      • Instruction ID: c5f355e1d7dadbb3456d1661b2e74f87884d64f025242118fe4cd5b0f3c52c24
                                      • Opcode Fuzzy Hash: cca1b36a68b5eff6036c06719cae15e2ec38d163d5bd6467bbfd416810bbe09d
                                      • Instruction Fuzzy Hash: 26B1D0316083029FC720DF28D890A6AB7E5FFA5764F505A2EF596C7391E730D944CB92
                                      APIs
                                      • _wcslen.LIBCMT ref: 008EB198
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008EB1B0
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008EB1D4
                                      • _wcslen.LIBCMT ref: 008EB200
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008EB214
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008EB236
                                      • _wcslen.LIBCMT ref: 008EB332
                                        • Part of subcall function 008D05A7: GetStdHandle.KERNEL32(000000F6), ref: 008D05C6
                                      • _wcslen.LIBCMT ref: 008EB34B
                                      • _wcslen.LIBCMT ref: 008EB366
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008EB3B6
                                      • GetLastError.KERNEL32(00000000), ref: 008EB407
                                      • CloseHandle.KERNEL32(?), ref: 008EB439
                                      • CloseHandle.KERNEL32(00000000), ref: 008EB44A
                                      • CloseHandle.KERNEL32(00000000), ref: 008EB45C
                                      • CloseHandle.KERNEL32(00000000), ref: 008EB46E
                                      • CloseHandle.KERNEL32(?), ref: 008EB4E3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                      • String ID:
                                      • API String ID: 2178637699-0
                                      • Opcode ID: 31a82b887e1a59f2ed097762e77bd58aac4aee44bb93e715b1593291f33563bd
                                      • Instruction ID: 43911f1538baa5841493535767ba165994f2e1bd4b75d748c2a0c3f7c6de357f
                                      • Opcode Fuzzy Hash: 31a82b887e1a59f2ed097762e77bd58aac4aee44bb93e715b1593291f33563bd
                                      • Instruction Fuzzy Hash: 32F168315082809FC714EF29C891B6BBBE5FF86314F14855DF8999B2A2DB31EC44CB92
                                      APIs
                                      • GetMenuItemCount.USER32(00931990), ref: 008A2F8D
                                      • GetMenuItemCount.USER32(00931990), ref: 008A303D
                                      • GetCursorPos.USER32(?), ref: 008A3081
                                      • SetForegroundWindow.USER32(00000000), ref: 008A308A
                                      • TrackPopupMenuEx.USER32(00931990,00000000,?,00000000,00000000,00000000), ref: 008A309D
                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 008A30A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                      • String ID: 0
                                      • API String ID: 36266755-4108050209
                                      • Opcode ID: 96d64fd8467a64c488aab56f495d714aabc205b307b84371289073f1f401cd19
                                      • Instruction ID: e76d01ead7603dea39d797d670e8d400c5b779c31fea398391bc58d0017c7018
                                      • Opcode Fuzzy Hash: 96d64fd8467a64c488aab56f495d714aabc205b307b84371289073f1f401cd19
                                      • Instruction Fuzzy Hash: 62710770644209BEFB358F28CC49FAABF65FF05328F204216F525EA6E0C7B1A954DB51
                                      APIs
                                      • DestroyWindow.USER32(?,?), ref: 008F6DEB
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 008F6E5F
                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 008F6E81
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008F6E94
                                      • DestroyWindow.USER32(?), ref: 008F6EB5
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00860000,00000000), ref: 008F6EE4
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008F6EFD
                                      • GetDesktopWindow.USER32 ref: 008F6F16
                                      • GetWindowRect.USER32(00000000), ref: 008F6F1D
                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008F6F35
                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 008F6F4D
                                        • Part of subcall function 00879944: GetWindowLongW.USER32(?,000000EB), ref: 00879952
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                      • String ID: 0$tooltips_class32
                                      • API String ID: 2429346358-3619404913
                                      • Opcode ID: afa69c42dd4855d5df232ad6c70f48939f445b0ced02ed8e5b5fca8e8c64482a
                                      • Instruction ID: 63c1e20f1bce6291b850e118b81c7efd14e461a4c89033c6e8ba5f5fd5751552
                                      • Opcode Fuzzy Hash: afa69c42dd4855d5df232ad6c70f48939f445b0ced02ed8e5b5fca8e8c64482a
                                      • Instruction Fuzzy Hash: 02716871104248AFDB21CF28D844FBABBE9FB89304F14051DFA99C7261DB70A916DF12
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      • DragQueryPoint.SHELL32(?,?), ref: 008F9147
                                        • Part of subcall function 008F7674: ClientToScreen.USER32(?,?), ref: 008F769A
                                        • Part of subcall function 008F7674: GetWindowRect.USER32(?,?), ref: 008F7710
                                        • Part of subcall function 008F7674: PtInRect.USER32(?,?,008F8B89), ref: 008F7720
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 008F91B0
                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008F91BB
                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008F91DE
                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 008F9225
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 008F923E
                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 008F9255
                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 008F9277
                                      • DragFinish.SHELL32(?), ref: 008F927E
                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 008F9371
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                      • API String ID: 221274066-3440237614
                                      • Opcode ID: 460bfa782030cb17aab56e36c878ef5334ff54e6fb1c0611cc558a5f9ea25d7d
                                      • Instruction ID: b3988f77fb3a8d4945a165c4cab42ba3a6ea6fd0f34eb1b564c0deb82e7ef338
                                      • Opcode Fuzzy Hash: 460bfa782030cb17aab56e36c878ef5334ff54e6fb1c0611cc558a5f9ea25d7d
                                      • Instruction Fuzzy Hash: 1D614771108305AFC705EF68DD85EABBBE8FF98750F00092EF695921A1DB709A49CB52
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008DC4B0
                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 008DC4C3
                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 008DC4D7
                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 008DC4F0
                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 008DC533
                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 008DC549
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008DC554
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008DC584
                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 008DC5DC
                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 008DC5F0
                                      • InternetCloseHandle.WININET(00000000), ref: 008DC5FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                      • String ID:
                                      • API String ID: 3800310941-3916222277
                                      • Opcode ID: 9123b1d19c61d57bfdab7d094c29ad8fe625bfcabfe0509530182b83efff780b
                                      • Instruction ID: 84efe619485a546fdf6cbd977796272728c12da1caad8efa315526768954b78d
                                      • Opcode Fuzzy Hash: 9123b1d19c61d57bfdab7d094c29ad8fe625bfcabfe0509530182b83efff780b
                                      • Instruction Fuzzy Hash: 5C516BB150020ABFDB219FA4D988EBB7BBCFF08744F00461AF946D6210DB70EA44DB60
                                      APIs
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 008F8592
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008F85A2
                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008F85AD
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008F85BA
                                      • GlobalLock.KERNEL32(00000000), ref: 008F85C8
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008F85D7
                                      • GlobalUnlock.KERNEL32(00000000), ref: 008F85E0
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008F85E7
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008F85F8
                                      • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,008FFC38,?), ref: 008F8611
                                      • GlobalFree.KERNEL32(00000000), ref: 008F8621
                                      • GetObjectW.GDI32(?,00000018,?), ref: 008F8641
                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 008F8671
                                      • DeleteObject.GDI32(?), ref: 008F8699
                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008F86AF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                      • String ID:
                                      • API String ID: 3840717409-0
                                      • Opcode ID: 7c219c4942dc124bab3e4a4a34a7f361b4f3fe11663a0b497a08ae7b56451e48
                                      • Instruction ID: e97e3fe67fd4dbe56eb7b72c25939da82f2789d1a81aa70457c1c65c79dcdcc7
                                      • Opcode Fuzzy Hash: 7c219c4942dc124bab3e4a4a34a7f361b4f3fe11663a0b497a08ae7b56451e48
                                      • Instruction Fuzzy Hash: 9E410675600208EFDB119FB5CD48EBA7BB8FF99B55F104058F90AEB260DB349A41DB60
                                      APIs
                                      • VariantInit.OLEAUT32(00000000), ref: 008D1502
                                      • VariantCopy.OLEAUT32(?,?), ref: 008D150B
                                      • VariantClear.OLEAUT32(?), ref: 008D1517
                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008D15FB
                                      • VarR8FromDec.OLEAUT32(?,?), ref: 008D1657
                                      • VariantInit.OLEAUT32(?), ref: 008D1708
                                      • SysFreeString.OLEAUT32(?), ref: 008D178C
                                      • VariantClear.OLEAUT32(?), ref: 008D17D8
                                      • VariantClear.OLEAUT32(?), ref: 008D17E7
                                      • VariantInit.OLEAUT32(00000000), ref: 008D1823
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                      • API String ID: 1234038744-3931177956
                                      • Opcode ID: 163f939ba4cc7090b7dc16215ba23daf9c37999340209ab2cf63c35adfd0b8d9
                                      • Instruction ID: 2938e65bdbfc01df464f388a7054c44440a962a428ca9dc65eb83d3cf757dace
                                      • Opcode Fuzzy Hash: 163f939ba4cc7090b7dc16215ba23daf9c37999340209ab2cf63c35adfd0b8d9
                                      • Instruction Fuzzy Hash: 88D1EB71A00109EBDF10AF69E888B7DB7B5FF45704F10825BE446EB295DB38E940DB62
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008EB6AE,?,?), ref: 008EC9B5
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008EC9F1
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008ECA68
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008ECA9E
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008EB6F4
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008EB772
                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 008EB80A
                                      • RegCloseKey.ADVAPI32(?), ref: 008EB87E
                                      • RegCloseKey.ADVAPI32(?), ref: 008EB89C
                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 008EB8F2
                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 008EB904
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 008EB922
                                      • FreeLibrary.KERNEL32(00000000), ref: 008EB983
                                      • RegCloseKey.ADVAPI32(00000000), ref: 008EB994
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                      • API String ID: 146587525-4033151799
                                      • Opcode ID: f3740c47b5ec74cdeeb6416f88299ab66c2279f885e227f0c84baadfb8576dad
                                      • Instruction ID: 8b60369aa24364efa974a8bb44df0dc521dca5fa9c820a9fc48b4ba5cd29ccad
                                      • Opcode Fuzzy Hash: f3740c47b5ec74cdeeb6416f88299ab66c2279f885e227f0c84baadfb8576dad
                                      • Instruction Fuzzy Hash: 04C17C30204281AFD714DF69C495F2ABBE5FF85308F15845CE49A8B7A2CB71ED46CB92
                                      APIs
                                      • GetDC.USER32(00000000), ref: 008E25D8
                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008E25E8
                                      • CreateCompatibleDC.GDI32(?), ref: 008E25F4
                                      • SelectObject.GDI32(00000000,?), ref: 008E2601
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 008E266D
                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008E26AC
                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008E26D0
                                      • SelectObject.GDI32(?,?), ref: 008E26D8
                                      • DeleteObject.GDI32(?), ref: 008E26E1
                                      • DeleteDC.GDI32(?), ref: 008E26E8
                                      • ReleaseDC.USER32(00000000,?), ref: 008E26F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                      • String ID: (
                                      • API String ID: 2598888154-3887548279
                                      • Opcode ID: f9e6f11cffc8936b324bd6389fdf0a38afcce0d89070d8d758c92a13004e2504
                                      • Instruction ID: fd98679403f431695bafa2821e2e72b14fc24c766d96bfb3d2d92e343d0d27c5
                                      • Opcode Fuzzy Hash: f9e6f11cffc8936b324bd6389fdf0a38afcce0d89070d8d758c92a13004e2504
                                      • Instruction Fuzzy Hash: 5461D175D00219EFCB04CFA8D984EAEBBB9FF48310F208529E955E7250E770AA51CF60
                                      APIs
                                      • ___free_lconv_mon.LIBCMT ref: 0089DAA1
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D659
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D66B
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D67D
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D68F
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D6A1
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D6B3
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D6C5
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D6D7
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D6E9
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D6FB
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D70D
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D71F
                                        • Part of subcall function 0089D63C: _free.LIBCMT ref: 0089D731
                                      • _free.LIBCMT ref: 0089DA96
                                        • Part of subcall function 008929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000), ref: 008929DE
                                        • Part of subcall function 008929C8: GetLastError.KERNEL32(00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000,00000000), ref: 008929F0
                                      • _free.LIBCMT ref: 0089DAB8
                                      • _free.LIBCMT ref: 0089DACD
                                      • _free.LIBCMT ref: 0089DAD8
                                      • _free.LIBCMT ref: 0089DAFA
                                      • _free.LIBCMT ref: 0089DB0D
                                      • _free.LIBCMT ref: 0089DB1B
                                      • _free.LIBCMT ref: 0089DB26
                                      • _free.LIBCMT ref: 0089DB5E
                                      • _free.LIBCMT ref: 0089DB65
                                      • _free.LIBCMT ref: 0089DB82
                                      • _free.LIBCMT ref: 0089DB9A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                      • String ID:
                                      • API String ID: 161543041-0
                                      • Opcode ID: 171185c9eb3c12f9e6844af65dbc7cf826fd198b332bb2ef50dff1c066fc84f5
                                      • Instruction ID: 292224e9b5b3e0714ff62b83726da13ba8e3eaacb247fa0561bc761b51732cbe
                                      • Opcode Fuzzy Hash: 171185c9eb3c12f9e6844af65dbc7cf826fd198b332bb2ef50dff1c066fc84f5
                                      • Instruction Fuzzy Hash: 66314A72604305AFEF21BA39EC45F5ABBE9FF10320F594419E449D7191DA31AC508769
                                      APIs
                                      • GetClassNameW.USER32(?,?,00000100), ref: 008C369C
                                      • _wcslen.LIBCMT ref: 008C36A7
                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 008C3797
                                      • GetClassNameW.USER32(?,?,00000400), ref: 008C380C
                                      • GetDlgCtrlID.USER32(?), ref: 008C385D
                                      • GetWindowRect.USER32(?,?), ref: 008C3882
                                      • GetParent.USER32(?), ref: 008C38A0
                                      • ScreenToClient.USER32(00000000), ref: 008C38A7
                                      • GetClassNameW.USER32(?,?,00000100), ref: 008C3921
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 008C395D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                      • String ID: %s%u
                                      • API String ID: 4010501982-679674701
                                      • Opcode ID: df45c5115be474d71b7c0c580004a0c69a00650737e7cef6005b5e60b7803562
                                      • Instruction ID: 8db78dd4dd114ab1c8d26410bd1c42982fccccf8a091e401a2aa92190bcf44e6
                                      • Opcode Fuzzy Hash: df45c5115be474d71b7c0c580004a0c69a00650737e7cef6005b5e60b7803562
                                      • Instruction Fuzzy Hash: A891A171204606AFD719DF64C885FAAFBB8FF45354F00862DF999D2190DB30EA4ACB91
                                      APIs
                                      • GetClassNameW.USER32(?,?,00000400), ref: 008C4994
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 008C49DA
                                      • _wcslen.LIBCMT ref: 008C49EB
                                      • CharUpperBuffW.USER32(?,00000000), ref: 008C49F7
                                      • _wcsstr.LIBVCRUNTIME ref: 008C4A2C
                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 008C4A64
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 008C4A9D
                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 008C4AE6
                                      • GetClassNameW.USER32(?,?,00000400), ref: 008C4B20
                                      • GetWindowRect.USER32(?,?), ref: 008C4B8B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                      • String ID: ThumbnailClass
                                      • API String ID: 1311036022-1241985126
                                      • Opcode ID: 6b837dca1c9dd208b887a42cd50e865a10a6af67154b644158b155d44225095b
                                      • Instruction ID: 02a48f779125d99979f02210c2e5b5b038db148dbe10520b52abcacb27c44e4c
                                      • Opcode Fuzzy Hash: 6b837dca1c9dd208b887a42cd50e865a10a6af67154b644158b155d44225095b
                                      • Instruction Fuzzy Hash: E191CD7100820A9BDB04DF54D990FAA77B8FF84314F04946DFD85DA096EB30ED85CBA2
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008F8D5A
                                      • GetFocus.USER32 ref: 008F8D6A
                                      • GetDlgCtrlID.USER32(00000000), ref: 008F8D75
                                      • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 008F8E1D
                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 008F8ECF
                                      • GetMenuItemCount.USER32(?), ref: 008F8EEC
                                      • GetMenuItemID.USER32(?,00000000), ref: 008F8EFC
                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 008F8F2E
                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 008F8F70
                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 008F8FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                      • String ID: 0
                                      • API String ID: 1026556194-4108050209
                                      • Opcode ID: 2c0ef0bd67174c3ab010de187af853659110988a1995c2a4102a000d8edd0cc7
                                      • Instruction ID: 43f0a0ddb521fcb035e710f7e3f21e61995a76828fc8eab2960b49be455fb2e8
                                      • Opcode Fuzzy Hash: 2c0ef0bd67174c3ab010de187af853659110988a1995c2a4102a000d8edd0cc7
                                      • Instruction Fuzzy Hash: 65818871508309EFDB10DF28D884ABBBBE9FB88314F140959FA84D7291DB30D904CBA2
                                      APIs
                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 008CDC20
                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 008CDC46
                                      • _wcslen.LIBCMT ref: 008CDC50
                                      • _wcsstr.LIBVCRUNTIME ref: 008CDCA0
                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 008CDCBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                      • API String ID: 1939486746-1459072770
                                      • Opcode ID: d2678a7a69cf4a803d205c3e81ca096e5a587f1bd50d03886dcf6df72b138f96
                                      • Instruction ID: b051f7106421b2bf7683d8e1b10af7be9cd68defa203079f4de54d441fe963e7
                                      • Opcode Fuzzy Hash: d2678a7a69cf4a803d205c3e81ca096e5a587f1bd50d03886dcf6df72b138f96
                                      • Instruction Fuzzy Hash: 8541FF329403197ADB10B6799C43EBF77BCFF41720F144069FA05E6192EB74EA01A7A6
                                      APIs
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 008ECC64
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 008ECC8D
                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 008ECD48
                                        • Part of subcall function 008ECC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 008ECCAA
                                        • Part of subcall function 008ECC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 008ECCBD
                                        • Part of subcall function 008ECC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 008ECCCF
                                        • Part of subcall function 008ECC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 008ECD05
                                        • Part of subcall function 008ECC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 008ECD28
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 008ECCF3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                      • API String ID: 2734957052-4033151799
                                      • Opcode ID: 66ef9f49bfc55d061dbd2d01f4b76e75be2e1874118de58c378decf0b67d3041
                                      • Instruction ID: 894f23cb4314ff9a198ae1d2a1fe964d8c009e0f07a76b260e272fb282315296
                                      • Opcode Fuzzy Hash: 66ef9f49bfc55d061dbd2d01f4b76e75be2e1874118de58c378decf0b67d3041
                                      • Instruction Fuzzy Hash: 5D316E71E0112DBBDB208BA5DC88EFFBB7CFF56754F000165A905E2240DA349A46DAA0
                                      APIs
                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 008D3D40
                                      • _wcslen.LIBCMT ref: 008D3D6D
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 008D3D9D
                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 008D3DBE
                                      • RemoveDirectoryW.KERNEL32(?), ref: 008D3DCE
                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 008D3E55
                                      • CloseHandle.KERNEL32(00000000), ref: 008D3E60
                                      • CloseHandle.KERNEL32(00000000), ref: 008D3E6B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                      • String ID: :$\$\??\%s
                                      • API String ID: 1149970189-3457252023
                                      • Opcode ID: 1efb290b62e61d3da03fa0dd901f66052b0546f0bfbb51c4c9a2a9bf85878d26
                                      • Instruction ID: 62da946a189fbb9af2d0f0a5f74befbe72b3b5fee859988c4a21eb1a0287c854
                                      • Opcode Fuzzy Hash: 1efb290b62e61d3da03fa0dd901f66052b0546f0bfbb51c4c9a2a9bf85878d26
                                      • Instruction Fuzzy Hash: 7631AF72900209ABDB209BA4DC49FEB37BDFF88740F1041B6F609D6260EB709744CB25
                                      APIs
                                      • timeGetTime.WINMM ref: 008CE6B4
                                        • Part of subcall function 0087E551: timeGetTime.WINMM(?,?,008CE6D4), ref: 0087E555
                                      • Sleep.KERNEL32(0000000A), ref: 008CE6E1
                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 008CE705
                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 008CE727
                                      • SetActiveWindow.USER32 ref: 008CE746
                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 008CE754
                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 008CE773
                                      • Sleep.KERNEL32(000000FA), ref: 008CE77E
                                      • IsWindow.USER32 ref: 008CE78A
                                      • EndDialog.USER32(00000000), ref: 008CE79B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                      • String ID: BUTTON
                                      • API String ID: 1194449130-3405671355
                                      • Opcode ID: e99cc0a5fd239d9bdf2d0b0e63157f5899c7c79ee085dbc0dca7a527fe497e9c
                                      • Instruction ID: 55ae0d417faab06fa43108dd05183a20f683bcb6b728ff30564a27ffeb1c5358
                                      • Opcode Fuzzy Hash: e99cc0a5fd239d9bdf2d0b0e63157f5899c7c79ee085dbc0dca7a527fe497e9c
                                      • Instruction Fuzzy Hash: D4215BB1218608AFEB109F75ED8AF3A3B79FB6474CB105429F415C21A1DB71ED10EE25
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 008CEA5D
                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 008CEA73
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008CEA84
                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 008CEA96
                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 008CEAA7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: SendString$_wcslen
                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                      • API String ID: 2420728520-1007645807
                                      • Opcode ID: c600967e4489f10fa2fe82efb9d75b3add240f56057e2ab230eea4608204dc2c
                                      • Instruction ID: b3cb84fe8164b9f4a77fe0303942f91bf4f956664dc0ba9d54af9fcf4960769d
                                      • Opcode Fuzzy Hash: c600967e4489f10fa2fe82efb9d75b3add240f56057e2ab230eea4608204dc2c
                                      • Instruction Fuzzy Hash: F211C635A902797DD720A7A5ED4AEFF6A7CFBD2B44F000429B401E20D4EE704E44C9B1
                                      APIs
                                      • GetDlgItem.USER32(?,00000001), ref: 008C5CE2
                                      • GetWindowRect.USER32(00000000,?), ref: 008C5CFB
                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 008C5D59
                                      • GetDlgItem.USER32(?,00000002), ref: 008C5D69
                                      • GetWindowRect.USER32(00000000,?), ref: 008C5D7B
                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 008C5DCF
                                      • GetDlgItem.USER32(?,000003E9), ref: 008C5DDD
                                      • GetWindowRect.USER32(00000000,?), ref: 008C5DEF
                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 008C5E31
                                      • GetDlgItem.USER32(?,000003EA), ref: 008C5E44
                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 008C5E5A
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 008C5E67
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$ItemMoveRect$Invalidate
                                      • String ID:
                                      • API String ID: 3096461208-0
                                      • Opcode ID: a705eb8c8f21ddadf43c46dcb66bc0d95858310b05d99a86442aa9e25cb1c76a
                                      • Instruction ID: 02aac16f5c0db783f2d3e886318a207b5f2548ec6c8d64f0b96ed9555351f69a
                                      • Opcode Fuzzy Hash: a705eb8c8f21ddadf43c46dcb66bc0d95858310b05d99a86442aa9e25cb1c76a
                                      • Instruction Fuzzy Hash: 6251FC71A00609AFDF18DF68DD89EAEBBB5FB58300F14812DF516E6290D774AE40CB60
                                      APIs
                                        • Part of subcall function 00878F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00878BE8,?,00000000,?,?,?,?,00878BBA,00000000,?), ref: 00878FC5
                                      • DestroyWindow.USER32(?), ref: 00878C81
                                      • KillTimer.USER32(00000000,?,?,?,?,00878BBA,00000000,?), ref: 00878D1B
                                      • DestroyAcceleratorTable.USER32(00000000), ref: 008B6973
                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00878BBA,00000000,?), ref: 008B69A1
                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00878BBA,00000000,?), ref: 008B69B8
                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00878BBA,00000000), ref: 008B69D4
                                      • DeleteObject.GDI32(00000000), ref: 008B69E6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                      • String ID:
                                      • API String ID: 641708696-0
                                      • Opcode ID: fce7ed229f94ad99f4cda1049f1f2110b99529d17633ffb01980d87c5e02e407
                                      • Instruction ID: db7e25d38e44fa7a8548ef098fc108236cee12bb26036e58aea3c95da876d2f4
                                      • Opcode Fuzzy Hash: fce7ed229f94ad99f4cda1049f1f2110b99529d17633ffb01980d87c5e02e407
                                      • Instruction Fuzzy Hash: 3961CB30102604DFCB269F28DA4CB65BBF1FB90316F148528E04ADB6B4CB35E9A0DF90
                                      APIs
                                        • Part of subcall function 00879944: GetWindowLongW.USER32(?,000000EB), ref: 00879952
                                      • GetSysColor.USER32(0000000F), ref: 00879862
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ColorLongWindow
                                      • String ID:
                                      • API String ID: 259745315-0
                                      • Opcode ID: 185e65ab28b3453e2051c2f63d1348c24ec0383d066ea68ba65d1b638848ce2f
                                      • Instruction ID: 074a7b3264df9d5936b417399053550f23f27f6e38710c4864ba1dd5a98e9df0
                                      • Opcode Fuzzy Hash: 185e65ab28b3453e2051c2f63d1348c24ec0383d066ea68ba65d1b638848ce2f
                                      • Instruction Fuzzy Hash: 94419E31104608AFDB209F389C88BB93BA5FB46331F148665F9E6CB2E5C731D992DB11
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,008AF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 008C9717
                                      • LoadStringW.USER32(00000000,?,008AF7F8,00000001), ref: 008C9720
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,008AF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 008C9742
                                      • LoadStringW.USER32(00000000,?,008AF7F8,00000001), ref: 008C9745
                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 008C9866
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString$Message_wcslen
                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                      • API String ID: 747408836-2268648507
                                      • Opcode ID: 7dceb11050392c65d849621c0e095b1b393924bb2990c9aff6a7fb0e088e47a9
                                      • Instruction ID: b444373627afe095765159372e349de9b41f0e8ee877e81ea5534af222426946
                                      • Opcode Fuzzy Hash: 7dceb11050392c65d849621c0e095b1b393924bb2990c9aff6a7fb0e088e47a9
                                      • Instruction Fuzzy Hash: A8413C72800219AACB04EBE8DE46EEE777DFF55340F510065F605B2196EA35AF48CB62
                                      APIs
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008C07A2
                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008C07BE
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008C07DA
                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 008C0804
                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 008C082C
                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008C0837
                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008C083C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                      • API String ID: 323675364-22481851
                                      • Opcode ID: 66e9fa9bc4022b23b6378edbdc8c41c3c2cde76b46be8619465432a875f88685
                                      • Instruction ID: 5658bd73b122de816e2e7fe2ba4d2ce4b3e27984d2a85311782acad489e1693d
                                      • Opcode Fuzzy Hash: 66e9fa9bc4022b23b6378edbdc8c41c3c2cde76b46be8619465432a875f88685
                                      • Instruction Fuzzy Hash: D4410572C10229EBDB15EBA8DC85DEEB778FF54350B154129E901A32A0EB309E44CFA1
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 008E3C5C
                                      • CoInitialize.OLE32(00000000), ref: 008E3C8A
                                      • CoUninitialize.OLE32 ref: 008E3C94
                                      • _wcslen.LIBCMT ref: 008E3D2D
                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 008E3DB1
                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 008E3ED5
                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 008E3F0E
                                      • CoGetObject.OLE32(?,00000000,008FFB98,?), ref: 008E3F2D
                                      • SetErrorMode.KERNEL32(00000000), ref: 008E3F40
                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 008E3FC4
                                      • VariantClear.OLEAUT32(?), ref: 008E3FD8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                      • String ID:
                                      • API String ID: 429561992-0
                                      • Opcode ID: 83415b8b67bbcb3b902fda85cbfa7ff0eec090358de502e9ae6ed31f1f173b54
                                      • Instruction ID: 650b48a5e709a6ce4ba341b5bebc97a9bfa5411a3b85918f036407774e80d97d
                                      • Opcode Fuzzy Hash: 83415b8b67bbcb3b902fda85cbfa7ff0eec090358de502e9ae6ed31f1f173b54
                                      • Instruction Fuzzy Hash: A8C13471608245AFC700DF69C88892BB7E9FF8A748F10495DF98ADB251DB31EE05CB52
                                      APIs
                                      • CoInitialize.OLE32(00000000), ref: 008D7AF3
                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 008D7B8F
                                      • SHGetDesktopFolder.SHELL32(?), ref: 008D7BA3
                                      • CoCreateInstance.OLE32(008FFD08,00000000,00000001,00926E6C,?), ref: 008D7BEF
                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 008D7C74
                                      • CoTaskMemFree.OLE32(?,?), ref: 008D7CCC
                                      • SHBrowseForFolderW.SHELL32(?), ref: 008D7D57
                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 008D7D7A
                                      • CoTaskMemFree.OLE32(00000000), ref: 008D7D81
                                      • CoTaskMemFree.OLE32(00000000), ref: 008D7DD6
                                      • CoUninitialize.OLE32 ref: 008D7DDC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                      • String ID:
                                      • API String ID: 2762341140-0
                                      • Opcode ID: b998eb4d5259cb4bf12ffecfcb40b4959858584897b76856baf37ed9425a8250
                                      • Instruction ID: 0ddee9c6350121d927ed2e8d10e7eb8a07bccb8df35b628fcc8b8803a4507bf0
                                      • Opcode Fuzzy Hash: b998eb4d5259cb4bf12ffecfcb40b4959858584897b76856baf37ed9425a8250
                                      • Instruction Fuzzy Hash: 08C12C75A04109AFCB14DF64C884DAEBBF9FF48314B1585A9E81ADB361D730EE45CB90
                                      APIs
                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 008F5504
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008F5515
                                      • CharNextW.USER32(00000158), ref: 008F5544
                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 008F5585
                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 008F559B
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008F55AC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$CharNext
                                      • String ID:
                                      • API String ID: 1350042424-0
                                      • Opcode ID: 059a0165f9b86505f2b78a0672ccfc1c598dc1ab204b323b2e45161bb332f3f0
                                      • Instruction ID: 5c4e625ec0f7a3ce150f7c107e50ec6e24489aa9ad4369b1ded365abb809588f
                                      • Opcode Fuzzy Hash: 059a0165f9b86505f2b78a0672ccfc1c598dc1ab204b323b2e45161bb332f3f0
                                      • Instruction Fuzzy Hash: 60616A70A0460CAADB109F74CC84EBE7BB9FB19725F108149FB25E6290D7748A81DB61
                                      APIs
                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 008BFAAF
                                      • SafeArrayAllocData.OLEAUT32(?), ref: 008BFB08
                                      • VariantInit.OLEAUT32(?), ref: 008BFB1A
                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 008BFB3A
                                      • VariantCopy.OLEAUT32(?,?), ref: 008BFB8D
                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 008BFBA1
                                      • VariantClear.OLEAUT32(?), ref: 008BFBB6
                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 008BFBC3
                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008BFBCC
                                      • VariantClear.OLEAUT32(?), ref: 008BFBDE
                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008BFBE9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                      • String ID:
                                      • API String ID: 2706829360-0
                                      • Opcode ID: 2981a56880dd54171baf4a21f214fafed93cbad773870fc354cddf32dd485103
                                      • Instruction ID: cc6a80c42a6ab7f8804763d1be41b42eee51e23b6311db3b0a08b4ada54a7829
                                      • Opcode Fuzzy Hash: 2981a56880dd54171baf4a21f214fafed93cbad773870fc354cddf32dd485103
                                      • Instruction Fuzzy Hash: 06414C35A002199FCB04DF68CC54DEEBBB9FF18354F008469E955E7262CB30AA45CFA1
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 008C9CA1
                                      • GetAsyncKeyState.USER32(000000A0), ref: 008C9D22
                                      • GetKeyState.USER32(000000A0), ref: 008C9D3D
                                      • GetAsyncKeyState.USER32(000000A1), ref: 008C9D57
                                      • GetKeyState.USER32(000000A1), ref: 008C9D6C
                                      • GetAsyncKeyState.USER32(00000011), ref: 008C9D84
                                      • GetKeyState.USER32(00000011), ref: 008C9D96
                                      • GetAsyncKeyState.USER32(00000012), ref: 008C9DAE
                                      • GetKeyState.USER32(00000012), ref: 008C9DC0
                                      • GetAsyncKeyState.USER32(0000005B), ref: 008C9DD8
                                      • GetKeyState.USER32(0000005B), ref: 008C9DEA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: State$Async$Keyboard
                                      • String ID:
                                      • API String ID: 541375521-0
                                      • Opcode ID: 168d851753087d5cc133cde9db2ff58bd5a97660a1d1b959aa1797138eecb065
                                      • Instruction ID: 5b505da761b98726ad45fb61bc93340e1db0c1a7060d3f288ec536bece5fae7d
                                      • Opcode Fuzzy Hash: 168d851753087d5cc133cde9db2ff58bd5a97660a1d1b959aa1797138eecb065
                                      • Instruction Fuzzy Hash: 8241B3745047C969FF3086649808BB5BEB0FB21344F0480DEDAC7A65C2DBB4DAC8C7A2
                                      APIs
                                      • WSAStartup.WSOCK32(00000101,?), ref: 008E05BC
                                      • inet_addr.WSOCK32(?), ref: 008E061C
                                      • gethostbyname.WSOCK32(?), ref: 008E0628
                                      • IcmpCreateFile.IPHLPAPI ref: 008E0636
                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008E06C6
                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008E06E5
                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 008E07B9
                                      • WSACleanup.WSOCK32 ref: 008E07BF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                      • String ID: Ping
                                      • API String ID: 1028309954-2246546115
                                      • Opcode ID: 560eb9a9ae37c512825a64dff07bcce90c0fa97c4f97a469f1fb87ca70326808
                                      • Instruction ID: 2dd5becbdc6c49374f484cc551d5b53484d3fb4f3262daafd10d319f6af0470c
                                      • Opcode Fuzzy Hash: 560eb9a9ae37c512825a64dff07bcce90c0fa97c4f97a469f1fb87ca70326808
                                      • Instruction Fuzzy Hash: 8A91AF355042419FD320CF1AC988F16BBE0FF45318F1589A9E4A9CB6A2C7B1ED85CF92
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharLower
                                      • String ID: cdecl$none$stdcall$winapi
                                      • API String ID: 707087890-567219261
                                      • Opcode ID: 6f84f353e6ae62be43a179c53938ce8e20e445830b96b7fd8babf53ce0344ef9
                                      • Instruction ID: d595a56501b1ffb409235b1dcc2ff2fc4ac08b596530faf4bf692a5125340614
                                      • Opcode Fuzzy Hash: 6f84f353e6ae62be43a179c53938ce8e20e445830b96b7fd8babf53ce0344ef9
                                      • Instruction Fuzzy Hash: 5951A132A00557DBCB24DFADC9409BEB7A5FF66324B214229E46AE72C4DB31DD40C791
                                      APIs
                                      • CoInitialize.OLE32 ref: 008E3774
                                      • CoUninitialize.OLE32 ref: 008E377F
                                      • CoCreateInstance.OLE32(?,00000000,00000017,008FFB78,?), ref: 008E37D9
                                      • IIDFromString.OLE32(?,?), ref: 008E384C
                                      • VariantInit.OLEAUT32(?), ref: 008E38E4
                                      • VariantClear.OLEAUT32(?), ref: 008E3936
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                      • API String ID: 636576611-1287834457
                                      • Opcode ID: d8f7da86549eb38e791434d37991ad7b5d0cefbfd7f9877fee337ea251d96ad7
                                      • Instruction ID: 26ad1b7d732a9d1994ce878814c923754a6108f55f9208db2701408c7dba55a0
                                      • Opcode Fuzzy Hash: d8f7da86549eb38e791434d37991ad7b5d0cefbfd7f9877fee337ea251d96ad7
                                      • Instruction Fuzzy Hash: D8616B70608351AFD310DF65C849B6ABBE8FF4A714F104869F985DB291D770EE48CB92
                                      APIs
                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008D33CF
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008D33F0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LoadString$_wcslen
                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                      • API String ID: 4099089115-3080491070
                                      • Opcode ID: dd6c0ea7acdeba9e95d029a5d4ac8d12cae9fc17a6cd98dadc4a17c7cb273a04
                                      • Instruction ID: c0ced68e40a10795399169730a9e024b92eb37564cb648b5877081612b694ef0
                                      • Opcode Fuzzy Hash: dd6c0ea7acdeba9e95d029a5d4ac8d12cae9fc17a6cd98dadc4a17c7cb273a04
                                      • Instruction Fuzzy Hash: 6151AD32800209AADF15EBA4DE46EEEB778FF14300F114165F105B22A2EB356F58DF62
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharUpper
                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                      • API String ID: 1256254125-769500911
                                      • Opcode ID: 1c398450e1f5d32ec556036cf49d724c588e23d432eedc5df430d5be160b4bab
                                      • Instruction ID: c7918a2d63af9f8bae49cc7b8e7a28ae16e7f358f75d5eaf05cb190b3921276e
                                      • Opcode Fuzzy Hash: 1c398450e1f5d32ec556036cf49d724c588e23d432eedc5df430d5be160b4bab
                                      • Instruction Fuzzy Hash: 4841B332A005269BCB206E7DC992EBE7BB5FB70758F25412DE865DB284E731CD81C790
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 008D53A0
                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 008D5416
                                      • GetLastError.KERNEL32 ref: 008D5420
                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 008D54A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Error$Mode$DiskFreeLastSpace
                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                      • API String ID: 4194297153-14809454
                                      • Opcode ID: e9370630555e170b179f12b87a9bb0a83759299bbce078e41b69c9c78543a29d
                                      • Instruction ID: 7171d3ec84eca7e7b1e9cffc31e4d98b6b6e1c99e55e162b0213c7ea2bd87c1b
                                      • Opcode Fuzzy Hash: e9370630555e170b179f12b87a9bb0a83759299bbce078e41b69c9c78543a29d
                                      • Instruction Fuzzy Hash: 8431B2B5A006089FC710DF68C884EAA7BB5FF05309F14816BE405DB392D770DD82CB92
                                      APIs
                                      • CreateMenu.USER32 ref: 008F3C79
                                      • SetMenu.USER32(?,00000000), ref: 008F3C88
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008F3D10
                                      • IsMenu.USER32(?), ref: 008F3D24
                                      • CreatePopupMenu.USER32 ref: 008F3D2E
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008F3D5B
                                      • DrawMenuBar.USER32 ref: 008F3D63
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                      • String ID: 0$F
                                      • API String ID: 161812096-3044882817
                                      • Opcode ID: 6dabb8d01f37d7b9810cc18190484088474b71300bcb8cea6f74829c8a1a9936
                                      • Instruction ID: b7fb4b1cc007b9abcb1beed6a8bfa18ee17ab1163f56e1266672797aa24ed692
                                      • Opcode Fuzzy Hash: 6dabb8d01f37d7b9810cc18190484088474b71300bcb8cea6f74829c8a1a9936
                                      • Instruction Fuzzy Hash: 17414779A0120DEFDB14DF64E984EAA7BB5FF49350F140029EA46E7360D730AA14DF94
                                      APIs
                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 008F3A9D
                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 008F3AA0
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F3AC7
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008F3AEA
                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 008F3B62
                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 008F3BAC
                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 008F3BC7
                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 008F3BE2
                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 008F3BF6
                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 008F3C13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$LongWindow
                                      • String ID:
                                      • API String ID: 312131281-0
                                      • Opcode ID: bf979f2498423a89dc23be08421d9633f67a7fdecdd361ac936c6341dacceeb9
                                      • Instruction ID: 286190dc6a5a6371e05b45068383486d51f6670daa9a6ed93cafa2b7f22d7e9c
                                      • Opcode Fuzzy Hash: bf979f2498423a89dc23be08421d9633f67a7fdecdd361ac936c6341dacceeb9
                                      • Instruction Fuzzy Hash: 5F615675A00248AFDB11DFA8CC81EFE77B8FB09714F100199FA15E72A1D774AA45DB60
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 008CB151
                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB165
                                      • GetWindowThreadProcessId.USER32(00000000), ref: 008CB16C
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB17B
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 008CB18D
                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB1A6
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB1B8
                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB1FD
                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB212
                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,008CA1E1,?,00000001), ref: 008CB21D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                      • String ID:
                                      • API String ID: 2156557900-0
                                      • Opcode ID: 500ae9dc35e761b6068d22a53ca5889e862b3e223f5f8b60c5662d84411ac40d
                                      • Instruction ID: 40780b2e6e1c27678a1c17cd43119c543a2dc14a470bef2de2ed9538646e8b83
                                      • Opcode Fuzzy Hash: 500ae9dc35e761b6068d22a53ca5889e862b3e223f5f8b60c5662d84411ac40d
                                      • Instruction Fuzzy Hash: 173185B1598608BFDB249F64DD4AFBA7BB9FB61311F108009FA01D6190D7B8DE409F60
                                      APIs
                                      • _free.LIBCMT ref: 00892C94
                                        • Part of subcall function 008929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000), ref: 008929DE
                                        • Part of subcall function 008929C8: GetLastError.KERNEL32(00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000,00000000), ref: 008929F0
                                      • _free.LIBCMT ref: 00892CA0
                                      • _free.LIBCMT ref: 00892CAB
                                      • _free.LIBCMT ref: 00892CB6
                                      • _free.LIBCMT ref: 00892CC1
                                      • _free.LIBCMT ref: 00892CCC
                                      • _free.LIBCMT ref: 00892CD7
                                      • _free.LIBCMT ref: 00892CE2
                                      • _free.LIBCMT ref: 00892CED
                                      • _free.LIBCMT ref: 00892CFB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 1f67640b35d703c4518076a0379fcf999f98a2db1eb75a1f1a9b4e7577a7c25a
                                      • Instruction ID: 8136862d5162d1130c90f872b08c16599844a9919d550a824266588934d67b0c
                                      • Opcode Fuzzy Hash: 1f67640b35d703c4518076a0379fcf999f98a2db1eb75a1f1a9b4e7577a7c25a
                                      • Instruction Fuzzy Hash: 6A115076500108BFCF02FF58DD82D9D3FA9FF05350F5945A5FA489B222DA31EA509B92
                                      APIs
                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00861459
                                      • OleUninitialize.OLE32(?,00000000), ref: 008614F8
                                      • UnregisterHotKey.USER32(?), ref: 008616DD
                                      • DestroyWindow.USER32(?), ref: 008A24B9
                                      • FreeLibrary.KERNEL32(?), ref: 008A251E
                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 008A254B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                      • String ID: close all
                                      • API String ID: 469580280-3243417748
                                      • Opcode ID: cdb4f2526418a6689a4444d4f7b7fc1e2837775189f9c141e58befbc7179ee3c
                                      • Instruction ID: f6f15f65e64fe6ebfc7efdee957bf6f36d1ab06c75e21768ec64533f991e048e
                                      • Opcode Fuzzy Hash: cdb4f2526418a6689a4444d4f7b7fc1e2837775189f9c141e58befbc7179ee3c
                                      • Instruction Fuzzy Hash: B5D17B317022128FDB29EF29C599A29F7A4FF05700F1941ADE54AEB652DB30ED12CF51
                                      APIs
                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008D7FAD
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D7FC1
                                      • GetFileAttributesW.KERNEL32(?), ref: 008D7FEB
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 008D8005
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D8017
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 008D8060
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008D80B0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$AttributesFile
                                      • String ID: *.*
                                      • API String ID: 769691225-438819550
                                      • Opcode ID: 238c08e652e19af3b2249280f2e61963d3e5c40a96debfa9e75ced25a560eaaa
                                      • Instruction ID: 13c7a8ed933d28eb60e5002cf78892f417e70fe77453e31880a448adb580435b
                                      • Opcode Fuzzy Hash: 238c08e652e19af3b2249280f2e61963d3e5c40a96debfa9e75ced25a560eaaa
                                      • Instruction Fuzzy Hash: E3819D725082459BCB20EF19C844AAAB3E8FB88714F144A6FF885C7350EB74DD49CB92
                                      APIs
                                      • SetWindowLongW.USER32(?,000000EB), ref: 00865C7A
                                        • Part of subcall function 00865D0A: GetClientRect.USER32(?,?), ref: 00865D30
                                        • Part of subcall function 00865D0A: GetWindowRect.USER32(?,?), ref: 00865D71
                                        • Part of subcall function 00865D0A: ScreenToClient.USER32(?,?), ref: 00865D99
                                      • GetDC.USER32 ref: 008A46F5
                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 008A4708
                                      • SelectObject.GDI32(00000000,00000000), ref: 008A4716
                                      • SelectObject.GDI32(00000000,00000000), ref: 008A472B
                                      • ReleaseDC.USER32(?,00000000), ref: 008A4733
                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 008A47C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                      • String ID: U
                                      • API String ID: 4009187628-3372436214
                                      • Opcode ID: 4a8af68ad2a73b8c969c4bf7a72846f07c87ea93bf7ab022b852fb87778f03ba
                                      • Instruction ID: 590d854c2da70aca772bb59932df6118145bfb3cb9a6e1cba299267e4e2d8418
                                      • Opcode Fuzzy Hash: 4a8af68ad2a73b8c969c4bf7a72846f07c87ea93bf7ab022b852fb87778f03ba
                                      • Instruction Fuzzy Hash: 3171F031400249DFEF218F64C984ABA7BB1FF8B324F245269ED55DA6A6C7B18841DF50
                                      APIs
                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008D35E4
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • LoadStringW.USER32(00932390,?,00000FFF,?), ref: 008D360A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LoadString$_wcslen
                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                      • API String ID: 4099089115-2391861430
                                      • Opcode ID: aa89625f10aae749419cfcf864bf05ff0627dddaa32703b29c4ba567643f19e8
                                      • Instruction ID: c8f92a527415346fecdb18c3fee6f9e101c3a20df9410e1b2cfe0415a2ebe503
                                      • Opcode Fuzzy Hash: aa89625f10aae749419cfcf864bf05ff0627dddaa32703b29c4ba567643f19e8
                                      • Instruction Fuzzy Hash: 27516D72800219ABDF15EBA4DD42EEEBB79FF14300F154165F105B22A1EB305B98DFA2
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                        • Part of subcall function 0087912D: GetCursorPos.USER32(?), ref: 00879141
                                        • Part of subcall function 0087912D: ScreenToClient.USER32(00000000,?), ref: 0087915E
                                        • Part of subcall function 0087912D: GetAsyncKeyState.USER32(00000001), ref: 00879183
                                        • Part of subcall function 0087912D: GetAsyncKeyState.USER32(00000002), ref: 0087919D
                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 008F8B6B
                                      • ImageList_EndDrag.COMCTL32 ref: 008F8B71
                                      • ReleaseCapture.USER32 ref: 008F8B77
                                      • SetWindowTextW.USER32(?,00000000), ref: 008F8C12
                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 008F8C25
                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 008F8CFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                      • API String ID: 1924731296-2107944366
                                      • Opcode ID: 77223c1ee468b2db95efadd045413a6fc6ca9dad10fcded3ef137c73edb54d7b
                                      • Instruction ID: 6090f41512a2a610d45b804d65fe1d5f97f8ba6a3b8260306b735adecfa22a2c
                                      • Opcode Fuzzy Hash: 77223c1ee468b2db95efadd045413a6fc6ca9dad10fcded3ef137c73edb54d7b
                                      • Instruction Fuzzy Hash: E1515B71108308AFD704DF24DD55FBA77E4FB88754F400629FA96A72E1DB709A44CB62
                                      APIs
                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008DC272
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008DC29A
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008DC2CA
                                      • GetLastError.KERNEL32 ref: 008DC322
                                      • SetEvent.KERNEL32(?), ref: 008DC336
                                      • InternetCloseHandle.WININET(00000000), ref: 008DC341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                      • String ID:
                                      • API String ID: 3113390036-3916222277
                                      • Opcode ID: 2fcad46e3f90a09b688e35df25b74a5eb19da74e8d821b30643d20e22ae13bfc
                                      • Instruction ID: 1e078d1e31045a1a60caa40380d74245b562e34397978c72aa11b3a4488fb731
                                      • Opcode Fuzzy Hash: 2fcad46e3f90a09b688e35df25b74a5eb19da74e8d821b30643d20e22ae13bfc
                                      • Instruction Fuzzy Hash: 36314BB1600609AFDB21AFA98988EBB7BFCFB49744B14861EF446D2310DB34DD04DB61
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,008A3AAF,?,?,Bad directive syntax error,008FCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 008C98BC
                                      • LoadStringW.USER32(00000000,?,008A3AAF,?), ref: 008C98C3
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 008C9987
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HandleLoadMessageModuleString_wcslen
                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                      • API String ID: 858772685-4153970271
                                      • Opcode ID: bb3a4f87e97a5426cbb041334ee369b87c552769e2b308eeddae263a702eaa89
                                      • Instruction ID: 850899f09cea66b531917d34c933c63b02e9898e7dea6796a880b29b178e87f5
                                      • Opcode Fuzzy Hash: bb3a4f87e97a5426cbb041334ee369b87c552769e2b308eeddae263a702eaa89
                                      • Instruction Fuzzy Hash: E121803280021EABCF11AF94DD0AEFE7739FF18704F044469F555A61A2EB319658DB12
                                      APIs
                                      • GetParent.USER32 ref: 008C20AB
                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 008C20C0
                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 008C214D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameParentSend
                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                      • API String ID: 1290815626-3381328864
                                      • Opcode ID: d759ed9d20be1b712cc8725a7ec9611568cfbe575955ad5852b1d5810271c560
                                      • Instruction ID: bc1ff68f4afafe582bc1d70d00e4f9f23ef416bf32168cb1b69b211fefdcc1c2
                                      • Opcode Fuzzy Hash: d759ed9d20be1b712cc8725a7ec9611568cfbe575955ad5852b1d5810271c560
                                      • Instruction Fuzzy Hash: 9711E77768872BB9F6056624AC06EB637ACFB14328B21102FF604E50E5FA75E8015A14
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3da6c3d680d5f3fdd8082ec1675876353f890e776bd998dee9b092bb6ae5399e
                                      • Instruction ID: 6eca072334895524af0420f4a71ae5f3486d7d3e2bf50c17574e012204fbe9bc
                                      • Opcode Fuzzy Hash: 3da6c3d680d5f3fdd8082ec1675876353f890e776bd998dee9b092bb6ae5399e
                                      • Instruction Fuzzy Hash: 87C1AD74A04249AFDF11BFACC841BADBBB4FF4A310F184099E565E7292DB709941CB61
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                      • String ID:
                                      • API String ID: 1282221369-0
                                      • Opcode ID: df8f577f9b87715cce0de77c56dc32fb06c3d299dd96a64d1da7d54552793e7c
                                      • Instruction ID: 73d45c7d75cafd60c97ccf7f283a48baa71be629891cbc9a5ab8fd20f865d6e9
                                      • Opcode Fuzzy Hash: df8f577f9b87715cce0de77c56dc32fb06c3d299dd96a64d1da7d54552793e7c
                                      • Instruction Fuzzy Hash: 38612571A08304AFDF21BFB89C91A697BA5FF05350F0C416DF945E7282DB729D019B91
                                      APIs
                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 008B6890
                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008B68A9
                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008B68B9
                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008B68D1
                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008B68F2
                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00878874,00000000,00000000,00000000,000000FF,00000000), ref: 008B6901
                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 008B691E
                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00878874,00000000,00000000,00000000,000000FF,00000000), ref: 008B692D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                      • String ID:
                                      • API String ID: 1268354404-0
                                      • Opcode ID: 939c05fa2e00e5048c1a4d30be26d59af485449417703a54fcc0bb65c8afdfb6
                                      • Instruction ID: 2334ffebf688739fb3936468d9f05e82fa78b7229a8369d48649c86a2973378c
                                      • Opcode Fuzzy Hash: 939c05fa2e00e5048c1a4d30be26d59af485449417703a54fcc0bb65c8afdfb6
                                      • Instruction Fuzzy Hash: B5518C70600209EFDB24CF25CC55FAA7BB5FB58760F108528F95AD72A0EB74E990DB50
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008DC182
                                      • GetLastError.KERNEL32 ref: 008DC195
                                      • SetEvent.KERNEL32(?), ref: 008DC1A9
                                        • Part of subcall function 008DC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008DC272
                                        • Part of subcall function 008DC253: GetLastError.KERNEL32 ref: 008DC322
                                        • Part of subcall function 008DC253: SetEvent.KERNEL32(?), ref: 008DC336
                                        • Part of subcall function 008DC253: InternetCloseHandle.WININET(00000000), ref: 008DC341
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                      • String ID:
                                      • API String ID: 337547030-0
                                      • Opcode ID: 30c51c3660b335909941bd776e0ba00e756f88a803fae2aa6fabe4eb7b1b0279
                                      • Instruction ID: 4939e3d6f2ee1e638cea0c2ab80771bb30ce82190bc87a69a20d80acbb8ea77f
                                      • Opcode Fuzzy Hash: 30c51c3660b335909941bd776e0ba00e756f88a803fae2aa6fabe4eb7b1b0279
                                      • Instruction Fuzzy Hash: 98316B7160060AAFDB219FB9DD44A7ABBF9FF18300B14462EF956C2710DB31E914DBA0
                                      APIs
                                        • Part of subcall function 008C3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 008C3A57
                                        • Part of subcall function 008C3A3D: GetCurrentThreadId.KERNEL32 ref: 008C3A5E
                                        • Part of subcall function 008C3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008C25B3), ref: 008C3A65
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 008C25BD
                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008C25DB
                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 008C25DF
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 008C25E9
                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 008C2601
                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 008C2605
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 008C260F
                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 008C2623
                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 008C2627
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                      • String ID:
                                      • API String ID: 2014098862-0
                                      • Opcode ID: d0e8008312d7367c490440a96723e82cbfc9fd5cf9f22a8299ac4807e0341f05
                                      • Instruction ID: 53f117834e98cf9287e5b5fdb82f1c0cdfc5ec0d1d15ae20fb66ba2c344e2b2d
                                      • Opcode Fuzzy Hash: d0e8008312d7367c490440a96723e82cbfc9fd5cf9f22a8299ac4807e0341f05
                                      • Instruction Fuzzy Hash: E801B530294624BBFB1067789C8AF693E69EF5AB11F100005F314EE0D1C9F15555CA6A
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,008C1449,?,?,00000000), ref: 008C180C
                                      • HeapAlloc.KERNEL32(00000000,?,008C1449,?,?,00000000), ref: 008C1813
                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,008C1449,?,?,00000000), ref: 008C1828
                                      • GetCurrentProcess.KERNEL32(?,00000000,?,008C1449,?,?,00000000), ref: 008C1830
                                      • DuplicateHandle.KERNEL32(00000000,?,008C1449,?,?,00000000), ref: 008C1833
                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,008C1449,?,?,00000000), ref: 008C1843
                                      • GetCurrentProcess.KERNEL32(008C1449,00000000,?,008C1449,?,?,00000000), ref: 008C184B
                                      • DuplicateHandle.KERNEL32(00000000,?,008C1449,?,?,00000000), ref: 008C184E
                                      • CreateThread.KERNEL32(00000000,00000000,008C1874,00000000,00000000,00000000), ref: 008C1868
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                      • String ID:
                                      • API String ID: 1957940570-0
                                      • Opcode ID: 73ba136db11dbc9ee83d36e863d13b162331eec713ab75726e18c2e9979362f1
                                      • Instruction ID: fafa16770aa8f213b9a0f5e3581964afbc4e191e4dc8ac3f2cefd4d9d9165b6c
                                      • Opcode Fuzzy Hash: 73ba136db11dbc9ee83d36e863d13b162331eec713ab75726e18c2e9979362f1
                                      • Instruction Fuzzy Hash: 8501BBB5240308BFE710ABB5DD4DF6B7BACFB89B11F004411FA05DB2A2DA749950DB60
                                      APIs
                                        • Part of subcall function 008CD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 008CD501
                                        • Part of subcall function 008CD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 008CD50F
                                        • Part of subcall function 008CD4DC: CloseHandle.KERNEL32(00000000), ref: 008CD5DC
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008EA16D
                                      • GetLastError.KERNEL32 ref: 008EA180
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008EA1B3
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 008EA268
                                      • GetLastError.KERNEL32(00000000), ref: 008EA273
                                      • CloseHandle.KERNEL32(00000000), ref: 008EA2C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                      • String ID: SeDebugPrivilege
                                      • API String ID: 2533919879-2896544425
                                      • Opcode ID: 0c0dbc16bfd500d174a04d2e03409d09d6b81e2ef0d1161aafa37973c0089fa4
                                      • Instruction ID: 473ecc58b3ebab214f147a4e84d64fbd8d2ea547dbdde859ed5a8b9023a0219a
                                      • Opcode Fuzzy Hash: 0c0dbc16bfd500d174a04d2e03409d09d6b81e2ef0d1161aafa37973c0089fa4
                                      • Instruction Fuzzy Hash: 12618A30204282AFD714DF19C494F25BBA1FF45718F15848CE5669B7A2C7B2ED45CB92
                                      APIs
                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 008F3925
                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 008F393A
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 008F3954
                                      • _wcslen.LIBCMT ref: 008F3999
                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 008F39C6
                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008F39F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window_wcslen
                                      • String ID: SysListView32
                                      • API String ID: 2147712094-78025650
                                      • Opcode ID: 17deab4402fb9db2d0148ee55df1049174c25c0ed3bd17df5791e719e7743372
                                      • Instruction ID: 4d9c592aa2127bcca646ae52edf3d9b6066c3802dea683035f941a1d931bceb2
                                      • Opcode Fuzzy Hash: 17deab4402fb9db2d0148ee55df1049174c25c0ed3bd17df5791e719e7743372
                                      • Instruction Fuzzy Hash: 7E418171A0021DABEB219F74CC45FFA7BA9FF08354F100526FA58E7291D7B59A80CB90
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008CBCFD
                                      • IsMenu.USER32(00000000), ref: 008CBD1D
                                      • CreatePopupMenu.USER32 ref: 008CBD53
                                      • GetMenuItemCount.USER32(017B55E0), ref: 008CBDA4
                                      • InsertMenuItemW.USER32(017B55E0,?,00000001,00000030), ref: 008CBDCC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                      • String ID: 0$2
                                      • API String ID: 93392585-3793063076
                                      • Opcode ID: b393e14a5a6a837bf7cb27401430833a08c2579178d04ea3fc47c03d51877127
                                      • Instruction ID: 61934f2dbf13f19db5d2c3b9ea369e996c2faa9998167a6d7531982b78af730c
                                      • Opcode Fuzzy Hash: b393e14a5a6a837bf7cb27401430833a08c2579178d04ea3fc47c03d51877127
                                      • Instruction Fuzzy Hash: 94519C70A00A099BDB10DFA8D986FAEBBF8FF49314F14415DE602E7290D770D945CB62
                                      APIs
                                      • LoadIconW.USER32(00000000,00007F03), ref: 008CC913
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: IconLoad
                                      • String ID: blank$info$question$stop$warning
                                      • API String ID: 2457776203-404129466
                                      • Opcode ID: 757e1ac1fc1ab7f7b58d3d6c9c81b0490eeb67c5687e7cc85fa47c8de9162586
                                      • Instruction ID: 5e2d6ede4ec1ac78c801d4e744f916cc282ed3de09b14c317e1423e466f212ef
                                      • Opcode Fuzzy Hash: 757e1ac1fc1ab7f7b58d3d6c9c81b0490eeb67c5687e7cc85fa47c8de9162586
                                      • Instruction Fuzzy Hash: 1011DD3268931BBAE705AB54AC83EAB6BBCFF15358B50003EF508E6282D770DE045365
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$LocalTime
                                      • String ID:
                                      • API String ID: 952045576-0
                                      • Opcode ID: 4ba91cc31431fc623bb9148506b3667127f80691a24e2da3152fa4e784a96cf8
                                      • Instruction ID: 59ab6471f4ceb7638733356fa01295d8f204ad4b1959c9ef77b6641567360ec4
                                      • Opcode Fuzzy Hash: 4ba91cc31431fc623bb9148506b3667127f80691a24e2da3152fa4e784a96cf8
                                      • Instruction Fuzzy Hash: F5414366C1021966CB21FBF88C8AACF77B8FF45710F504566E518E3162FB34E255C3A6
                                      APIs
                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,008B682C,00000004,00000000,00000000), ref: 0087F953
                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,008B682C,00000004,00000000,00000000), ref: 008BF3D1
                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,008B682C,00000004,00000000,00000000), ref: 008BF454
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ShowWindow
                                      • String ID:
                                      • API String ID: 1268545403-0
                                      • Opcode ID: b46159759baa0738f94b73aa2ff452f4cd73e921e2972aad990f17a9d75b3c8f
                                      • Instruction ID: d9cb5e896cf7c42f7f75879db482fc7a86e59e11517b741db21e0de24a73d2b7
                                      • Opcode Fuzzy Hash: b46159759baa0738f94b73aa2ff452f4cd73e921e2972aad990f17a9d75b3c8f
                                      • Instruction Fuzzy Hash: C241E531108644BAC7389B2E8D88B6A7F91FB56314F14803CE34BD6667D631D980CB11
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 008F2D1B
                                      • GetDC.USER32(00000000), ref: 008F2D23
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008F2D2E
                                      • ReleaseDC.USER32(00000000,00000000), ref: 008F2D3A
                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 008F2D76
                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 008F2D87
                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,008F5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 008F2DC2
                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 008F2DE1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                      • String ID:
                                      • API String ID: 3864802216-0
                                      • Opcode ID: 5925b4b1880e110e2807471319af95808d48da8e7643aa2c9cc86a05e539ef5b
                                      • Instruction ID: 0fbffd1860370a6e2de541e5110d1ee6970c468db0905fb666ab7e870970f6e2
                                      • Opcode Fuzzy Hash: 5925b4b1880e110e2807471319af95808d48da8e7643aa2c9cc86a05e539ef5b
                                      • Instruction Fuzzy Hash: C2318972201618BBEB218F64CC8AFFB3BA9FF09711F044055FE08DA291C6759D51CBA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _memcmp
                                      • String ID:
                                      • API String ID: 2931989736-0
                                      • Opcode ID: 11cd24fde79f3a7160af3394e9313fc2603f64bad6f90f12442a0599864060b5
                                      • Instruction ID: 87f6cedef7dd2ab57fefc8740155256fccfe14ea5758017c4a310f07e5652acb
                                      • Opcode Fuzzy Hash: 11cd24fde79f3a7160af3394e9313fc2603f64bad6f90f12442a0599864060b5
                                      • Instruction Fuzzy Hash: 47219561640A1D77DE14A5249D82FBA236CFF31394B540028FE05DA782FB39FD9187AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: NULL Pointer assignment$Not an Object type
                                      • API String ID: 0-572801152
                                      • Opcode ID: e7c6383ec1388a552d719296143df8e3fe0382bd8f3945cb81c50c3a29c472c3
                                      • Instruction ID: 906ee3ec90eda7834748c8e71e492f1ad6d540117ff2a3a6e37f3984985366a4
                                      • Opcode Fuzzy Hash: e7c6383ec1388a552d719296143df8e3fe0382bd8f3945cb81c50c3a29c472c3
                                      • Instruction Fuzzy Hash: 38D1A071A0064AAFDF10CFA9C881BAEB7B5FF49358F148069E915EB281E770DD45CB90
                                      APIs
                                      • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,008A17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 008A15CE
                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,008A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008A1651
                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,008A17FB,?,008A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008A16E4
                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,008A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008A16FB
                                        • Part of subcall function 00893820: RtlAllocateHeap.NTDLL(00000000,?,00931444,?,0087FDF5,?,?,0086A976,00000010,00931440,008613FC,?,008613C6,?,00861129), ref: 00893852
                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,008A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008A1777
                                      • __freea.LIBCMT ref: 008A17A2
                                      • __freea.LIBCMT ref: 008A17AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                      • String ID:
                                      • API String ID: 2829977744-0
                                      • Opcode ID: 7393cb1a0facdb8793490cb8240bc74dbaaf1518df7478f1385188fa03f44bbb
                                      • Instruction ID: 438e664f0bc1f3139f004cee5fb95803fd7e1ad12183a90b7e57cde01b072c97
                                      • Opcode Fuzzy Hash: 7393cb1a0facdb8793490cb8240bc74dbaaf1518df7478f1385188fa03f44bbb
                                      • Instruction Fuzzy Hash: FD91D371E0021A9AEF249E74CC89EEE7BB5FF4A714F184659E902E7581EB35CD40CB60
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit
                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                      • API String ID: 2610073882-625585964
                                      • Opcode ID: b3ea207c62cd677ecf2f245615cc7b08cc3b22b5ec4c684680f52f753da71dbc
                                      • Instruction ID: 55b3dd0147d4c2bdc7b39cb161e01884bf7bce335bc35eae41734c1e3440852b
                                      • Opcode Fuzzy Hash: b3ea207c62cd677ecf2f245615cc7b08cc3b22b5ec4c684680f52f753da71dbc
                                      • Instruction Fuzzy Hash: 6091AF71A00259ABDF20CFA6CC44FAEBBB8FF86714F108559F509EB291D7709945CBA0
                                      APIs
                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 008D125C
                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 008D1284
                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008D12A8
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008D12D8
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008D135F
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008D13C4
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008D1430
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                      • String ID:
                                      • API String ID: 2550207440-0
                                      • Opcode ID: f9305ada1d58d89f3adc2decdb709a537009a8b7e137f48f63d487740cd558a6
                                      • Instruction ID: 12796a0b2879aea9f0af1990813413e117967d2d146370866107392eefa89bf3
                                      • Opcode Fuzzy Hash: f9305ada1d58d89f3adc2decdb709a537009a8b7e137f48f63d487740cd558a6
                                      • Instruction Fuzzy Hash: 2A91D471A00219AFDF10DFA9C888BBEB7B6FF45325F10422AE500E7391DB75A941CB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$BeginCreatePath
                                      • String ID:
                                      • API String ID: 3225163088-0
                                      • Opcode ID: 8d1faadb61f5abb3c10923b56a36bc6ec289d55a32478a4a4765dabf6eec38e4
                                      • Instruction ID: c2d7a3bf311997db6f1ebef6dd106fde6d2508fc1f8ee106d0f1c3777b52c79a
                                      • Opcode Fuzzy Hash: 8d1faadb61f5abb3c10923b56a36bc6ec289d55a32478a4a4765dabf6eec38e4
                                      • Instruction Fuzzy Hash: 8E911471D00219EFCB10CFA9C884AEEBBB8FF89320F148559E559F7255D774AA42CB60
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 008E396B
                                      • CharUpperBuffW.USER32(?,?), ref: 008E3A7A
                                      • _wcslen.LIBCMT ref: 008E3A8A
                                      • VariantClear.OLEAUT32(?), ref: 008E3C1F
                                        • Part of subcall function 008D0CDF: VariantInit.OLEAUT32(00000000), ref: 008D0D1F
                                        • Part of subcall function 008D0CDF: VariantCopy.OLEAUT32(?,?), ref: 008D0D28
                                        • Part of subcall function 008D0CDF: VariantClear.OLEAUT32(?), ref: 008D0D34
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                      • API String ID: 4137639002-1221869570
                                      • Opcode ID: 06cd12e98a1f5b037d21b2c1c0c05480dcc07281ecbec85817923d03c22d37bb
                                      • Instruction ID: 228fd5d495dadb841a892ae58446ad2a0b6076b0aa7ec31565df40f4984634ec
                                      • Opcode Fuzzy Hash: 06cd12e98a1f5b037d21b2c1c0c05480dcc07281ecbec85817923d03c22d37bb
                                      • Instruction Fuzzy Hash: BE9122746083459FC704EF29C48496AB7E4FB8A314F14886EF88ADB351DB31EE45CB92
                                      APIs
                                        • Part of subcall function 008C000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?,?,008C035E), ref: 008C002B
                                        • Part of subcall function 008C000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?), ref: 008C0046
                                        • Part of subcall function 008C000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?), ref: 008C0054
                                        • Part of subcall function 008C000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?), ref: 008C0064
                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 008E4C51
                                      • _wcslen.LIBCMT ref: 008E4D59
                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 008E4DCF
                                      • CoTaskMemFree.OLE32(?), ref: 008E4DDA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                      • String ID: NULL Pointer assignment
                                      • API String ID: 614568839-2785691316
                                      • Opcode ID: e99f856381db54b355ace84b57cdf042032f326fb2bea2dad2c3efd393d2dd9e
                                      • Instruction ID: f374e396e3efeede7ebf039f31533fd02c03204e0f6ff787fc77ee946d48435f
                                      • Opcode Fuzzy Hash: e99f856381db54b355ace84b57cdf042032f326fb2bea2dad2c3efd393d2dd9e
                                      • Instruction Fuzzy Hash: 7C911471D0025DABDF14DFA5C891AEEB7B8FF09314F108169E919A7291EB309A44CF61
                                      APIs
                                      • GetMenu.USER32(?), ref: 008F2183
                                      • GetMenuItemCount.USER32(00000000), ref: 008F21B5
                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008F21DD
                                      • _wcslen.LIBCMT ref: 008F2213
                                      • GetMenuItemID.USER32(?,?), ref: 008F224D
                                      • GetSubMenu.USER32(?,?), ref: 008F225B
                                        • Part of subcall function 008C3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 008C3A57
                                        • Part of subcall function 008C3A3D: GetCurrentThreadId.KERNEL32 ref: 008C3A5E
                                        • Part of subcall function 008C3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008C25B3), ref: 008C3A65
                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008F22E3
                                        • Part of subcall function 008CE97B: Sleep.KERNEL32 ref: 008CE9F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                      • String ID:
                                      • API String ID: 4196846111-0
                                      • Opcode ID: 0b8e59b9ca936bdae217b684dc52bf3df95857669baa766e2987e93433ddfcd1
                                      • Instruction ID: f1f3598091fb189d99b6327c34a2b879fbe082bd6984407c3284ecb922fc67d7
                                      • Opcode Fuzzy Hash: 0b8e59b9ca936bdae217b684dc52bf3df95857669baa766e2987e93433ddfcd1
                                      • Instruction Fuzzy Hash: 83716D75A00219AFCB10EFB8C845ABEB7B5FF48310F158459E916EB351DB34EE418B91
                                      APIs
                                      • IsWindow.USER32(017B55B8), ref: 008F7F37
                                      • IsWindowEnabled.USER32(017B55B8), ref: 008F7F43
                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 008F801E
                                      • SendMessageW.USER32(017B55B8,000000B0,?,?), ref: 008F8051
                                      • IsDlgButtonChecked.USER32(?,?), ref: 008F8089
                                      • GetWindowLongW.USER32(017B55B8,000000EC), ref: 008F80AB
                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008F80C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                      • String ID:
                                      • API String ID: 4072528602-0
                                      • Opcode ID: 4dceff16541143d0bde149cec4fda40d8893ed2f0c3223b1e2f46fa6e2d90051
                                      • Instruction ID: f65fe829eca9a14f23041011be62ef2991957b63eacd13957687ab6aea2b24d8
                                      • Opcode Fuzzy Hash: 4dceff16541143d0bde149cec4fda40d8893ed2f0c3223b1e2f46fa6e2d90051
                                      • Instruction Fuzzy Hash: 2971773460860CEFEB219F74C884FBABBB9FF49300F144459EA45D72A1CB31A945DB20
                                      APIs
                                      • GetParent.USER32(?), ref: 008CAEF9
                                      • GetKeyboardState.USER32(?), ref: 008CAF0E
                                      • SetKeyboardState.USER32(?), ref: 008CAF6F
                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 008CAF9D
                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 008CAFBC
                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 008CAFFD
                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 008CB020
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: 969cc063d302e136a17fe241dafd5c45a13f78afb5ca435ee4046968f96637c0
                                      • Instruction ID: 52153882b9de4e45aeb8d0b036b9de1a9cbff7a6a80bac332186cb30be9a3620
                                      • Opcode Fuzzy Hash: 969cc063d302e136a17fe241dafd5c45a13f78afb5ca435ee4046968f96637c0
                                      • Instruction Fuzzy Hash: 8F51C3A0614AD93DFB3642348C46FBA7EB9BB06308F08848DE1D5D58C2C7B9EC84D752
                                      APIs
                                      • GetParent.USER32(00000000), ref: 008CAD19
                                      • GetKeyboardState.USER32(?), ref: 008CAD2E
                                      • SetKeyboardState.USER32(?), ref: 008CAD8F
                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 008CADBB
                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 008CADD8
                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 008CAE17
                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 008CAE38
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: 3f8a190c7db68ef0ed3149845337301b5eea28f9f3f49e7e79db0bf1fc6d0623
                                      • Instruction ID: f774eb926a1651ea2d5dea0872c75fc51d25c344753a1709d38a0040a0e765d0
                                      • Opcode Fuzzy Hash: 3f8a190c7db68ef0ed3149845337301b5eea28f9f3f49e7e79db0bf1fc6d0623
                                      • Instruction Fuzzy Hash: E551B3A15047D93DFB3A82748C95F7A7EB8BB45308F08848CE1D6D68C3D2A4EC84D792
                                      APIs
                                      • GetConsoleCP.KERNEL32(008A3CD6,?,?,?,?,?,?,?,?,00895BA3,?,?,008A3CD6,?,?), ref: 00895470
                                      • __fassign.LIBCMT ref: 008954EB
                                      • __fassign.LIBCMT ref: 00895506
                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,008A3CD6,00000005,00000000,00000000), ref: 0089552C
                                      • WriteFile.KERNEL32(?,008A3CD6,00000000,00895BA3,00000000,?,?,?,?,?,?,?,?,?,00895BA3,?), ref: 0089554B
                                      • WriteFile.KERNEL32(?,?,00000001,00895BA3,00000000,?,?,?,?,?,?,?,?,?,00895BA3,?), ref: 00895584
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                      • String ID:
                                      • API String ID: 1324828854-0
                                      • Opcode ID: 9306909ccf267ea6301ccd52e7c4e09e13dd6fa493dfd2bf3784d9f788015e35
                                      • Instruction ID: aeac9f4b95a6d7255d4a25955be7c6016a7dd4a83117be6a3f9da592fc039b36
                                      • Opcode Fuzzy Hash: 9306909ccf267ea6301ccd52e7c4e09e13dd6fa493dfd2bf3784d9f788015e35
                                      • Instruction Fuzzy Hash: BB51B0B0A006099FDF11DFA8DC55AEEBBF9FF09300F19411AE955E7292D630AA41CB60
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 00882D4B
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00882D53
                                      • _ValidateLocalCookies.LIBCMT ref: 00882DE1
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00882E0C
                                      • _ValidateLocalCookies.LIBCMT ref: 00882E61
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: dbe3ee216a3d88efe2c27f4cbda092fdfaad56cfda27d550ef296d66cb6f6df4
                                      • Instruction ID: 04c63ead8bc9b05349f659df19d9eac9edd5bb6396ce48313c0b5280048620d0
                                      • Opcode Fuzzy Hash: dbe3ee216a3d88efe2c27f4cbda092fdfaad56cfda27d550ef296d66cb6f6df4
                                      • Instruction Fuzzy Hash: FF418E34A0021DABCF10EF68C845AAEBFB5FF45328F148165E815EB392D771AA15CB91
                                      APIs
                                        • Part of subcall function 008E304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008E307A
                                        • Part of subcall function 008E304E: _wcslen.LIBCMT ref: 008E309B
                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 008E1112
                                      • WSAGetLastError.WSOCK32 ref: 008E1121
                                      • WSAGetLastError.WSOCK32 ref: 008E11C9
                                      • closesocket.WSOCK32(00000000), ref: 008E11F9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                      • String ID:
                                      • API String ID: 2675159561-0
                                      • Opcode ID: 7918eea892e7176b04e8f8b2f19923db759f1efdfc9a1ae615feee9a96d7cb32
                                      • Instruction ID: f0d87adc10697a6e487e03d0bca59176ee29941eb191f6d37b971ba004de46d2
                                      • Opcode Fuzzy Hash: 7918eea892e7176b04e8f8b2f19923db759f1efdfc9a1ae615feee9a96d7cb32
                                      • Instruction Fuzzy Hash: 4041D431600248AFDB109F69C888BA9B7E9FF46368F148059F956DB291C770EE41CBE1
                                      APIs
                                        • Part of subcall function 008CDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008CCF22,?), ref: 008CDDFD
                                        • Part of subcall function 008CDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008CCF22,?), ref: 008CDE16
                                      • lstrcmpiW.KERNEL32(?,?), ref: 008CCF45
                                      • MoveFileW.KERNEL32(?,?), ref: 008CCF7F
                                      • _wcslen.LIBCMT ref: 008CD005
                                      • _wcslen.LIBCMT ref: 008CD01B
                                      • SHFileOperationW.SHELL32(?), ref: 008CD061
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                      • String ID: \*.*
                                      • API String ID: 3164238972-1173974218
                                      • Opcode ID: 5fc000847d68d0ce338e83efe96cd4142815ab148d57604852a3c59d5fe71004
                                      • Instruction ID: 86da415f7859c4b7c01594ba1cf1497f650adf57aa6a9b140872313ea2d245fa
                                      • Opcode Fuzzy Hash: 5fc000847d68d0ce338e83efe96cd4142815ab148d57604852a3c59d5fe71004
                                      • Instruction Fuzzy Hash: D44130719052195FDF12EBA4C981FEEB7B9FF08380F0000AAE549EB141EE74E689CB51
                                      APIs
                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 008F2E1C
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 008F2E4F
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 008F2E84
                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 008F2EB6
                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 008F2EE0
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 008F2EF1
                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 008F2F0B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LongWindow$MessageSend
                                      • String ID:
                                      • API String ID: 2178440468-0
                                      • Opcode ID: bb146c2e1dc825a91b82eca668b4b9254da25df560ae7b034ed55cf6297fe807
                                      • Instruction ID: 90d0fea1799b8258344ca312fe7a172ed4e5345f888b21ceb43bdecf16eb8218
                                      • Opcode Fuzzy Hash: bb146c2e1dc825a91b82eca668b4b9254da25df560ae7b034ed55cf6297fe807
                                      • Instruction Fuzzy Hash: 1A31F3306581589FDB21CF68DD84F6537A1FB5A710F250164FA01CF2B2CB61A840EB51
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008C7769
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008C778F
                                      • SysAllocString.OLEAUT32(00000000), ref: 008C7792
                                      • SysAllocString.OLEAUT32(?), ref: 008C77B0
                                      • SysFreeString.OLEAUT32(?), ref: 008C77B9
                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 008C77DE
                                      • SysAllocString.OLEAUT32(?), ref: 008C77EC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                      • String ID:
                                      • API String ID: 3761583154-0
                                      • Opcode ID: c0710e9f55771ca82f1f3bb2b604860c8f32d417bccea2cae53c4c48044d22ca
                                      • Instruction ID: af417956db37e34af0966b76689f7b8ea7bdf3ed259374ea4ad874283482cbbb
                                      • Opcode Fuzzy Hash: c0710e9f55771ca82f1f3bb2b604860c8f32d417bccea2cae53c4c48044d22ca
                                      • Instruction Fuzzy Hash: 3E219C7660821DAFDB109FB8CC88EBA73ACFB09364B008029BA14DB191E670DD45CB64
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008C7842
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008C7868
                                      • SysAllocString.OLEAUT32(00000000), ref: 008C786B
                                      • SysAllocString.OLEAUT32 ref: 008C788C
                                      • SysFreeString.OLEAUT32 ref: 008C7895
                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 008C78AF
                                      • SysAllocString.OLEAUT32(?), ref: 008C78BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                      • String ID:
                                      • API String ID: 3761583154-0
                                      • Opcode ID: bc6442b7cd66e6f05c58a20f6c102ecee6e627261b6fafeb594290acbbf01e39
                                      • Instruction ID: 1f4848c0c7fdc44feefd53f12a5a725deeed613346f0ad2cb0f53e68c91e211c
                                      • Opcode Fuzzy Hash: bc6442b7cd66e6f05c58a20f6c102ecee6e627261b6fafeb594290acbbf01e39
                                      • Instruction Fuzzy Hash: 05213135608108AF9B109BB9DC89EBA77BCFB097607108139BA15CB2A5E674DD41CB68
                                      APIs
                                      • GetStdHandle.KERNEL32(0000000C), ref: 008D04F2
                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008D052E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateHandlePipe
                                      • String ID: nul
                                      • API String ID: 1424370930-2873401336
                                      • Opcode ID: abb84e6a800142d2f0de365fd5c39010f9ea71a6c4251eed588299a183f0f801
                                      • Instruction ID: 3ba3608bbbe5003310e689f989fa5dd28aefff4c0a70c9c92b27813278886309
                                      • Opcode Fuzzy Hash: abb84e6a800142d2f0de365fd5c39010f9ea71a6c4251eed588299a183f0f801
                                      • Instruction Fuzzy Hash: 9E212D75900209EBDB209F69E845BAA77B4FF44764F204B1AECA1E73E0E7709954DF20
                                      APIs
                                      • GetStdHandle.KERNEL32(000000F6), ref: 008D05C6
                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008D0601
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateHandlePipe
                                      • String ID: nul
                                      • API String ID: 1424370930-2873401336
                                      • Opcode ID: c05a29da9196db24adee0f2c7cb5aaef1cee7162f2fad1cc734b7d600cb0bb01
                                      • Instruction ID: 11022b071d1eb4bef1362daec27d7768171a9e02108c5ef67cb0dbcd48c6c2f7
                                      • Opcode Fuzzy Hash: c05a29da9196db24adee0f2c7cb5aaef1cee7162f2fad1cc734b7d600cb0bb01
                                      • Instruction Fuzzy Hash: A12130755003059BDB209F79A804BAA77A4FFA5724F200B1AE8A1E73D0D770D960CF10
                                      APIs
                                        • Part of subcall function 0086600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0086604C
                                        • Part of subcall function 0086600E: GetStockObject.GDI32(00000011), ref: 00866060
                                        • Part of subcall function 0086600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0086606A
                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 008F4112
                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 008F411F
                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 008F412A
                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 008F4139
                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 008F4145
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$CreateObjectStockWindow
                                      • String ID: Msctls_Progress32
                                      • API String ID: 1025951953-3636473452
                                      • Opcode ID: f56647f465e9523725a69912539e2b2c997ac4afcfeab785cc1398358c722520
                                      • Instruction ID: 16b2b7736c96e0d60b2a5a11b085ebf6c96087df4c883073f776f5d8bf40879f
                                      • Opcode Fuzzy Hash: f56647f465e9523725a69912539e2b2c997ac4afcfeab785cc1398358c722520
                                      • Instruction Fuzzy Hash: F9118EB215021DBEEB118E64CC85EE77F9DFF08798F014111BB18E2060CA729C61DBA4
                                      APIs
                                        • Part of subcall function 0089D7A3: _free.LIBCMT ref: 0089D7CC
                                      • _free.LIBCMT ref: 0089D82D
                                        • Part of subcall function 008929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000), ref: 008929DE
                                        • Part of subcall function 008929C8: GetLastError.KERNEL32(00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000,00000000), ref: 008929F0
                                      • _free.LIBCMT ref: 0089D838
                                      • _free.LIBCMT ref: 0089D843
                                      • _free.LIBCMT ref: 0089D897
                                      • _free.LIBCMT ref: 0089D8A2
                                      • _free.LIBCMT ref: 0089D8AD
                                      • _free.LIBCMT ref: 0089D8B8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                      • Instruction ID: e9622b785f7729c72d3f861383b11734ec9f5b52121eac12c18d9c476d1441d0
                                      • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                      • Instruction Fuzzy Hash: 3411F671940B04BADE21BFF8CC46FCB7B9CFF04700F484825B29DE6492DA65A50586A6
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 008CDA74
                                      • LoadStringW.USER32(00000000), ref: 008CDA7B
                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 008CDA91
                                      • LoadStringW.USER32(00000000), ref: 008CDA98
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 008CDADC
                                      Strings
                                      • %s (%d) : ==> %s: %s %s, xrefs: 008CDAB9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString$Message
                                      • String ID: %s (%d) : ==> %s: %s %s
                                      • API String ID: 4072794657-3128320259
                                      • Opcode ID: 3044e0d4c4b9d7f2c1757b7df67ef8e6f6c59200c4b34ec576226ccd8205a71d
                                      • Instruction ID: e37c658221fe5eb53a698efc79d32aee8a39af80f9094c75efecdcd5b4c3f663
                                      • Opcode Fuzzy Hash: 3044e0d4c4b9d7f2c1757b7df67ef8e6f6c59200c4b34ec576226ccd8205a71d
                                      • Instruction Fuzzy Hash: 1C014FF250021C7FE710ABA49E89EFB766CF708705F4004A5B746E2041E6749E848B74
                                      APIs
                                      • InterlockedExchange.KERNEL32(017AE230,017AE230), ref: 008D097B
                                      • EnterCriticalSection.KERNEL32(017AE210,00000000), ref: 008D098D
                                      • TerminateThread.KERNEL32(72446D65,000001F6), ref: 008D099B
                                      • WaitForSingleObject.KERNEL32(72446D65,000003E8), ref: 008D09A9
                                      • CloseHandle.KERNEL32(72446D65), ref: 008D09B8
                                      • InterlockedExchange.KERNEL32(017AE230,000001F6), ref: 008D09C8
                                      • LeaveCriticalSection.KERNEL32(017AE210), ref: 008D09CF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                      • String ID:
                                      • API String ID: 3495660284-0
                                      • Opcode ID: 7db1b4d65b296d4ea3c961afaac165863db5e9fe0aeb144ed60c8f4b7e823d26
                                      • Instruction ID: 3b0ce66253a179697529f29dbd5367088348e39ec00ab48175b96dfa3917bf3a
                                      • Opcode Fuzzy Hash: 7db1b4d65b296d4ea3c961afaac165863db5e9fe0aeb144ed60c8f4b7e823d26
                                      • Instruction Fuzzy Hash: 27F01932442A06BBD7415BA4EF88FE6BB29FF01702F402126F202908A1D7749665DFA0
                                      APIs
                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 008E1DC0
                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 008E1DE1
                                      • WSAGetLastError.WSOCK32 ref: 008E1DF2
                                      • htons.WSOCK32(?,?,?,?,?), ref: 008E1EDB
                                      • inet_ntoa.WSOCK32(?), ref: 008E1E8C
                                        • Part of subcall function 008C39E8: _strlen.LIBCMT ref: 008C39F2
                                        • Part of subcall function 008E3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,008DEC0C), ref: 008E3240
                                      • _strlen.LIBCMT ref: 008E1F35
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                      • String ID:
                                      • API String ID: 3203458085-0
                                      • Opcode ID: 13a6cb022a01db10ec3ba0fddc57a0a3580e935a9c8448a63349197bef449630
                                      • Instruction ID: 459865c6bfba39eb69a4a649b7883c334516e721476e6310d82fe613fd248a3c
                                      • Opcode Fuzzy Hash: 13a6cb022a01db10ec3ba0fddc57a0a3580e935a9c8448a63349197bef449630
                                      • Instruction Fuzzy Hash: B3B1CF31204380AFC724DF29C889E2A7BA5FF85318F54855CF456DB2A2DB31ED45CB92
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 00865D30
                                      • GetWindowRect.USER32(?,?), ref: 00865D71
                                      • ScreenToClient.USER32(?,?), ref: 00865D99
                                      • GetClientRect.USER32(?,?), ref: 00865ED7
                                      • GetWindowRect.USER32(?,?), ref: 00865EF8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Rect$Client$Window$Screen
                                      • String ID:
                                      • API String ID: 1296646539-0
                                      • Opcode ID: 305010bee980d68740d6b890a5641c29b7341961e110b2b7e6da6a1195e99061
                                      • Instruction ID: 16cdc99cf181a54dce7125c380e987f48387c06cdc516f7842f287e62abb0b66
                                      • Opcode Fuzzy Hash: 305010bee980d68740d6b890a5641c29b7341961e110b2b7e6da6a1195e99061
                                      • Instruction Fuzzy Hash: 03B17734A00A4ADBDF10CFA8C4807EEBBF1FF58310F14941AE8AAD7650DB74AA51DB50
                                      APIs
                                      • __allrem.LIBCMT ref: 008900BA
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008900D6
                                      • __allrem.LIBCMT ref: 008900ED
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0089010B
                                      • __allrem.LIBCMT ref: 00890122
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00890140
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                      • String ID:
                                      • API String ID: 1992179935-0
                                      • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                      • Instruction ID: dd867a3d58bb3b66bebdbfe3840b2fa53d2b066bd71e3b1ab6c96720c85305d3
                                      • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                      • Instruction Fuzzy Hash: 2D81E671A00B069FEB24BE6CCC41B6A73E9FF41724F28453AF651D6682EB70D9008B51
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,008882D9,008882D9,?,?,?,0089644F,00000001,00000001,8BE85006), ref: 00896258
                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0089644F,00000001,00000001,8BE85006,?,?,?), ref: 008962DE
                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 008963D8
                                      • __freea.LIBCMT ref: 008963E5
                                        • Part of subcall function 00893820: RtlAllocateHeap.NTDLL(00000000,?,00931444,?,0087FDF5,?,?,0086A976,00000010,00931440,008613FC,?,008613C6,?,00861129), ref: 00893852
                                      • __freea.LIBCMT ref: 008963EE
                                      • __freea.LIBCMT ref: 00896413
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                      • String ID:
                                      • API String ID: 1414292761-0
                                      • Opcode ID: 38f04d28015e90e9e80803fdf4f729d2670f09365641b5e0023a55053e97cfa6
                                      • Instruction ID: 269eba4c125c94a3facf9715d7c045c9695a6454540732bee5d75140f361eadb
                                      • Opcode Fuzzy Hash: 38f04d28015e90e9e80803fdf4f729d2670f09365641b5e0023a55053e97cfa6
                                      • Instruction Fuzzy Hash: 2A51C372A00216ABEF26AF64CC81EBF77A9FB44754F194629FC05D6240FB34DD60E660
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008EB6AE,?,?), ref: 008EC9B5
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008EC9F1
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008ECA68
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008ECA9E
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008EBCCA
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008EBD25
                                      • RegCloseKey.ADVAPI32(00000000), ref: 008EBD6A
                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 008EBD99
                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 008EBDF3
                                      • RegCloseKey.ADVAPI32(?), ref: 008EBDFF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                      • String ID:
                                      • API String ID: 1120388591-0
                                      • Opcode ID: 82804c67b137fc12819cfe1079e58c4d3dd9f67940bfa193bc70bf67beede778
                                      • Instruction ID: b31924d32344b0fc6b93b0c346230a9d3907dc67acb3f64aa8ec86b31a418dd8
                                      • Opcode Fuzzy Hash: 82804c67b137fc12819cfe1079e58c4d3dd9f67940bfa193bc70bf67beede778
                                      • Instruction Fuzzy Hash: 32816D31208281AFD714DF25C895E2BBBE5FF85308F14856CF5998B2A2DB31ED45CB92
                                      APIs
                                      • VariantInit.OLEAUT32(00000035), ref: 008BF7B9
                                      • SysAllocString.OLEAUT32(00000001), ref: 008BF860
                                      • VariantCopy.OLEAUT32(008BFA64,00000000), ref: 008BF889
                                      • VariantClear.OLEAUT32(008BFA64), ref: 008BF8AD
                                      • VariantCopy.OLEAUT32(008BFA64,00000000), ref: 008BF8B1
                                      • VariantClear.OLEAUT32(?), ref: 008BF8BB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$ClearCopy$AllocInitString
                                      • String ID:
                                      • API String ID: 3859894641-0
                                      • Opcode ID: 70dc4d100f54c5922d8f50023b8c39c76239a85f2745ee33747f4ede50d399fd
                                      • Instruction ID: deed73d96319037294138315de9f2158ffc96c2ac99e90b13a9d509b2ccdebe3
                                      • Opcode Fuzzy Hash: 70dc4d100f54c5922d8f50023b8c39c76239a85f2745ee33747f4ede50d399fd
                                      • Instruction Fuzzy Hash: 1051BF31600314BACF20AB69DC95BA9B7A8FF45714B249477EA06DF397DA708C40CB97
                                      APIs
                                        • Part of subcall function 00867620: _wcslen.LIBCMT ref: 00867625
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 008D94E5
                                      • _wcslen.LIBCMT ref: 008D9506
                                      • _wcslen.LIBCMT ref: 008D952D
                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 008D9585
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$FileName$OpenSave
                                      • String ID: X
                                      • API String ID: 83654149-3081909835
                                      • Opcode ID: 04811e2a624d12ba411e405f6e3cde1472b365d3af4a8ab0ac619f88294ba128
                                      • Instruction ID: af82023684d7843418588428c225675572bd75ce475fe03f372be15f21329492
                                      • Opcode Fuzzy Hash: 04811e2a624d12ba411e405f6e3cde1472b365d3af4a8ab0ac619f88294ba128
                                      • Instruction Fuzzy Hash: A9E18F315083409FD724EF28C881A6AB7E5FF85314F158A6DE899DB3A2DB31DD05CB92
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      • BeginPaint.USER32(?,?,?), ref: 00879241
                                      • GetWindowRect.USER32(?,?), ref: 008792A5
                                      • ScreenToClient.USER32(?,?), ref: 008792C2
                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 008792D3
                                      • EndPaint.USER32(?,?,?,?,?), ref: 00879321
                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008B71EA
                                        • Part of subcall function 00879339: BeginPath.GDI32(00000000), ref: 00879357
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                      • String ID:
                                      • API String ID: 3050599898-0
                                      • Opcode ID: ae84e87c520afcba13ff85a42b729e794f5dca887e26ab37556ae99e354b62ea
                                      • Instruction ID: 05e21e5b6b2d780adc5dfaf4422111c4afef70febedbf40fa42c312fb5609c94
                                      • Opcode Fuzzy Hash: ae84e87c520afcba13ff85a42b729e794f5dca887e26ab37556ae99e354b62ea
                                      • Instruction Fuzzy Hash: A041AD30108305AFD710DF28DC84FBA7BA8FB95324F144269F9A9C72B2C7319945DB62
                                      APIs
                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 008D080C
                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 008D0847
                                      • EnterCriticalSection.KERNEL32(?), ref: 008D0863
                                      • LeaveCriticalSection.KERNEL32(?), ref: 008D08DC
                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008D08F3
                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 008D0921
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                      • String ID:
                                      • API String ID: 3368777196-0
                                      • Opcode ID: 040f77ddc1a608862b6fdc74284332a17537265db02d5fcddcf2d72e0ca83dc2
                                      • Instruction ID: 86d7ca2f8a8d413fda696f81f90fcabc7065f5a84bafded01e7d33aebc4a21fa
                                      • Opcode Fuzzy Hash: 040f77ddc1a608862b6fdc74284332a17537265db02d5fcddcf2d72e0ca83dc2
                                      • Instruction Fuzzy Hash: FC414971900209ABDF14AF68DC85A6A7779FF04310F1480A5E904DE29BD730DE65DFA5
                                      APIs
                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,008BF3AB,00000000,?,?,00000000,?,008B682C,00000004,00000000,00000000), ref: 008F824C
                                      • EnableWindow.USER32(00000000,00000000), ref: 008F8272
                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008F82D1
                                      • ShowWindow.USER32(00000000,00000004), ref: 008F82E5
                                      • EnableWindow.USER32(00000000,00000001), ref: 008F830B
                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 008F832F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Show$Enable$MessageSend
                                      • String ID:
                                      • API String ID: 642888154-0
                                      • Opcode ID: 82bca542596ce056d9384bd05902966d3071881b026904ab2364b10f0548d224
                                      • Instruction ID: 7ea12a3f07ece795bdcb739461bc1ea380df9f92097e1073b98c58ed608a012c
                                      • Opcode Fuzzy Hash: 82bca542596ce056d9384bd05902966d3071881b026904ab2364b10f0548d224
                                      • Instruction Fuzzy Hash: E1416F34605648EFDB25CF35D999BF87BE1FB0A714F1841A9E6088B2B2CB31A845DF50
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 008C4C95
                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 008C4CB2
                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 008C4CEA
                                      • _wcslen.LIBCMT ref: 008C4D08
                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 008C4D10
                                      • _wcsstr.LIBVCRUNTIME ref: 008C4D1A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                      • String ID:
                                      • API String ID: 72514467-0
                                      • Opcode ID: cb11eee543b48fb22e258a36b135e0fccf575be70964c68159f4719580de1e81
                                      • Instruction ID: 9d8305c6f766e702532a0c1e9c13dce5ffb11b1e305c2f67faa439e6f00e0062
                                      • Opcode Fuzzy Hash: cb11eee543b48fb22e258a36b135e0fccf575be70964c68159f4719580de1e81
                                      • Instruction Fuzzy Hash: 332107322042047BEB656B39AC19F7B7BA8FF45750F10902DF90ACA1A2EA75DD40C3A1
                                      APIs
                                        • Part of subcall function 00863AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00863A97,?,?,00862E7F,?,?,?,00000000), ref: 00863AC2
                                      • _wcslen.LIBCMT ref: 008D587B
                                      • CoInitialize.OLE32(00000000), ref: 008D5995
                                      • CoCreateInstance.OLE32(008FFCF8,00000000,00000001,008FFB68,?), ref: 008D59AE
                                      • CoUninitialize.OLE32 ref: 008D59CC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                      • String ID: .lnk
                                      • API String ID: 3172280962-24824748
                                      • Opcode ID: b68697726f6bd18027b9dc0f3982e951659f2eb6f70a25e751920981ef5fa24f
                                      • Instruction ID: 2fa36a94f2fc4f07722e1ba4addfbd5ebdfe5ce933978576f2dd6411e6da1db0
                                      • Opcode Fuzzy Hash: b68697726f6bd18027b9dc0f3982e951659f2eb6f70a25e751920981ef5fa24f
                                      • Instruction Fuzzy Hash: 9ED173716047019FC714DF28C494A2ABBE1FF89724F118A5AF88ADB361DB31EC45CB92
                                      APIs
                                        • Part of subcall function 008C0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008C0FCA
                                        • Part of subcall function 008C0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008C0FD6
                                        • Part of subcall function 008C0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008C0FE5
                                        • Part of subcall function 008C0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008C0FEC
                                        • Part of subcall function 008C0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008C1002
                                      • GetLengthSid.ADVAPI32(?,00000000,008C1335), ref: 008C17AE
                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008C17BA
                                      • HeapAlloc.KERNEL32(00000000), ref: 008C17C1
                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 008C17DA
                                      • GetProcessHeap.KERNEL32(00000000,00000000,008C1335), ref: 008C17EE
                                      • HeapFree.KERNEL32(00000000), ref: 008C17F5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                      • String ID:
                                      • API String ID: 3008561057-0
                                      • Opcode ID: bab053917f3f562ccfb60be68e9caa026352e634fec3243ef344c8d102a3c6ed
                                      • Instruction ID: adac02bbfd1b51aa355a07cb01d0c726f0d1225c4ef20def290551183ff073a7
                                      • Opcode Fuzzy Hash: bab053917f3f562ccfb60be68e9caa026352e634fec3243ef344c8d102a3c6ed
                                      • Instruction Fuzzy Hash: 88116731510209EFDF109BA4CD89FAA7BB9FF42355F104018A481D7215C735EA55CB60
                                      APIs
                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008C14FF
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 008C1506
                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 008C1515
                                      • CloseHandle.KERNEL32(00000004), ref: 008C1520
                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008C154F
                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 008C1563
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                      • String ID:
                                      • API String ID: 1413079979-0
                                      • Opcode ID: f20c5e952ba0fda55ac3b0015b7114be64a9f6a43b2f0568feeea83b5b0ef407
                                      • Instruction ID: 12bcaf172eb95782cdbb45a4e178886831340efb77606e28d7796e2e06dfe6e3
                                      • Opcode Fuzzy Hash: f20c5e952ba0fda55ac3b0015b7114be64a9f6a43b2f0568feeea83b5b0ef407
                                      • Instruction Fuzzy Hash: FF11477250020DABDF118FA8DE49FEA7BB9FF49744F044018FA05A2160D371CE65EB60
                                      APIs
                                      • GetLastError.KERNEL32(?,?,00883379,00882FE5), ref: 00883390
                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0088339E
                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008833B7
                                      • SetLastError.KERNEL32(00000000,?,00883379,00882FE5), ref: 00883409
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLastValue___vcrt_
                                      • String ID:
                                      • API String ID: 3852720340-0
                                      • Opcode ID: 92ae908c638be1e520d3c253fb052b04852434ef185754b340a27f496f4762db
                                      • Instruction ID: ecb53207084fd2e2a48553af961881afd49b74a6f829f044b1a9a711864bd67b
                                      • Opcode Fuzzy Hash: 92ae908c638be1e520d3c253fb052b04852434ef185754b340a27f496f4762db
                                      • Instruction Fuzzy Hash: 7401D47365D311BEAA35377CBC85E6B2A94FB25B797200229F410C12F1EF114E02A785
                                      APIs
                                      • GetLastError.KERNEL32(?,?,00895686,008A3CD6,?,00000000,?,00895B6A,?,?,?,?,?,0088E6D1,?,00928A48), ref: 00892D78
                                      • _free.LIBCMT ref: 00892DAB
                                      • _free.LIBCMT ref: 00892DD3
                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0088E6D1,?,00928A48,00000010,00864F4A,?,?,00000000,008A3CD6), ref: 00892DE0
                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0088E6D1,?,00928A48,00000010,00864F4A,?,?,00000000,008A3CD6), ref: 00892DEC
                                      • _abort.LIBCMT ref: 00892DF2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_free$_abort
                                      • String ID:
                                      • API String ID: 3160817290-0
                                      • Opcode ID: e042b711040cb33f39146d99b5200acb01e3474792b900329a61349861b8e40c
                                      • Instruction ID: 351e7590b0285f7250191de7f365b198024a1d3dd645a7ec25708f18ec17032a
                                      • Opcode Fuzzy Hash: e042b711040cb33f39146d99b5200acb01e3474792b900329a61349861b8e40c
                                      • Instruction Fuzzy Hash: 90F0C8355096087BCF22777CBC06E2F2559FFC17E5F2D0519F824E22D2EF24890251A2
                                      APIs
                                        • Part of subcall function 00879639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00879693
                                        • Part of subcall function 00879639: SelectObject.GDI32(?,00000000), ref: 008796A2
                                        • Part of subcall function 00879639: BeginPath.GDI32(?), ref: 008796B9
                                        • Part of subcall function 00879639: SelectObject.GDI32(?,00000000), ref: 008796E2
                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 008F8A4E
                                      • LineTo.GDI32(?,00000003,00000000), ref: 008F8A62
                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 008F8A70
                                      • LineTo.GDI32(?,00000000,00000003), ref: 008F8A80
                                      • EndPath.GDI32(?), ref: 008F8A90
                                      • StrokePath.GDI32(?), ref: 008F8AA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                      • String ID:
                                      • API String ID: 43455801-0
                                      • Opcode ID: 1429795c4200966e12598995f9e0948f9ce2517496e614137ab365b66043e114
                                      • Instruction ID: d1a2dc2c371ad3aa52a5e4acd82c320d1c2b0278259e40b2acfefd3e317dafd3
                                      • Opcode Fuzzy Hash: 1429795c4200966e12598995f9e0948f9ce2517496e614137ab365b66043e114
                                      • Instruction Fuzzy Hash: 6A11097600011DFFDB129FA4DC88EAA7F6CFB08394F008012BA199A1A1CB719E55DFA0
                                      APIs
                                      • GetDC.USER32(00000000), ref: 008C5218
                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 008C5229
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008C5230
                                      • ReleaseDC.USER32(00000000,00000000), ref: 008C5238
                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 008C524F
                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 008C5261
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CapsDevice$Release
                                      • String ID:
                                      • API String ID: 1035833867-0
                                      • Opcode ID: f9cc00fa872a95e37576799786d789b2be5b238549b934473f06cf1a69ec7a43
                                      • Instruction ID: 0fb42b7ab99b336e3c09b7ff2ac6e00a36e0b85a8069bbbe25d16bab73d81a0c
                                      • Opcode Fuzzy Hash: f9cc00fa872a95e37576799786d789b2be5b238549b934473f06cf1a69ec7a43
                                      • Instruction Fuzzy Hash: 64012C75A04618BBEB109BB69D49E5EBFB8FB48751F144069EA04E7381DA709904CBA0
                                      APIs
                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00861BF4
                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00861BFC
                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00861C07
                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00861C12
                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00861C1A
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00861C22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Virtual
                                      • String ID:
                                      • API String ID: 4278518827-0
                                      • Opcode ID: cddeeec3de7c1ca3d434655f8fc225132c916768aef8993455a32812f6e5d1e4
                                      • Instruction ID: 3dbe3ac014ef6aad3e1723e11ca993e93040f65cc7bf46376446073ea2d9af53
                                      • Opcode Fuzzy Hash: cddeeec3de7c1ca3d434655f8fc225132c916768aef8993455a32812f6e5d1e4
                                      • Instruction Fuzzy Hash: 59016CB09027597DE3008F6A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 008CEB30
                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 008CEB46
                                      • GetWindowThreadProcessId.USER32(?,?), ref: 008CEB55
                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008CEB64
                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008CEB6E
                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008CEB75
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                      • String ID:
                                      • API String ID: 839392675-0
                                      • Opcode ID: 32ee2e8faca25b7938a39b0f919795a82b6fb7bddd4e19ac79cd50c275f7699e
                                      • Instruction ID: 6a593557db2f2af95916a097b567e996a0de03935af3dc69f88bbf2fccb894f5
                                      • Opcode Fuzzy Hash: 32ee2e8faca25b7938a39b0f919795a82b6fb7bddd4e19ac79cd50c275f7699e
                                      • Instruction Fuzzy Hash: 31F01772240158BBE7215B629D0EEFB7A7CFFCAB11F000159F601E1191AAA45B01D6B5
                                      APIs
                                      • GetClientRect.USER32(?), ref: 008B7452
                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 008B7469
                                      • GetWindowDC.USER32(?), ref: 008B7475
                                      • GetPixel.GDI32(00000000,?,?), ref: 008B7484
                                      • ReleaseDC.USER32(?,00000000), ref: 008B7496
                                      • GetSysColor.USER32(00000005), ref: 008B74B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                      • String ID:
                                      • API String ID: 272304278-0
                                      • Opcode ID: 756cdd899c7149feede2143be3b2dc689b0744e3b144007006e937958cb29bd7
                                      • Instruction ID: 849c2caef92c89cf20d44c16bcf385800af8a4d701a2525da2be56201502883c
                                      • Opcode Fuzzy Hash: 756cdd899c7149feede2143be3b2dc689b0744e3b144007006e937958cb29bd7
                                      • Instruction Fuzzy Hash: CC015631404609EFDB505B74DD08FFA7BB5FB08312F200064FA15E22A0CB311E51EB10
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 008C187F
                                      • UnloadUserProfile.USERENV(?,?), ref: 008C188B
                                      • CloseHandle.KERNEL32(?), ref: 008C1894
                                      • CloseHandle.KERNEL32(?), ref: 008C189C
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 008C18A5
                                      • HeapFree.KERNEL32(00000000), ref: 008C18AC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                      • String ID:
                                      • API String ID: 146765662-0
                                      • Opcode ID: 4a7f54642b73cc5b17075faafe341f3b1cbf5eb53778a71bc7287f698908c050
                                      • Instruction ID: 1044af8a8375d537bc4ecef3cc66cc708e65969ab727fbf03b4ca9d0364bd758
                                      • Opcode Fuzzy Hash: 4a7f54642b73cc5b17075faafe341f3b1cbf5eb53778a71bc7287f698908c050
                                      • Instruction Fuzzy Hash: 38E0C236004109BBDA016BB5EE0CD1ABF29FF49B22B108220F22581170DB329570EB50
                                      APIs
                                        • Part of subcall function 00867620: _wcslen.LIBCMT ref: 00867625
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008CC6EE
                                      • _wcslen.LIBCMT ref: 008CC735
                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008CC79C
                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 008CC7CA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info_wcslen$Default
                                      • String ID: 0
                                      • API String ID: 1227352736-4108050209
                                      • Opcode ID: f0e9c506a44b9dc387b914f5a8b3959c4709860b584015fad7618faa51bc150a
                                      • Instruction ID: ac41be30eb87b659144b1f63d50d5fdabd0169e99b9cc571e9e730e8208b7bed
                                      • Opcode Fuzzy Hash: f0e9c506a44b9dc387b914f5a8b3959c4709860b584015fad7618faa51bc150a
                                      • Instruction Fuzzy Hash: 1C5199716183019BD7259F2CC985F6BB7F8FB99314F040A2DF999E21A1DB70D9048B52
                                      APIs
                                      • ShellExecuteExW.SHELL32(0000003C), ref: 008EAEA3
                                        • Part of subcall function 00867620: _wcslen.LIBCMT ref: 00867625
                                      • GetProcessId.KERNEL32(00000000), ref: 008EAF38
                                      • CloseHandle.KERNEL32(00000000), ref: 008EAF67
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                      • String ID: <$@
                                      • API String ID: 146682121-1426351568
                                      • Opcode ID: 0e76dfec7c4512fd9713712be2211158cd987c17a596ee225fa7c5e21ebfb9d8
                                      • Instruction ID: e0c1759d8ec3f8eccc938d4d12c8af4066edd4c33add4e5a1c9b0d42739318f4
                                      • Opcode Fuzzy Hash: 0e76dfec7c4512fd9713712be2211158cd987c17a596ee225fa7c5e21ebfb9d8
                                      • Instruction Fuzzy Hash: 4A716974A00259DFCB14DF59C484A9EBBF0FF09714F058499E856AB392CB70ED45CB92
                                      APIs
                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 008C7206
                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 008C723C
                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 008C724D
                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008C72CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                      • String ID: DllGetClassObject
                                      • API String ID: 753597075-1075368562
                                      • Opcode ID: f6b71f1e1a47a02d127133c450d91105fb1dd5a960df2681de7f7b3b1fbdeb95
                                      • Instruction ID: c966b424ffbd8b4b381ababe71a4da41995e9521adf212b07857fa932e29dcb4
                                      • Opcode Fuzzy Hash: f6b71f1e1a47a02d127133c450d91105fb1dd5a960df2681de7f7b3b1fbdeb95
                                      • Instruction Fuzzy Hash: C241FA71604209ABDB15CF64C984FAA7BB9FF44314B2480ADBD06DF20AD7B1DA45DFA0
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008F3E35
                                      • IsMenu.USER32(?), ref: 008F3E4A
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008F3E92
                                      • DrawMenuBar.USER32 ref: 008F3EA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$Item$DrawInfoInsert
                                      • String ID: 0
                                      • API String ID: 3076010158-4108050209
                                      • Opcode ID: a3d088d3749334933555a4fadc16aabd2b7c1290445bb75cc3b9e8edd6b4076f
                                      • Instruction ID: 07cc8e105b52ae4d73b31ea1cb61cd643cb7447437fd7e93459f38eb831f73c0
                                      • Opcode Fuzzy Hash: a3d088d3749334933555a4fadc16aabd2b7c1290445bb75cc3b9e8edd6b4076f
                                      • Instruction Fuzzy Hash: D6412275A0020DAFDB10DF64D884EEABBB9FF48354F044129EA05EB660D730AE45DF60
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008C3CCA
                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 008C1E66
                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 008C1E79
                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 008C1EA9
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$_wcslen$ClassName
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 2081771294-1403004172
                                      • Opcode ID: 5d4e46d82448b265ff56bbdb444c8ee7241c10ac6202794f92e0aede1fb7e5fa
                                      • Instruction ID: fadaa9cfc8b9d12e7595e31f51caa62889eecf8a085c28a7d213908a54f9f9d9
                                      • Opcode Fuzzy Hash: 5d4e46d82448b265ff56bbdb444c8ee7241c10ac6202794f92e0aede1fb7e5fa
                                      • Instruction Fuzzy Hash: 2921F871A00108AADB14AB68DD89DFF77B9FF56354B10811DF825E71D2DB348A0AD620
                                      APIs
                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 008F2F8D
                                      • LoadLibraryW.KERNEL32(?), ref: 008F2F94
                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 008F2FA9
                                      • DestroyWindow.USER32(?), ref: 008F2FB1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                      • String ID: SysAnimate32
                                      • API String ID: 3529120543-1011021900
                                      • Opcode ID: ed2d6f1797f2215eadac817f92ea1e681a1ae7a6617ca4f912041074a5da68a0
                                      • Instruction ID: a8cbe69cb870a789a7219a427ad66cb1b50b2501bb32e3de4f8144d1e11566de
                                      • Opcode Fuzzy Hash: ed2d6f1797f2215eadac817f92ea1e681a1ae7a6617ca4f912041074a5da68a0
                                      • Instruction Fuzzy Hash: 6021CD7122420DABEB205FB4DC80EBB77BDFB59368F104628FA50E21A0DB71DC919761
                                      APIs
                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00884D1E,008928E9,?,00884CBE,008928E9,009288B8,0000000C,00884E15,008928E9,00000002), ref: 00884D8D
                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00884DA0
                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00884D1E,008928E9,?,00884CBE,008928E9,009288B8,0000000C,00884E15,008928E9,00000002,00000000), ref: 00884DC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: d171daa526b0c76195a757e312a805f90ff89f9ae12384937ca96c10c79bb699
                                      • Instruction ID: 47a3ddebb5022572c022cdff8e38de1d1cf127474010b4da61aa69bb29d7c970
                                      • Opcode Fuzzy Hash: d171daa526b0c76195a757e312a805f90ff89f9ae12384937ca96c10c79bb699
                                      • Instruction Fuzzy Hash: BEF0AF31A4020DBBDB10AFA0DC09FADBBB5FF44755F0000A4F805E22A0CB305A84DB91
                                      APIs
                                      • LoadLibraryA.KERNEL32 ref: 008BD3AD
                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 008BD3BF
                                      • FreeLibrary.KERNEL32(00000000), ref: 008BD3E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID: GetSystemWow64DirectoryW$X64
                                      • API String ID: 145871493-2590602151
                                      • Opcode ID: eb3f0412488024e1656690750e8ffe35bdfdfa27009c90b78963749e7a4992a3
                                      • Instruction ID: 026bf73e350355049739c6d03edcd1352bbe8399b5a98786b95bbf3446eb47d6
                                      • Opcode Fuzzy Hash: eb3f0412488024e1656690750e8ffe35bdfdfa27009c90b78963749e7a4992a3
                                      • Instruction Fuzzy Hash: 7EF05531401B29BBC37017208C18DFA7760FF00709B548068F506E632AFB30CE88CA82
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00864EDD,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864E9C
                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00864EAE
                                      • FreeLibrary.KERNEL32(00000000,?,?,00864EDD,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864EC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                      • API String ID: 145871493-3689287502
                                      • Opcode ID: f27ddc4a9ba03acbd8bb783f9053df47be453e6f0395fbc18f641e9a86a10ad9
                                      • Instruction ID: de6754191408f985124edb75ac61b5ad19c901a4d399ca42cc698232c47719a7
                                      • Opcode Fuzzy Hash: f27ddc4a9ba03acbd8bb783f9053df47be453e6f0395fbc18f641e9a86a10ad9
                                      • Instruction Fuzzy Hash: E2E08C36A026265B92221B35AD18F7F7668FF81B72B061115FD04E2204DB64CE4580A0
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,008A3CDE,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864E62
                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00864E74
                                      • FreeLibrary.KERNEL32(00000000,?,?,008A3CDE,?,00931418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00864E87
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                      • API String ID: 145871493-1355242751
                                      • Opcode ID: 8e0a09bc5114bb231a805cf9ba6e4b523f700e39e41ba6a191acfb358b2bfe72
                                      • Instruction ID: e47cddc5e70e0f1cbb3ad6cdbe55c93d5ebc53abcf1bf91b2d61c56305e7a651
                                      • Opcode Fuzzy Hash: 8e0a09bc5114bb231a805cf9ba6e4b523f700e39e41ba6a191acfb358b2bfe72
                                      • Instruction Fuzzy Hash: A5D0C2395026365B46221B347C08DAF3A18FF81B313460111B904E6114CF25CF51C1D0
                                      APIs
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008D2C05
                                      • DeleteFileW.KERNEL32(?), ref: 008D2C87
                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 008D2C9D
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008D2CAE
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008D2CC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: File$Delete$Copy
                                      • String ID:
                                      • API String ID: 3226157194-0
                                      • Opcode ID: 24dd4eedb6ebd51572ab921af209968b36f5c1be412cac4fce2e16cc432c6e14
                                      • Instruction ID: 5fd0c3b0fc0808928c2f5c9aeb98800bce708414bdb9e8dcb6ccc9cae39f384c
                                      • Opcode Fuzzy Hash: 24dd4eedb6ebd51572ab921af209968b36f5c1be412cac4fce2e16cc432c6e14
                                      • Instruction Fuzzy Hash: C0B14E7290011DABDF21EBA8CC85EDEB77DFF59350F1041A6F509E7251EA309A448F62
                                      APIs
                                      • GetCurrentProcessId.KERNEL32 ref: 008EA427
                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 008EA435
                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 008EA468
                                      • CloseHandle.KERNEL32(?), ref: 008EA63D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                      • String ID:
                                      • API String ID: 3488606520-0
                                      • Opcode ID: d724f84b2d3ca4fe9657c2e1cf6a592d488371ccdc0b4b6e314c1296e468159e
                                      • Instruction ID: f219ba61da17f7f12b60051196c08821ed125e7a2e8ce0813db24204b7a0be1d
                                      • Opcode Fuzzy Hash: d724f84b2d3ca4fe9657c2e1cf6a592d488371ccdc0b4b6e314c1296e468159e
                                      • Instruction Fuzzy Hash: 45A18C716043409FD724DF28C886B2AB7E5FB84718F14885DF59ADB392DBB0EC418B92
                                      APIs
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00903700), ref: 0089BB91
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0093121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0089BC09
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00931270,000000FF,?,0000003F,00000000,?), ref: 0089BC36
                                      • _free.LIBCMT ref: 0089BB7F
                                        • Part of subcall function 008929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000), ref: 008929DE
                                        • Part of subcall function 008929C8: GetLastError.KERNEL32(00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000,00000000), ref: 008929F0
                                      • _free.LIBCMT ref: 0089BD4B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                      • String ID:
                                      • API String ID: 1286116820-0
                                      • Opcode ID: fc6e34c719d489426b0b2479a46f90ef6363e47af3e614e68a97e12f2b490b5c
                                      • Instruction ID: 7cf0e9c342d6ec2117b2135bd66b672e82bfed5cfe621bfabe1df0c4008b7446
                                      • Opcode Fuzzy Hash: fc6e34c719d489426b0b2479a46f90ef6363e47af3e614e68a97e12f2b490b5c
                                      • Instruction Fuzzy Hash: 9051EB71904209AFCF14FF69AD8196EB7BCFF40324B18426AE464D72A1EB709E419B91
                                      APIs
                                        • Part of subcall function 008CDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008CCF22,?), ref: 008CDDFD
                                        • Part of subcall function 008CDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008CCF22,?), ref: 008CDE16
                                        • Part of subcall function 008CE199: GetFileAttributesW.KERNEL32(?,008CCF95), ref: 008CE19A
                                      • lstrcmpiW.KERNEL32(?,?), ref: 008CE473
                                      • MoveFileW.KERNEL32(?,?), ref: 008CE4AC
                                      • _wcslen.LIBCMT ref: 008CE5EB
                                      • _wcslen.LIBCMT ref: 008CE603
                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 008CE650
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                      • String ID:
                                      • API String ID: 3183298772-0
                                      • Opcode ID: c4fd78eaf3ffd2d9a8a940a75ceeeecdb0ef41135ae37cd307e0286f686e8819
                                      • Instruction ID: f800cebeddb128e5e4c2f3e579f65fb9d87befabee5b387898e071bd478ba77e
                                      • Opcode Fuzzy Hash: c4fd78eaf3ffd2d9a8a940a75ceeeecdb0ef41135ae37cd307e0286f686e8819
                                      • Instruction Fuzzy Hash: 13512DB24087455BC724EBA4D881EDB73ECFF95340F00492EF689D3191EE74E688876A
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008EB6AE,?,?), ref: 008EC9B5
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008EC9F1
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008ECA68
                                        • Part of subcall function 008EC998: _wcslen.LIBCMT ref: 008ECA9E
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008EBAA5
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008EBB00
                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 008EBB63
                                      • RegCloseKey.ADVAPI32(?,?), ref: 008EBBA6
                                      • RegCloseKey.ADVAPI32(00000000), ref: 008EBBB3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                      • String ID:
                                      • API String ID: 826366716-0
                                      • Opcode ID: a4ec2a5e198289f568b2e615dd07d1fdb29d67a5eb4ac2d9456753922b914dad
                                      • Instruction ID: c48ba6acf6ed3b93bc129030c513a8e6679bab1123d9c19af412741beda1a0ef
                                      • Opcode Fuzzy Hash: a4ec2a5e198289f568b2e615dd07d1fdb29d67a5eb4ac2d9456753922b914dad
                                      • Instruction Fuzzy Hash: 6361A031208245AFD714DF25C890E2BBBE9FF85318F15856CF4998B2A2DB31ED45CB92
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 008C8BCD
                                      • VariantClear.OLEAUT32 ref: 008C8C3E
                                      • VariantClear.OLEAUT32 ref: 008C8C9D
                                      • VariantClear.OLEAUT32(?), ref: 008C8D10
                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 008C8D3B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$Clear$ChangeInitType
                                      • String ID:
                                      • API String ID: 4136290138-0
                                      • Opcode ID: 90bf3cd603790dff53e87de0a3c7fa3c689ca447fc64b4df618fb3917e55f18e
                                      • Instruction ID: a267f32577e81c5b748aad72cb1d31c896c639ed8f8e874fac5186f781036bdc
                                      • Opcode Fuzzy Hash: 90bf3cd603790dff53e87de0a3c7fa3c689ca447fc64b4df618fb3917e55f18e
                                      • Instruction Fuzzy Hash: AC5147B5A00219EFCB14CF68D894EAAB7F8FF89314B158559E90ADB350E730E911CF90
                                      APIs
                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 008D8BAE
                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 008D8BDA
                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 008D8C32
                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 008D8C57
                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 008D8C5F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: PrivateProfile$SectionWrite$String
                                      • String ID:
                                      • API String ID: 2832842796-0
                                      • Opcode ID: 71ef4673ab17152aad61097828ab1df04e03747f85f267cc16f225a96c0e2f2e
                                      • Instruction ID: 914f39c37c24273b3f56e1c93736b80a79902c9521a884bbf44e0572a9ad3bc4
                                      • Opcode Fuzzy Hash: 71ef4673ab17152aad61097828ab1df04e03747f85f267cc16f225a96c0e2f2e
                                      • Instruction Fuzzy Hash: BC514935A00218DFCB04DF69C885E69BBF5FF48314F098099E84AAB362DB31ED51CB91
                                      APIs
                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 008E8F40
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 008E8FD0
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 008E8FEC
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 008E9032
                                      • FreeLibrary.KERNEL32(00000000), ref: 008E9052
                                        • Part of subcall function 0087F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,008D1043,?,7529E610), ref: 0087F6E6
                                        • Part of subcall function 0087F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,008BFA64,00000000,00000000,?,?,008D1043,?,7529E610,?,008BFA64), ref: 0087F70D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                      • String ID:
                                      • API String ID: 666041331-0
                                      • Opcode ID: f562ee15d8315371745c78c8ad574f2e20032f9076863321b28eeae6962a3f63
                                      • Instruction ID: ae3f27dcd42320e22a868e9662c5eb9af0f60c6a92c476a58d38103807c71d4e
                                      • Opcode Fuzzy Hash: f562ee15d8315371745c78c8ad574f2e20032f9076863321b28eeae6962a3f63
                                      • Instruction Fuzzy Hash: 36511434600645DFCB11DF69C494CADBBB1FF4A324B0580A9E84AEB362DB31ED85CB91
                                      APIs
                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 008F6C33
                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 008F6C4A
                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 008F6C73
                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,008DAB79,00000000,00000000), ref: 008F6C98
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 008F6CC7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Long$MessageSendShow
                                      • String ID:
                                      • API String ID: 3688381893-0
                                      • Opcode ID: 398a00877cb79d1529c8ccca2868e236f08edeb039c9c854a6544ddf15ed78db
                                      • Instruction ID: 4fa3e2ba29f5258e16c8452453d293ce8bd18b460ae1e8e1b3dc74298560220d
                                      • Opcode Fuzzy Hash: 398a00877cb79d1529c8ccca2868e236f08edeb039c9c854a6544ddf15ed78db
                                      • Instruction Fuzzy Hash: D541A035A0410CAFD7248F38CD58FB97BA5FB09360F150328EA95E72A1E371AE61DA50
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: b5eda5973f7f1b47ea823f8135bfb823830fd974bb480d5476178566fac59eeb
                                      • Instruction ID: 4dd19c5dca4e7acddf8e963948c0c97921986f813498da672ff727c119828c55
                                      • Opcode Fuzzy Hash: b5eda5973f7f1b47ea823f8135bfb823830fd974bb480d5476178566fac59eeb
                                      • Instruction Fuzzy Hash: FB41D272A00204AFCF24EF78C881A5DB7A5FF89314F1945A8E615EB356D631ED01CB81
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 00879141
                                      • ScreenToClient.USER32(00000000,?), ref: 0087915E
                                      • GetAsyncKeyState.USER32(00000001), ref: 00879183
                                      • GetAsyncKeyState.USER32(00000002), ref: 0087919D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: AsyncState$ClientCursorScreen
                                      • String ID:
                                      • API String ID: 4210589936-0
                                      • Opcode ID: f33fc254b8ea9b3c14b44f8a3d9c01e27615f676c236f0fbcb64ccb79199b369
                                      • Instruction ID: ec7cce51276aa2c16a2222f3b8e494ec5adf54bf880869433fb5f87b032589b8
                                      • Opcode Fuzzy Hash: f33fc254b8ea9b3c14b44f8a3d9c01e27615f676c236f0fbcb64ccb79199b369
                                      • Instruction Fuzzy Hash: 85417F71A0860AFBDF059F68C848BFEB774FB45324F208219E469E7294C734A954CBA1
                                      APIs
                                      • GetInputState.USER32 ref: 008D38CB
                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 008D3922
                                      • TranslateMessage.USER32(?), ref: 008D394B
                                      • DispatchMessageW.USER32(?), ref: 008D3955
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008D3966
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                      • String ID:
                                      • API String ID: 2256411358-0
                                      • Opcode ID: 7034dc760d8a639d6d0d05f52500680770088b7ab8ce0f9a75b47e7bcae34411
                                      • Instruction ID: b94e4e1965d9943a0088ab4b1fb04cb9548c09c43350558574fcf92e0252c9bf
                                      • Opcode Fuzzy Hash: 7034dc760d8a639d6d0d05f52500680770088b7ab8ce0f9a75b47e7bcae34411
                                      • Instruction Fuzzy Hash: B831A670518345AEEB35CB359858BB63FA8FB06304F04066BE462D22A0E3F49685DF13
                                      APIs
                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,008DC21E,00000000), ref: 008DCF38
                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 008DCF6F
                                      • GetLastError.KERNEL32(?,00000000,?,?,?,008DC21E,00000000), ref: 008DCFB4
                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,008DC21E,00000000), ref: 008DCFC8
                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,008DC21E,00000000), ref: 008DCFF2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                      • String ID:
                                      • API String ID: 3191363074-0
                                      • Opcode ID: 4882b7b9237baf8b5f5aef1296c1a20c3aeacd32b74ea1de14a08f830979cca4
                                      • Instruction ID: 020da83610e5bc05b14f84decbe108a64e72c91db6b7135523586116b56bb41e
                                      • Opcode Fuzzy Hash: 4882b7b9237baf8b5f5aef1296c1a20c3aeacd32b74ea1de14a08f830979cca4
                                      • Instruction Fuzzy Hash: 0F314C7150420AAFDB20DFA9C984EABBBF9FB14354B10452EF516D2241DB70EE40DB60
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 008C1915
                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 008C19C1
                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 008C19C9
                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 008C19DA
                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 008C19E2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessagePostSleep$RectWindow
                                      • String ID:
                                      • API String ID: 3382505437-0
                                      • Opcode ID: 82b3547c24b6bc40c9e8f3435eb95a6ee1d3f8e11ccbec5f174c859715c4d86c
                                      • Instruction ID: 365acf907ee2464fa8297c4b278e033a816faabdd3647bda8919015e84acf1f5
                                      • Opcode Fuzzy Hash: 82b3547c24b6bc40c9e8f3435eb95a6ee1d3f8e11ccbec5f174c859715c4d86c
                                      • Instruction Fuzzy Hash: C5318C71A00219AFCB10CFA8C999FAE7BB5FB05315F504229F921E72D1C770DA58CB90
                                      APIs
                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 008F5745
                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 008F579D
                                      • _wcslen.LIBCMT ref: 008F57AF
                                      • _wcslen.LIBCMT ref: 008F57BA
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 008F5816
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$_wcslen
                                      • String ID:
                                      • API String ID: 763830540-0
                                      • Opcode ID: 8316ab5dbbd437cb6bb36dd13f24364d6994b758e957a46e1d1f9d81ecf01c17
                                      • Instruction ID: bdcb3ce9fa1237ee63195c3a6c5b56f86c14a62137cb26cb57429a8911b58521
                                      • Opcode Fuzzy Hash: 8316ab5dbbd437cb6bb36dd13f24364d6994b758e957a46e1d1f9d81ecf01c17
                                      • Instruction Fuzzy Hash: DA21807590461C9ADB209FB4DC85AFEBBB8FF14724F108216EB29EA190D7709A85CF50
                                      APIs
                                      • IsWindow.USER32(00000000), ref: 008E0951
                                      • GetForegroundWindow.USER32 ref: 008E0968
                                      • GetDC.USER32(00000000), ref: 008E09A4
                                      • GetPixel.GDI32(00000000,?,00000003), ref: 008E09B0
                                      • ReleaseDC.USER32(00000000,00000003), ref: 008E09E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$ForegroundPixelRelease
                                      • String ID:
                                      • API String ID: 4156661090-0
                                      • Opcode ID: 7e6ff0fc5541905d99d1be9195969b7f235b129cf972079067947d554ba81e96
                                      • Instruction ID: 31afa353797a1a3c8ae8282ad015c3b91435c0a69e0bb4806d616c668afff67e
                                      • Opcode Fuzzy Hash: 7e6ff0fc5541905d99d1be9195969b7f235b129cf972079067947d554ba81e96
                                      • Instruction Fuzzy Hash: C2218135A00208AFD704EF69D988EAEBBE5FF45700F04846DE85AD7362DB74AD44CB50
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32 ref: 0089CDC6
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0089CDE9
                                        • Part of subcall function 00893820: RtlAllocateHeap.NTDLL(00000000,?,00931444,?,0087FDF5,?,?,0086A976,00000010,00931440,008613FC,?,008613C6,?,00861129), ref: 00893852
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0089CE0F
                                      • _free.LIBCMT ref: 0089CE22
                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0089CE31
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                      • String ID:
                                      • API String ID: 336800556-0
                                      • Opcode ID: fd0ad2333e988a728fc4ecae539c5f8edbfb9696aa1b6d06bb72c7b0131aa8ef
                                      • Instruction ID: 9d686f97ad613778804ede3b6fac6a16935661aceadb882bf2f284e3a96709a8
                                      • Opcode Fuzzy Hash: fd0ad2333e988a728fc4ecae539c5f8edbfb9696aa1b6d06bb72c7b0131aa8ef
                                      • Instruction Fuzzy Hash: DF0188726012197F2B21767AAC48D7F796DFEC6BA13190129F906D7201EB628E01C1B1
                                      APIs
                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00879693
                                      • SelectObject.GDI32(?,00000000), ref: 008796A2
                                      • BeginPath.GDI32(?), ref: 008796B9
                                      • SelectObject.GDI32(?,00000000), ref: 008796E2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$BeginCreatePath
                                      • String ID:
                                      • API String ID: 3225163088-0
                                      • Opcode ID: 66022dcaac92291316d1cd448992f10e38737b391886d2bf1ba712cff63c693e
                                      • Instruction ID: 853ddfb9c4517cf61b5231027cf245a4aceaffd3c39eca7272dd4d9c0b39927e
                                      • Opcode Fuzzy Hash: 66022dcaac92291316d1cd448992f10e38737b391886d2bf1ba712cff63c693e
                                      • Instruction Fuzzy Hash: 5B218E30816309EBDB119F28ED08BA93BA8FB61765F108316F458E61B4D370D991EF94
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _memcmp
                                      • String ID:
                                      • API String ID: 2931989736-0
                                      • Opcode ID: 71d0cfd5367bc6c1b1881f8d5d764dd7841ec36e44a8f8e8b155d64e1709d227
                                      • Instruction ID: 99a796ccc1353faf16efa9f7ce4888b0db107a1c62c9f3fb859f5fcc0cc6351e
                                      • Opcode Fuzzy Hash: 71d0cfd5367bc6c1b1881f8d5d764dd7841ec36e44a8f8e8b155d64e1709d227
                                      • Instruction Fuzzy Hash: AE01966164161DBADA1866249D46FBA636CFF213A8B004028FE14DA741FB74FD9183A5
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,0088F2DE,00893863,00931444,?,0087FDF5,?,?,0086A976,00000010,00931440,008613FC,?,008613C6), ref: 00892DFD
                                      • _free.LIBCMT ref: 00892E32
                                      • _free.LIBCMT ref: 00892E59
                                      • SetLastError.KERNEL32(00000000,00861129), ref: 00892E66
                                      • SetLastError.KERNEL32(00000000,00861129), ref: 00892E6F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_free
                                      • String ID:
                                      • API String ID: 3170660625-0
                                      • Opcode ID: 3f38df5c54980fe10db404ea5e53c6e4ec9770b96f27377dce35c154a2db8611
                                      • Instruction ID: 456e033ca861106f420986dcc889cbf3d64b33fe67bf85b66671574edcc68003
                                      • Opcode Fuzzy Hash: 3f38df5c54980fe10db404ea5e53c6e4ec9770b96f27377dce35c154a2db8611
                                      • Instruction Fuzzy Hash: CF01D1326096047B8E1277786C86D3F2699FBC13A9B2D0028F425E2293EA6089014161
                                      APIs
                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?,?,008C035E), ref: 008C002B
                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?), ref: 008C0046
                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?), ref: 008C0054
                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?), ref: 008C0064
                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008BFF41,80070057,?,?), ref: 008C0070
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                      • String ID:
                                      • API String ID: 3897988419-0
                                      • Opcode ID: 652e6612c35b645aaa795641ac2711346cf9422b6e53ff8097b0be4babb4d922
                                      • Instruction ID: df259585d4f4fe5eebfa61a7309914ebb023c40069f9c3bc8d8488d37b77bf6e
                                      • Opcode Fuzzy Hash: 652e6612c35b645aaa795641ac2711346cf9422b6e53ff8097b0be4babb4d922
                                      • Instruction Fuzzy Hash: 00017872610A08EBDB108F68DD04FAA7ABDFB487D2F154128F905D2211E771DE408BA0
                                      APIs
                                      • QueryPerformanceCounter.KERNEL32(?), ref: 008CE997
                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 008CE9A5
                                      • Sleep.KERNEL32(00000000), ref: 008CE9AD
                                      • QueryPerformanceCounter.KERNEL32(?), ref: 008CE9B7
                                      • Sleep.KERNEL32 ref: 008CE9F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                      • String ID:
                                      • API String ID: 2833360925-0
                                      • Opcode ID: 94efddf7d8e3436fe16822dfe69860a5048e003b75d388604f4396b7750fdd45
                                      • Instruction ID: a9f0812a88e99aa7b3556194a299fa60f188d471063896880a61e96070ae2477
                                      • Opcode Fuzzy Hash: 94efddf7d8e3436fe16822dfe69860a5048e003b75d388604f4396b7750fdd45
                                      • Instruction Fuzzy Hash: 28010531D0162DDBCF10ABE5D959AEDBB78FF09701F00455AE502F2241CB309699CBA2
                                      APIs
                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008C1114
                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C1120
                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C112F
                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,008C0B9B,?,?,?), ref: 008C1136
                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008C114D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 842720411-0
                                      • Opcode ID: 07ff3353e178d4af570ab274d1ae2f32175589596273f1cc038edf404ceff747
                                      • Instruction ID: 46102ab0b63429b65bb640e4302a6351b1e20594dcd7fb45130e755ad9564df3
                                      • Opcode Fuzzy Hash: 07ff3353e178d4af570ab274d1ae2f32175589596273f1cc038edf404ceff747
                                      • Instruction Fuzzy Hash: DB014675200209AFDB115FA8DD4DE6A3B6EFF8A2A0B240419FA41C2360DB31DD50CA60
                                      APIs
                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008C0FCA
                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008C0FD6
                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008C0FE5
                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008C0FEC
                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008C1002
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 44706859-0
                                      • Opcode ID: 984a73ec0476ae9a977c99e3d419b378374ca040bacab006ade23331533751eb
                                      • Instruction ID: 80d7ee77858a57774420c99dc70810751b1a81a500c6fa990378a93d8c7c8fac
                                      • Opcode Fuzzy Hash: 984a73ec0476ae9a977c99e3d419b378374ca040bacab006ade23331533751eb
                                      • Instruction Fuzzy Hash: 1EF04935200709ABDB214FB4AD8EF663BADFF8AB62F114419FA45C6251DA70DD90CA60
                                      APIs
                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008C102A
                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008C1036
                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008C1045
                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008C104C
                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008C1062
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 44706859-0
                                      • Opcode ID: 9b0a525f8187e1a1d15ae3fca9596c23cd1b8a3dfab12c48041710b2a64aa6e4
                                      • Instruction ID: 25a26f11a0a23bfee94ad2c0c0634070ae28a2a228318bdd9c515c88a0123019
                                      • Opcode Fuzzy Hash: 9b0a525f8187e1a1d15ae3fca9596c23cd1b8a3dfab12c48041710b2a64aa6e4
                                      • Instruction Fuzzy Hash: 1DF04935240709ABDB219FB4ED8DF663BADFF8A761F110418FA45C6251DA70DA90CA60
                                      APIs
                                      • CloseHandle.KERNEL32(?,?,?,?,008D017D,?,008D32FC,?,00000001,008A2592,?), ref: 008D0324
                                      • CloseHandle.KERNEL32(?,?,?,?,008D017D,?,008D32FC,?,00000001,008A2592,?), ref: 008D0331
                                      • CloseHandle.KERNEL32(?,?,?,?,008D017D,?,008D32FC,?,00000001,008A2592,?), ref: 008D033E
                                      • CloseHandle.KERNEL32(?,?,?,?,008D017D,?,008D32FC,?,00000001,008A2592,?), ref: 008D034B
                                      • CloseHandle.KERNEL32(?,?,?,?,008D017D,?,008D32FC,?,00000001,008A2592,?), ref: 008D0358
                                      • CloseHandle.KERNEL32(?,?,?,?,008D017D,?,008D32FC,?,00000001,008A2592,?), ref: 008D0365
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: f34c263b1dc0aff5f92495b6e7fc0c8eebee9e88cc93f4d689cd62c3d5ebbc65
                                      • Instruction ID: 029343a950d4202a14e9eb2db09af54f70dc09dbbab4495b2b7556769bf39437
                                      • Opcode Fuzzy Hash: f34c263b1dc0aff5f92495b6e7fc0c8eebee9e88cc93f4d689cd62c3d5ebbc65
                                      • Instruction Fuzzy Hash: 6F01AA72800B559FCB34AF66D880916FBF9FF603157158A3FD19692A31C3B1A998DF80
                                      APIs
                                      • _free.LIBCMT ref: 0089D752
                                        • Part of subcall function 008929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000), ref: 008929DE
                                        • Part of subcall function 008929C8: GetLastError.KERNEL32(00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000,00000000), ref: 008929F0
                                      • _free.LIBCMT ref: 0089D764
                                      • _free.LIBCMT ref: 0089D776
                                      • _free.LIBCMT ref: 0089D788
                                      • _free.LIBCMT ref: 0089D79A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: f983911c0fe370a885a83681db33d259fd25379833d1589d6499b97039ee31fe
                                      • Instruction ID: ab390cd09c9c61de62af4af462c809f3c6c5baf169b5415287185f701de273f6
                                      • Opcode Fuzzy Hash: f983911c0fe370a885a83681db33d259fd25379833d1589d6499b97039ee31fe
                                      • Instruction Fuzzy Hash: AAF0F972559304BB8A25FBA8F9C6D1A7BDDFB44710BAC4805F04CE7502CB20FC808AA9
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 008C5C58
                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 008C5C6F
                                      • MessageBeep.USER32(00000000), ref: 008C5C87
                                      • KillTimer.USER32(?,0000040A), ref: 008C5CA3
                                      • EndDialog.USER32(?,00000001), ref: 008C5CBD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                      • String ID:
                                      • API String ID: 3741023627-0
                                      • Opcode ID: 5be12051be7dde657655c646e1e9bd95e52db547c22cb15fd0cd202b4d606c28
                                      • Instruction ID: fb6274b2ba8e15a49812d6cd5bab21d57c2bc586a1935ca7055edfc758775ad3
                                      • Opcode Fuzzy Hash: 5be12051be7dde657655c646e1e9bd95e52db547c22cb15fd0cd202b4d606c28
                                      • Instruction Fuzzy Hash: 5B018630500B08ABEF215B60DE4EFA677B8FF10B05F00055DA593E14E1DBF4BA88CA90
                                      APIs
                                      • _free.LIBCMT ref: 008922BE
                                        • Part of subcall function 008929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000), ref: 008929DE
                                        • Part of subcall function 008929C8: GetLastError.KERNEL32(00000000,?,0089D7D1,00000000,00000000,00000000,00000000,?,0089D7F8,00000000,00000007,00000000,?,0089DBF5,00000000,00000000), ref: 008929F0
                                      • _free.LIBCMT ref: 008922D0
                                      • _free.LIBCMT ref: 008922E3
                                      • _free.LIBCMT ref: 008922F4
                                      • _free.LIBCMT ref: 00892305
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 1c897608ff63514cb1a32757df22a15e447a2532b9b0f01357d01506a002a0fa
                                      • Instruction ID: 74f547cae1b7ba1a6a515eddf0fd2ea0c29d25e095b6573f906d47d7dd0a2d75
                                      • Opcode Fuzzy Hash: 1c897608ff63514cb1a32757df22a15e447a2532b9b0f01357d01506a002a0fa
                                      • Instruction Fuzzy Hash: 02F05EB0828620ABCE22FF58BC01D0D3FA4F718761708050AF424D22B1C7310912FFE5
                                      APIs
                                      • EndPath.GDI32(?), ref: 008795D4
                                      • StrokeAndFillPath.GDI32(?,?,008B71F7,00000000,?,?,?), ref: 008795F0
                                      • SelectObject.GDI32(?,00000000), ref: 00879603
                                      • DeleteObject.GDI32 ref: 00879616
                                      • StrokePath.GDI32(?), ref: 00879631
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                      • String ID:
                                      • API String ID: 2625713937-0
                                      • Opcode ID: 71eab2675e5f6d40b670bb6bc995a1165d8816d5c37b49a717d9ae07db6e16a5
                                      • Instruction ID: 943e8810185259f4543f921542c63fe06dfa9ce08a0b51a78bedbe89881656d2
                                      • Opcode Fuzzy Hash: 71eab2675e5f6d40b670bb6bc995a1165d8816d5c37b49a717d9ae07db6e16a5
                                      • Instruction Fuzzy Hash: 81F0C935019608EBDB169F65EE18B643B65FB51376F048314F4A9950F4CB308AA5EF20
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: __freea$_free
                                      • String ID: a/p$am/pm
                                      • API String ID: 3432400110-3206640213
                                      • Opcode ID: 8cb07f0cc36fe88582e0fb164913dd9b2b9a830f1ebcd4b35f96acaf56ec7a26
                                      • Instruction ID: 3c0879da5ef989dee654c8dc77f1fefd468203f8f2c938ccc6048f4815b6e40a
                                      • Opcode Fuzzy Hash: 8cb07f0cc36fe88582e0fb164913dd9b2b9a830f1ebcd4b35f96acaf56ec7a26
                                      • Instruction Fuzzy Hash: 07D1CE31A1820BDADF29BF68C849ABAB7B1FF05704F2C0159E905DBB50D3799D80DB91
                                      APIs
                                        • Part of subcall function 00880242: EnterCriticalSection.KERNEL32(0093070C,00931884,?,?,0087198B,00932518,?,?,?,008612F9,00000000), ref: 0088024D
                                        • Part of subcall function 00880242: LeaveCriticalSection.KERNEL32(0093070C,?,0087198B,00932518,?,?,?,008612F9,00000000), ref: 0088028A
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008800A3: __onexit.LIBCMT ref: 008800A9
                                      • __Init_thread_footer.LIBCMT ref: 008E7BFB
                                        • Part of subcall function 008801F8: EnterCriticalSection.KERNEL32(0093070C,?,?,00878747,00932514), ref: 00880202
                                        • Part of subcall function 008801F8: LeaveCriticalSection.KERNEL32(0093070C,?,00878747,00932514), ref: 00880235
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                      • String ID: 5$G$Variable must be of type 'Object'.
                                      • API String ID: 535116098-3733170431
                                      • Opcode ID: 259216f034fbd2954c80170eb84ef0ac29099f682ce92191ebe16a15d562568d
                                      • Instruction ID: 44606de5ddf68c6079ae6725e3ae4227ff437016bb7ddabd074072454982663a
                                      • Opcode Fuzzy Hash: 259216f034fbd2954c80170eb84ef0ac29099f682ce92191ebe16a15d562568d
                                      • Instruction Fuzzy Hash: E691AD70A04249EFCB14EF99D9809BDB7B5FF4A304F108059F806EB292DB71AE45CB52
                                      APIs
                                        • Part of subcall function 008CB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008C21D0,?,?,00000034,00000800,?,00000034), ref: 008CB42D
                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 008C2760
                                        • Part of subcall function 008CB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008C21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 008CB3F8
                                        • Part of subcall function 008CB32A: GetWindowThreadProcessId.USER32(?,?), ref: 008CB355
                                        • Part of subcall function 008CB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,008C2194,00000034,?,?,00001004,00000000,00000000), ref: 008CB365
                                        • Part of subcall function 008CB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,008C2194,00000034,?,?,00001004,00000000,00000000), ref: 008CB37B
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008C27CD
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008C281A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                      • String ID: @
                                      • API String ID: 4150878124-2766056989
                                      • Opcode ID: a3304d6fe367fdb52ea7caf5d049cb4a04a4453c4539ac68b9598b9d45bdf51a
                                      • Instruction ID: b2f63026cebeb1f3c7b6e9f859b6416934f1f401b19e8d4367b0a5e4b4d14b1e
                                      • Opcode Fuzzy Hash: a3304d6fe367fdb52ea7caf5d049cb4a04a4453c4539ac68b9598b9d45bdf51a
                                      • Instruction Fuzzy Hash: 2F41FC76900218AEDB10DBA8D986FEEBBB8FB09700F104059FA55B7181DB70AE45CB61
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\new order.exe,00000104), ref: 00891769
                                      • _free.LIBCMT ref: 00891834
                                      • _free.LIBCMT ref: 0089183E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free$FileModuleName
                                      • String ID: C:\Users\user\Desktop\new order.exe
                                      • API String ID: 2506810119-205214279
                                      • Opcode ID: 27cad1d733a41f974c66aacf4345597882166963af754032dba189bfcd277da3
                                      • Instruction ID: c435c9d08509d01872b177551f4876b4e52b52319b027178850f55ff4598a39b
                                      • Opcode Fuzzy Hash: 27cad1d733a41f974c66aacf4345597882166963af754032dba189bfcd277da3
                                      • Instruction Fuzzy Hash: DE316275A0821ABBDF21EB999C89D9EBBFCFB85310B184166F804E7211D7704E40DB91
                                      APIs
                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 008CC306
                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 008CC34C
                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00931990,017B55E0), ref: 008CC395
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$Delete$InfoItem
                                      • String ID: 0
                                      • API String ID: 135850232-4108050209
                                      • Opcode ID: 8354a7f9d0575b484a59ffde4ef1e16c25b620b03b87ffb0dc3b99ac34197442
                                      • Instruction ID: edf0d70e083a1802f4267ab10977327d83fe1e5e48c2d365c9c304643f5ee97e
                                      • Opcode Fuzzy Hash: 8354a7f9d0575b484a59ffde4ef1e16c25b620b03b87ffb0dc3b99ac34197442
                                      • Instruction Fuzzy Hash: 29416A712043419FD720DF39E885F6ABBA8FB85324F148A1EE9A9D7391D730E904CB52
                                      APIs
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,008FCC08,00000000,?,?,?,?), ref: 008F44AA
                                      • GetWindowLongW.USER32 ref: 008F44C7
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008F44D7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Long
                                      • String ID: SysTreeView32
                                      • API String ID: 847901565-1698111956
                                      • Opcode ID: bec95471cfd6c7b0977d0e4676718d2602f4f8f37d081789cb48d29dd2fcd8f8
                                      • Instruction ID: 52dbf999f383544b6ad6cb1419a5ea10d251ce49cb7788f4bca5373a0888d1af
                                      • Opcode Fuzzy Hash: bec95471cfd6c7b0977d0e4676718d2602f4f8f37d081789cb48d29dd2fcd8f8
                                      • Instruction Fuzzy Hash: 85318931214609AFDB209E38DC45BEB7BA9FB18324F205726FA79E21E0D774EC509B50
                                      APIs
                                        • Part of subcall function 008E335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,008E3077,?,?), ref: 008E3378
                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 008E307A
                                      • _wcslen.LIBCMT ref: 008E309B
                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 008E3106
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                      • String ID: 255.255.255.255
                                      • API String ID: 946324512-2422070025
                                      • Opcode ID: 0d607e65c19738133c2a91e5d5480d30d5819fcc62eddb290feec24bdf4a80e0
                                      • Instruction ID: 1967855564f88fb902114676408f52b2cece8ddac3e178598c99d3b723370e6b
                                      • Opcode Fuzzy Hash: 0d607e65c19738133c2a91e5d5480d30d5819fcc62eddb290feec24bdf4a80e0
                                      • Instruction Fuzzy Hash: D031D3352042859FCB20CF6AC589EAA77E0FF56318F258069E815CB392DB32EF45C761
                                      APIs
                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 008F3F40
                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 008F3F54
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 008F3F78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window
                                      • String ID: SysMonthCal32
                                      • API String ID: 2326795674-1439706946
                                      • Opcode ID: a7e021b500ffd5462b4202e97505cf7a17b0eebf06df97f43beef2124429682d
                                      • Instruction ID: e9a524caf5e185d91c02575a6ee46927ed060f0a41174134a3443b01ec3aa446
                                      • Opcode Fuzzy Hash: a7e021b500ffd5462b4202e97505cf7a17b0eebf06df97f43beef2124429682d
                                      • Instruction Fuzzy Hash: 6F219F32610219BBDF118F64DC46FEA3B75FF48724F110214FA15BB1D0DAB5A990CBA0
                                      APIs
                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 008F4705
                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 008F4713
                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 008F471A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$DestroyWindow
                                      • String ID: msctls_updown32
                                      • API String ID: 4014797782-2298589950
                                      • Opcode ID: b59385528591b9012ee871d29e816e033e75a76c3a411d642b84632f0954b615
                                      • Instruction ID: 5eaa4bcb9ae261869999792a7454dcf50163342d662333290659433b3e8283b5
                                      • Opcode Fuzzy Hash: b59385528591b9012ee871d29e816e033e75a76c3a411d642b84632f0954b615
                                      • Instruction Fuzzy Hash: CA2151B560420CAFEB10DF68DC81DB737ADFB9A358B04005AF601DB261DB70EC11DA61
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                      • API String ID: 176396367-2734436370
                                      • Opcode ID: fe9c2bb1635c2c60fa6be12093bcd8d892fa26b4a5367da0e55614352a26a9d4
                                      • Instruction ID: bfe052494a918c2fb56c6058c14d3fd4915004acb39484af4179461095dbffbc
                                      • Opcode Fuzzy Hash: fe9c2bb1635c2c60fa6be12093bcd8d892fa26b4a5367da0e55614352a26a9d4
                                      • Instruction Fuzzy Hash: 0B212632204115A6D331AB289C0AFB773A8FF65314F50406EFA8AD7182EB75ED41C3D6
                                      APIs
                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 008F3840
                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 008F3850
                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 008F3876
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend$MoveWindow
                                      • String ID: Listbox
                                      • API String ID: 3315199576-2633736733
                                      • Opcode ID: f89ebd8e04bb582a164cb87e71c78a3499c141831d10d63c64b5da18da92b1b9
                                      • Instruction ID: e5767ade6248244e11a13c65804bdcdd05af2967d77443df19a9a94caa3eb094
                                      • Opcode Fuzzy Hash: f89ebd8e04bb582a164cb87e71c78a3499c141831d10d63c64b5da18da92b1b9
                                      • Instruction Fuzzy Hash: B121B07261011CBBEB119F64CC41EBB376AFF89794F118124FA00DB190C675DD51C7A0
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 008D4A08
                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 008D4A5C
                                      • SetErrorMode.KERNEL32(00000000,?,?,008FCC08), ref: 008D4AD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorMode$InformationVolume
                                      • String ID: %lu
                                      • API String ID: 2507767853-685833217
                                      • Opcode ID: 0ca44cd23455fe48d91c8ac6eb13621b20aa02cc5ee4d390a65f26f53a577323
                                      • Instruction ID: ab36393fade390f9d13a091674b83863c761c4106633b500ec28635a5e75a964
                                      • Opcode Fuzzy Hash: 0ca44cd23455fe48d91c8ac6eb13621b20aa02cc5ee4d390a65f26f53a577323
                                      • Instruction Fuzzy Hash: F2315E75A00118AFDB10DF68C985EAA7BF8FF08318F1580A9E909DB352D771EE45CB61
                                      APIs
                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 008F424F
                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 008F4264
                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 008F4271
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: msctls_trackbar32
                                      • API String ID: 3850602802-1010561917
                                      • Opcode ID: c8a5e9a5a4111c1948bfec2ca0fe47e5cebe90f694558dcfc4c06b9081137761
                                      • Instruction ID: fee3b663a0b15729dc490801508c5d34d8159205cbe8c19d6b066d023a164b93
                                      • Opcode Fuzzy Hash: c8a5e9a5a4111c1948bfec2ca0fe47e5cebe90f694558dcfc4c06b9081137761
                                      • Instruction Fuzzy Hash: 7111CE31240248BEEF205E78CC06FBB3BA8FB95B64F110529FA55E20A0D271D8619B20
                                      APIs
                                        • Part of subcall function 00866B57: _wcslen.LIBCMT ref: 00866B6A
                                        • Part of subcall function 008C2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 008C2DC5
                                        • Part of subcall function 008C2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 008C2DD6
                                        • Part of subcall function 008C2DA7: GetCurrentThreadId.KERNEL32 ref: 008C2DDD
                                        • Part of subcall function 008C2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 008C2DE4
                                      • GetFocus.USER32 ref: 008C2F78
                                        • Part of subcall function 008C2DEE: GetParent.USER32(00000000), ref: 008C2DF9
                                      • GetClassNameW.USER32(?,?,00000100), ref: 008C2FC3
                                      • EnumChildWindows.USER32(?,008C303B), ref: 008C2FEB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                      • String ID: %s%d
                                      • API String ID: 1272988791-1110647743
                                      • Opcode ID: 1a5200c16ace30386a3fb391d8a21a84309fb59d12f9b8d9954cc854859b0856
                                      • Instruction ID: 2e8f7c80938cb587a5efef626f7c47e473206e49081503368acbf2b901bf551e
                                      • Opcode Fuzzy Hash: 1a5200c16ace30386a3fb391d8a21a84309fb59d12f9b8d9954cc854859b0856
                                      • Instruction Fuzzy Hash: 7911C371200209ABCF016F748C85FED377AFF94314F048079BA09DB292EE749A4ACB61
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008F58C1
                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008F58EE
                                      • DrawMenuBar.USER32(?), ref: 008F58FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Menu$InfoItem$Draw
                                      • String ID: 0
                                      • API String ID: 3227129158-4108050209
                                      • Opcode ID: 222e0aa7f38e7fbc59529371762d3e97c2ed212de6cdd8a5c68542e409ceccc9
                                      • Instruction ID: 649f955a2e8aa18e91849db31ead5cc0b48f75805ad03d4c424b069152484b4f
                                      • Opcode Fuzzy Hash: 222e0aa7f38e7fbc59529371762d3e97c2ed212de6cdd8a5c68542e409ceccc9
                                      • Instruction Fuzzy Hash: FF015E7160021CEEDB119F25EC44BBEBBB4FF45360F108099EA49DA151DB708A94DF21
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 380eb504900182feb34e2ad45bd754e3c46bf9aae9605b2f0eecce9411ab0ce5
                                      • Instruction ID: 29b359deee8d28464da64a845e544be5d60a9469d97106f0393e7c6c95a7d444
                                      • Opcode Fuzzy Hash: 380eb504900182feb34e2ad45bd754e3c46bf9aae9605b2f0eecce9411ab0ce5
                                      • Instruction Fuzzy Hash: F1C13675A0021AEFDB15CFA8C898FAAB7B5FF48344F248598E505EB251D731EE41CB90
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: __alldvrm$_strrchr
                                      • String ID:
                                      • API String ID: 1036877536-0
                                      • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                      • Instruction ID: 27fd2c468b91960b0e6f6effe845faf776fd947bb4db4a5df93210cc3ca920d1
                                      • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                      • Instruction Fuzzy Hash: FFA14676E007869FEF21EE18C891BAEBBE4FF61350F1C416DE585DB281C6348982C751
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInitInitializeUninitialize
                                      • String ID:
                                      • API String ID: 1998397398-0
                                      • Opcode ID: 3c8476b0a3b0c43172e428212c0d3c44baf7525a8a682a0592ad02b4c0b223a9
                                      • Instruction ID: bddeb5069cad071c7892cd54ca2b00d30f85f796b9538978b84c65521969390f
                                      • Opcode Fuzzy Hash: 3c8476b0a3b0c43172e428212c0d3c44baf7525a8a682a0592ad02b4c0b223a9
                                      • Instruction Fuzzy Hash: 85A14A756143009FC710DF29C989A2AB7E5FF89714F058859F98ADB362DB30EE01CB92
                                      APIs
                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,008FFC08,?), ref: 008C05F0
                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,008FFC08,?), ref: 008C0608
                                      • CLSIDFromProgID.OLE32(?,?,00000000,008FCC40,000000FF,?,00000000,00000800,00000000,?,008FFC08,?), ref: 008C062D
                                      • _memcmp.LIBVCRUNTIME ref: 008C064E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FromProg$FreeTask_memcmp
                                      • String ID:
                                      • API String ID: 314563124-0
                                      • Opcode ID: 03d105234fea3b9607f951595662ceac3c47d9b3e1677d44e3880fce0412cd82
                                      • Instruction ID: ed724725ce1a51ba866e3e42be471fe33c3c6c0ea1544d2eafd99d77de011b15
                                      • Opcode Fuzzy Hash: 03d105234fea3b9607f951595662ceac3c47d9b3e1677d44e3880fce0412cd82
                                      • Instruction Fuzzy Hash: 3181E771A00209EFCB04DFA4C984EAEB7B9FF89355F204558E516EB250DB71AE06CF60
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: 0748f6e0eae2e7f42b6806b9063d68c75dde2f094935ecf3c15ba9877c73f801
                                      • Instruction ID: baccf9a262991eebf03feafed8166247f9671b7b6587ec49fe6dcf968c0cada4
                                      • Opcode Fuzzy Hash: 0748f6e0eae2e7f42b6806b9063d68c75dde2f094935ecf3c15ba9877c73f801
                                      • Instruction Fuzzy Hash: 69416C31A01214ABFF217BBC8C4DABE3AA6FF4B370F184225F518D6692E774484153A7
                                      APIs
                                      • GetWindowRect.USER32(017BEA68,?), ref: 008F62E2
                                      • ScreenToClient.USER32(?,?), ref: 008F6315
                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 008F6382
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$ClientMoveRectScreen
                                      • String ID:
                                      • API String ID: 3880355969-0
                                      • Opcode ID: dd44619b85a35aad41cd10729d6248dfdba4fe00c50b87513f842b0148f6232e
                                      • Instruction ID: 726216b7908f17453b244da41eb9b209c92c51e36af067bf2b5d77314f44b822
                                      • Opcode Fuzzy Hash: dd44619b85a35aad41cd10729d6248dfdba4fe00c50b87513f842b0148f6232e
                                      • Instruction Fuzzy Hash: FD512874A00209EFCB14DF68D980ABE7BB5FB55364F108269FA15DB2A0E730ED91CB50
                                      APIs
                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 008E1AFD
                                      • WSAGetLastError.WSOCK32 ref: 008E1B0B
                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 008E1B8A
                                      • WSAGetLastError.WSOCK32 ref: 008E1B94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorLast$socket
                                      • String ID:
                                      • API String ID: 1881357543-0
                                      • Opcode ID: af2fa379281076b9bea3761ee1b3796e3ce335245460a95addc0f8a4096eb958
                                      • Instruction ID: 87d8fb4bfed071d9c1c600d6d15017ebad43a9afb924d23a7828f838fcbef912
                                      • Opcode Fuzzy Hash: af2fa379281076b9bea3761ee1b3796e3ce335245460a95addc0f8a4096eb958
                                      • Instruction Fuzzy Hash: 19417F74600200AFEB20AF29C88AF2677A5FB85718F548458F95ADF392D672ED418B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e6e0f116832028b56425c51c6cc6b98ef7df6fd10f2451830030bd4c56bb05e7
                                      • Instruction ID: e6a02623589adf78501f25414bf8707d64cc1ac0588557309ff9651c493b943b
                                      • Opcode Fuzzy Hash: e6e0f116832028b56425c51c6cc6b98ef7df6fd10f2451830030bd4c56bb05e7
                                      • Instruction Fuzzy Hash: 79411675A00308BFEB24BF7CDD41BAABBE9FB88720F14452AF151DB692D77199018781
                                      APIs
                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 008D5783
                                      • GetLastError.KERNEL32(?,00000000), ref: 008D57A9
                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008D57CE
                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008D57FA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                      • String ID:
                                      • API String ID: 3321077145-0
                                      • Opcode ID: f1ccaaf6f8c995ab188bb1ccad11d82fac22bff263f5e2c6f8ba983140cf6401
                                      • Instruction ID: 34d2ab1574c031b21db283118f72b4b99fed3c86a0162325e656badea19c1b33
                                      • Opcode Fuzzy Hash: f1ccaaf6f8c995ab188bb1ccad11d82fac22bff263f5e2c6f8ba983140cf6401
                                      • Instruction Fuzzy Hash: 1C412B35610610DFCB11DF19C544A5EBBE2FF89324B19849AE84AEB362CB30FD40CB92
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00886D71,00000000,00000000,008882D9,?,008882D9,?,00000001,00886D71,8BE85006,00000001,008882D9,008882D9), ref: 0089D910
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0089D999
                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0089D9AB
                                      • __freea.LIBCMT ref: 0089D9B4
                                        • Part of subcall function 00893820: RtlAllocateHeap.NTDLL(00000000,?,00931444,?,0087FDF5,?,?,0086A976,00000010,00931440,008613FC,?,008613C6,?,00861129), ref: 00893852
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                      • String ID:
                                      • API String ID: 2652629310-0
                                      • Opcode ID: 0dd2a85ee466d7ba916b86ba4a15aec5348e0121a6210a6b21d50be980b902f7
                                      • Instruction ID: b0e0aa1cfdb37003f59c3ec29ce94d20eb869205595ac29886030c3b16c90ced
                                      • Opcode Fuzzy Hash: 0dd2a85ee466d7ba916b86ba4a15aec5348e0121a6210a6b21d50be980b902f7
                                      • Instruction Fuzzy Hash: 7D31C172A0020AABDF24EF69DC45EAE7BA5FB41310F194169FC04E7250EB35CD55CB91
                                      APIs
                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 008F5352
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F5375
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008F5382
                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008F53A8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LongWindow$InvalidateMessageRectSend
                                      • String ID:
                                      • API String ID: 3340791633-0
                                      • Opcode ID: ddf3620e93e0904d6dfe936b9763c80825dc535ddb8255a5efe80e72fd29b90f
                                      • Instruction ID: c1ea0bfa247333ddc58ea389f5cc9a28b8ac7b65a7810664ba8df4e607928930
                                      • Opcode Fuzzy Hash: ddf3620e93e0904d6dfe936b9763c80825dc535ddb8255a5efe80e72fd29b90f
                                      • Instruction Fuzzy Hash: CF318D34A59A0CAEEB249A3CCC15BF977A6FB06390F584101FB11D63E1C7B49A40AB52
                                      APIs
                                      • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 008CABF1
                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 008CAC0D
                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 008CAC74
                                      • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 008CACC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: KeyboardState$InputMessagePostSend
                                      • String ID:
                                      • API String ID: 432972143-0
                                      • Opcode ID: e08b9058eeb00a655b91707b0374e0e8a433d53a4c669d202079402eeb6d8608
                                      • Instruction ID: 1826a47442cc7305edd5ece59fd31f348cdc7e23ca7835a4db0046cb67109bbf
                                      • Opcode Fuzzy Hash: e08b9058eeb00a655b91707b0374e0e8a433d53a4c669d202079402eeb6d8608
                                      • Instruction Fuzzy Hash: BB311430A4461CAFEB288B68C808FFA7AB5FB89318F04421EE481D21D1C374CA858753
                                      APIs
                                      • ClientToScreen.USER32(?,?), ref: 008F769A
                                      • GetWindowRect.USER32(?,?), ref: 008F7710
                                      • PtInRect.USER32(?,?,008F8B89), ref: 008F7720
                                      • MessageBeep.USER32(00000000), ref: 008F778C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Rect$BeepClientMessageScreenWindow
                                      • String ID:
                                      • API String ID: 1352109105-0
                                      • Opcode ID: aac375f0719ee17b5bfbfcd2457243d6b20c647022bd70a2f392f7858ee00a5d
                                      • Instruction ID: 2659d64fe0ccabcf4f17895f0764021f4050468124a65cc7ff8cd7d20b5b06b0
                                      • Opcode Fuzzy Hash: aac375f0719ee17b5bfbfcd2457243d6b20c647022bd70a2f392f7858ee00a5d
                                      • Instruction Fuzzy Hash: D1418934A1925CDFEB01EF68D894EB9B7F5FB48304F2540A8EA14DB261C330A941CF90
                                      APIs
                                      • GetForegroundWindow.USER32 ref: 008F16EB
                                        • Part of subcall function 008C3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 008C3A57
                                        • Part of subcall function 008C3A3D: GetCurrentThreadId.KERNEL32 ref: 008C3A5E
                                        • Part of subcall function 008C3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008C25B3), ref: 008C3A65
                                      • GetCaretPos.USER32(?), ref: 008F16FF
                                      • ClientToScreen.USER32(00000000,?), ref: 008F174C
                                      • GetForegroundWindow.USER32 ref: 008F1752
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                      • String ID:
                                      • API String ID: 2759813231-0
                                      • Opcode ID: 697866b5d7205dad9fdc83f1899c41c2498d27580d71ba6e33a9ebc2e51786da
                                      • Instruction ID: e3ce0688f1ca0876831a12fe8b73ba3596458e7c1019a57a0c133e40d36be442
                                      • Opcode Fuzzy Hash: 697866b5d7205dad9fdc83f1899c41c2498d27580d71ba6e33a9ebc2e51786da
                                      • Instruction Fuzzy Hash: 01315E75D00149AFCB00EFA9C985CAEB7F9FF48304B51806AE515E7211EA71DE45CBA1
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 008CD501
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 008CD50F
                                      • Process32NextW.KERNEL32(00000000,?), ref: 008CD52F
                                      • CloseHandle.KERNEL32(00000000), ref: 008CD5DC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: 9c838f24b50d18467704f6b63b44c24a2ef51cff78324aeb41426c8d8f13dcf3
                                      • Instruction ID: 86881410f08fa99b032a45e4405405066e4eb9ac3d222bbf6711f670bdd9e14e
                                      • Opcode Fuzzy Hash: 9c838f24b50d18467704f6b63b44c24a2ef51cff78324aeb41426c8d8f13dcf3
                                      • Instruction Fuzzy Hash: 0A317A710083009FD301EF68C881EAABBF8FF99344F10092DF581C61A1EB719A49CBA3
                                      APIs
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      • GetCursorPos.USER32(?), ref: 008F9001
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,008B7711,?,?,?,?,?), ref: 008F9016
                                      • GetCursorPos.USER32(?), ref: 008F905E
                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,008B7711,?,?,?), ref: 008F9094
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                      • String ID:
                                      • API String ID: 2864067406-0
                                      • Opcode ID: e955f1ccd89bd98d15f24f4a2e62953e2b82cfa730d78160b538229f7b613f7c
                                      • Instruction ID: ae092cb95ee636b72170e82cf2a6dff4ff560ebcdb3eac033599d31608c17525
                                      • Opcode Fuzzy Hash: e955f1ccd89bd98d15f24f4a2e62953e2b82cfa730d78160b538229f7b613f7c
                                      • Instruction Fuzzy Hash: 7F216B3560041CEFDB258FA4C858FFA7BB9FB89360F144065FA458B2A1CB319990EF60
                                      APIs
                                      • GetFileAttributesW.KERNEL32(?,008FCB68), ref: 008CD2FB
                                      • GetLastError.KERNEL32 ref: 008CD30A
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 008CD319
                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,008FCB68), ref: 008CD376
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                      • String ID:
                                      • API String ID: 2267087916-0
                                      • Opcode ID: 20ed44ff523912387de3abcee041cc03c9d627bf53cd9307c915705f39bad950
                                      • Instruction ID: 66f576bd6dcd250e65d11cb2b4936281723121ec7d752967050e1c9ff86c4429
                                      • Opcode Fuzzy Hash: 20ed44ff523912387de3abcee041cc03c9d627bf53cd9307c915705f39bad950
                                      • Instruction Fuzzy Hash: F6215E705053059F8710EF38C98196AB7E8FE55364F104A2EF499C73A1E731DA46CB93
                                      APIs
                                        • Part of subcall function 008C1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008C102A
                                        • Part of subcall function 008C1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008C1036
                                        • Part of subcall function 008C1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008C1045
                                        • Part of subcall function 008C1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008C104C
                                        • Part of subcall function 008C1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008C1062
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008C15BE
                                      • _memcmp.LIBVCRUNTIME ref: 008C15E1
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008C1617
                                      • HeapFree.KERNEL32(00000000), ref: 008C161E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                      • String ID:
                                      • API String ID: 1592001646-0
                                      • Opcode ID: 21903e95cb6aa2b5a5b45274af1e3169c60f4ea30ef5f346f073efa31d55bab6
                                      • Instruction ID: 3d0353b3a87bf6c93afe7137826ddd69aad1a3a2e20b6416a47cb62396bb1cfa
                                      • Opcode Fuzzy Hash: 21903e95cb6aa2b5a5b45274af1e3169c60f4ea30ef5f346f073efa31d55bab6
                                      • Instruction Fuzzy Hash: DE214671A00108ABDF00DFA4C989FEEB7B8FF56344F184459E441AB242E730EA45DBA0
                                      APIs
                                      • GetWindowLongW.USER32(?,000000EC), ref: 008F280A
                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 008F2824
                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 008F2832
                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 008F2840
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Long$AttributesLayered
                                      • String ID:
                                      • API String ID: 2169480361-0
                                      • Opcode ID: 7a50383e4c300df4c7bb6b14ae2faa03bb0daa54f680b6bf0a80979f872e0bcf
                                      • Instruction ID: c3f0512e986ef69d7708f0ce9619782ccc34a5c92e56c584977b0fc1ca6811aa
                                      • Opcode Fuzzy Hash: 7a50383e4c300df4c7bb6b14ae2faa03bb0daa54f680b6bf0a80979f872e0bcf
                                      • Instruction Fuzzy Hash: 2721B031205519AFD7149B38C844FBA7B95FF45324F148258F526CB6E2CB71ED82C791
                                      APIs
                                        • Part of subcall function 008C8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,008C790A,?,000000FF,?,008C8754,00000000,?,0000001C,?,?), ref: 008C8D8C
                                        • Part of subcall function 008C8D7D: lstrcpyW.KERNEL32(00000000,?,?,008C790A,?,000000FF,?,008C8754,00000000,?,0000001C,?,?,00000000), ref: 008C8DB2
                                        • Part of subcall function 008C8D7D: lstrcmpiW.KERNEL32(00000000,?,008C790A,?,000000FF,?,008C8754,00000000,?,0000001C,?,?), ref: 008C8DE3
                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,008C8754,00000000,?,0000001C,?,?,00000000), ref: 008C7923
                                      • lstrcpyW.KERNEL32(00000000,?,?,008C8754,00000000,?,0000001C,?,?,00000000), ref: 008C7949
                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,008C8754,00000000,?,0000001C,?,?,00000000), ref: 008C7984
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: lstrcmpilstrcpylstrlen
                                      • String ID: cdecl
                                      • API String ID: 4031866154-3896280584
                                      • Opcode ID: 2944941e611d1087b55d95afee474086d3b192fdceb3268780612ef1fb9127dc
                                      • Instruction ID: 0a1875432f7553c6cb96b24f083959d8db33ebdb1cf8230f28fca38b0cd93340
                                      • Opcode Fuzzy Hash: 2944941e611d1087b55d95afee474086d3b192fdceb3268780612ef1fb9127dc
                                      • Instruction Fuzzy Hash: D511E93A200305ABCB155F39D845E7A7BF9FF85350B50802EF946CB264EB35D915CB61
                                      APIs
                                      • GetWindowLongW.USER32(?,000000F0), ref: 008F7D0B
                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 008F7D2A
                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 008F7D42
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,008DB7AD,00000000), ref: 008F7D6B
                                        • Part of subcall function 00879BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00879BB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$Long
                                      • String ID:
                                      • API String ID: 847901565-0
                                      • Opcode ID: 06523fd054b17b05ed8a50a7cd6fb362ba4cfcb062ba55f7b0d9778936b96290
                                      • Instruction ID: ba24cf6ebde6cd62f86f44a34f964473c02dbc6df2e4a54eab9a14ef4529f6de
                                      • Opcode Fuzzy Hash: 06523fd054b17b05ed8a50a7cd6fb362ba4cfcb062ba55f7b0d9778936b96290
                                      • Instruction Fuzzy Hash: A8116A31618619AFDB10AF38DC04AB63BA5FF45360B558728F939CB2F0E7309951DB50
                                      APIs
                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 008F56BB
                                      • _wcslen.LIBCMT ref: 008F56CD
                                      • _wcslen.LIBCMT ref: 008F56D8
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 008F5816
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend_wcslen
                                      • String ID:
                                      • API String ID: 455545452-0
                                      • Opcode ID: 33829f0c75275876ec486b5044e9d2d354d404f3dac728fd9b9906e3eaff0008
                                      • Instruction ID: 40bb59efdb01d574b001828fb58689e6b495f4131bb24957d9a4c7da83c29ee7
                                      • Opcode Fuzzy Hash: 33829f0c75275876ec486b5044e9d2d354d404f3dac728fd9b9906e3eaff0008
                                      • Instruction Fuzzy Hash: 3611B17561060C96DB209F75DC85AFE7BACFF21764F10402AFB15E6081EBB49A80CB64
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03c7dab34c9807ddaa10c023381e260fb84f808380f9983a344610d7b7734608
                                      • Instruction ID: 644a363ebd82b72961cce3a4e92701164d7b40b4c82b78df864e72ee6ae032db
                                      • Opcode Fuzzy Hash: 03c7dab34c9807ddaa10c023381e260fb84f808380f9983a344610d7b7734608
                                      • Instruction Fuzzy Hash: 8E014BB220961B7EFE2136786CC5F67665DFF813B8B380325F531E11D2DB608D409161
                                      APIs
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 008C1A47
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008C1A59
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008C1A6F
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008C1A8A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 0db5444abc2dfa7bae2b385956d962deae72866be3c13ca6c4417ebe3f85a04d
                                      • Instruction ID: 3db8256ef30cc4f198a37b2ac976fb1a613de5dfba4c2acfc122c8e7e6f61f25
                                      • Opcode Fuzzy Hash: 0db5444abc2dfa7bae2b385956d962deae72866be3c13ca6c4417ebe3f85a04d
                                      • Instruction Fuzzy Hash: BE11273A901229FFEF109BA4C985FADBB78FB08750F200095EA00B7290D771AE50DB94
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 008CE1FD
                                      • MessageBoxW.USER32(?,?,?,?), ref: 008CE230
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 008CE246
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 008CE24D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                      • String ID:
                                      • API String ID: 2880819207-0
                                      • Opcode ID: b6ac2707c0b31146aa1c92b7ba1a38fe2912ad39f646c345fee04f110f800650
                                      • Instruction ID: 78e7056ce063abef0cef8c6a919e9e616be4bc21bf955c5d369a5ff83e0dfd2b
                                      • Opcode Fuzzy Hash: b6ac2707c0b31146aa1c92b7ba1a38fe2912ad39f646c345fee04f110f800650
                                      • Instruction Fuzzy Hash: 0911C476908258BBC7019FB89C09FAE7FBDFB45320F144259F924E3291D6B4DA049BA0
                                      APIs
                                      • CreateThread.KERNEL32(00000000,?,0088CFF9,00000000,00000004,00000000), ref: 0088D218
                                      • GetLastError.KERNEL32 ref: 0088D224
                                      • __dosmaperr.LIBCMT ref: 0088D22B
                                      • ResumeThread.KERNEL32(00000000), ref: 0088D249
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                      • String ID:
                                      • API String ID: 173952441-0
                                      • Opcode ID: 2c6f8de6b5b591b440237781a0f4c6ebf2d6d41bf9614533dd11a0bea2896da0
                                      • Instruction ID: bb1ad77d405cbc2eeb09904095ab8ed3f94a837cace8ba0ee25ab0626470637e
                                      • Opcode Fuzzy Hash: 2c6f8de6b5b591b440237781a0f4c6ebf2d6d41bf9614533dd11a0bea2896da0
                                      • Instruction Fuzzy Hash: 8201DE36805308BBDB217BA9DC09BAE7B69FF81330F204229F925D21E1DF709901C7A1
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0086604C
                                      • GetStockObject.GDI32(00000011), ref: 00866060
                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0086606A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CreateMessageObjectSendStockWindow
                                      • String ID:
                                      • API String ID: 3970641297-0
                                      • Opcode ID: 84b99019bb9488a4e2ec9b76b529ddbebf5f6c06dc8c13dbaca20e4aa395678f
                                      • Instruction ID: cfb1489c76035ccef4b9d4136156a46f0f0c9af457e56da0d36005b3b0bf2409
                                      • Opcode Fuzzy Hash: 84b99019bb9488a4e2ec9b76b529ddbebf5f6c06dc8c13dbaca20e4aa395678f
                                      • Instruction Fuzzy Hash: 21115E7250194CBFEF125FA49C44EEABFA9FF19364F050115FA15A2120D7329D60DBA1
                                      APIs
                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00883B56
                                        • Part of subcall function 00883AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00883AD2
                                        • Part of subcall function 00883AA3: ___AdjustPointer.LIBCMT ref: 00883AED
                                      • _UnwindNestedFrames.LIBCMT ref: 00883B6B
                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00883B7C
                                      • CallCatchBlock.LIBVCRUNTIME ref: 00883BA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                      • String ID:
                                      • API String ID: 737400349-0
                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                      • Instruction ID: 317b5960f3eab9eb9b611c24103956871769916af9b6b9c7d4c3a0bd9704fe20
                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                      • Instruction Fuzzy Hash: F101E972100149BBDF126E99CC46EEB7F69FF58B64F044014FE48A6121D732E961DBA1
                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,008613C6,00000000,00000000,?,0089301A,008613C6,00000000,00000000,00000000,?,0089328B,00000006,FlsSetValue), ref: 008930A5
                                      • GetLastError.KERNEL32(?,0089301A,008613C6,00000000,00000000,00000000,?,0089328B,00000006,FlsSetValue,00902290,FlsSetValue,00000000,00000364,?,00892E46), ref: 008930B1
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0089301A,008613C6,00000000,00000000,00000000,?,0089328B,00000006,FlsSetValue,00902290,FlsSetValue,00000000), ref: 008930BF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LibraryLoad$ErrorLast
                                      • String ID:
                                      • API String ID: 3177248105-0
                                      • Opcode ID: 6a02001c234af0c392e4b9757121163804723948fcb3b350b602e55fa1b9724a
                                      • Instruction ID: 2993c5a142baf532849c1ec0c083d85c802544e6c08ad4c1e3e691ac3ed4ec07
                                      • Opcode Fuzzy Hash: 6a02001c234af0c392e4b9757121163804723948fcb3b350b602e55fa1b9724a
                                      • Instruction Fuzzy Hash: FA012B32315B26ABCF315B789C44D677B99FF45BA1B190624F915E3140C731DE05C6E0
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 008C747F
                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 008C7497
                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 008C74AC
                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 008C74CA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Type$Register$FileLoadModuleNameUser
                                      • String ID:
                                      • API String ID: 1352324309-0
                                      • Opcode ID: 53d92b91517095f2bd13ede68db5d68a3acb8056b53c0ef7886deaeb42d14d13
                                      • Instruction ID: 9c01bdb719eb5174ea7e960839bc6737edd321ed32e06db9d41e56078c08c1a6
                                      • Opcode Fuzzy Hash: 53d92b91517095f2bd13ede68db5d68a3acb8056b53c0ef7886deaeb42d14d13
                                      • Instruction Fuzzy Hash: D2118BB1205319ABE7208F24DD09FA2BBFCFB00B04F10856DA626D6191D7B0EA44DFA4
                                      APIs
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,008CACD3,?,00008000), ref: 008CB0C4
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,008CACD3,?,00008000), ref: 008CB0E9
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,008CACD3,?,00008000), ref: 008CB0F3
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,008CACD3,?,00008000), ref: 008CB126
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CounterPerformanceQuerySleep
                                      • String ID:
                                      • API String ID: 2875609808-0
                                      • Opcode ID: ac91447abe7e4798c351dafd7fbbf4cde99c7cb8235976d7581b74c193031763
                                      • Instruction ID: 733aa6ff584e5c841aaf4a536f71093d57f027d934be5bbfb3a29046180fcf5b
                                      • Opcode Fuzzy Hash: ac91447abe7e4798c351dafd7fbbf4cde99c7cb8235976d7581b74c193031763
                                      • Instruction Fuzzy Hash: 43112A31C0191DD7CF009FE4D95ABEEBB78FF09711F10408AD941B2181DB309650CB52
                                      APIs
                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 008C2DC5
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 008C2DD6
                                      • GetCurrentThreadId.KERNEL32 ref: 008C2DDD
                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 008C2DE4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                      • String ID:
                                      • API String ID: 2710830443-0
                                      • Opcode ID: f44a38bf840f2b17b356691c54947f09184d55a0078d0e15a7e5b430ca1c68af
                                      • Instruction ID: cb6265f96636a7090654b856c6040ecab35e664754907e6bf4ca3aaa0a007ff0
                                      • Opcode Fuzzy Hash: f44a38bf840f2b17b356691c54947f09184d55a0078d0e15a7e5b430ca1c68af
                                      • Instruction Fuzzy Hash: 55E0EDB150522C7AD7201B729D0DFFB7E6CFF66BA1F50011DB606D50D09AA5CA41D6B0
                                      APIs
                                        • Part of subcall function 00879639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00879693
                                        • Part of subcall function 00879639: SelectObject.GDI32(?,00000000), ref: 008796A2
                                        • Part of subcall function 00879639: BeginPath.GDI32(?), ref: 008796B9
                                        • Part of subcall function 00879639: SelectObject.GDI32(?,00000000), ref: 008796E2
                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 008F8887
                                      • LineTo.GDI32(?,?,?), ref: 008F8894
                                      • EndPath.GDI32(?), ref: 008F88A4
                                      • StrokePath.GDI32(?), ref: 008F88B2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                      • String ID:
                                      • API String ID: 1539411459-0
                                      • Opcode ID: 67c45c31f6c964a78d0dfc62cb46151994140f0be4e8415fcfeee131a44b2f14
                                      • Instruction ID: 1f0bebc21ef691646daaf9445b1952e278446eb14ee732ce10f400da4b825adc
                                      • Opcode Fuzzy Hash: 67c45c31f6c964a78d0dfc62cb46151994140f0be4e8415fcfeee131a44b2f14
                                      • Instruction Fuzzy Hash: F3F09A3600565CFADB125FA4AD09FEA3E19BF06310F008000FA01A10E1CB744621DFA5
                                      APIs
                                      • GetSysColor.USER32(00000008), ref: 008798CC
                                      • SetTextColor.GDI32(?,?), ref: 008798D6
                                      • SetBkMode.GDI32(?,00000001), ref: 008798E9
                                      • GetStockObject.GDI32(00000005), ref: 008798F1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Color$ModeObjectStockText
                                      • String ID:
                                      • API String ID: 4037423528-0
                                      • Opcode ID: 8f3c57b5cf130a884330ca8975c50f4b0e002b48f9e6c1bb626bc41cb0f403d4
                                      • Instruction ID: c25ab3ea541957d6be7b8696ca020b7462258879c45af3e35d84dfb7c13a193c
                                      • Opcode Fuzzy Hash: 8f3c57b5cf130a884330ca8975c50f4b0e002b48f9e6c1bb626bc41cb0f403d4
                                      • Instruction Fuzzy Hash: 1EE03031244644AADB215B74AD09BE83F10FB51336F148219F6F9981E1C3718790DB10
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 008C1634
                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,008C11D9), ref: 008C163B
                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008C11D9), ref: 008C1648
                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,008C11D9), ref: 008C164F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CurrentOpenProcessThreadToken
                                      • String ID:
                                      • API String ID: 3974789173-0
                                      • Opcode ID: c34879c94b9b85a25c07d35868df361d9ec0a16e3fd5f905511f45f0a51f14d3
                                      • Instruction ID: 125a90133eee6bed453b199e43f0b5c31276b2d163b5c3514a21e69727bb8b3f
                                      • Opcode Fuzzy Hash: c34879c94b9b85a25c07d35868df361d9ec0a16e3fd5f905511f45f0a51f14d3
                                      • Instruction Fuzzy Hash: A1E08C32602215EBDB201FB1AF0DFA63B7CFF95792F148808F245C9080EA348645CB60
                                      APIs
                                      • GetDesktopWindow.USER32 ref: 008BD858
                                      • GetDC.USER32(00000000), ref: 008BD862
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008BD882
                                      • ReleaseDC.USER32(?), ref: 008BD8A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CapsDesktopDeviceReleaseWindow
                                      • String ID:
                                      • API String ID: 2889604237-0
                                      • Opcode ID: 393255186d6bbcdda135945b23df86cf3720dc387aeda49c5570c912c264513f
                                      • Instruction ID: 91b3572aae069079400cdeaf643c350c370d1de8ab49ffd6d15eeeb92275a82e
                                      • Opcode Fuzzy Hash: 393255186d6bbcdda135945b23df86cf3720dc387aeda49c5570c912c264513f
                                      • Instruction Fuzzy Hash: 28E01AB0804208EFCB419FB4DA08A7DBBB1FB18311F109419E846E7350CB788A01EF41
                                      APIs
                                      • GetDesktopWindow.USER32 ref: 008BD86C
                                      • GetDC.USER32(00000000), ref: 008BD876
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008BD882
                                      • ReleaseDC.USER32(?), ref: 008BD8A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CapsDesktopDeviceReleaseWindow
                                      • String ID:
                                      • API String ID: 2889604237-0
                                      • Opcode ID: f424c7b21ce8ed17012e0699e6f76b938e7243596ac4ca97ca61b8813c2f8147
                                      • Instruction ID: a0cca67451459210faa24b9c05b9470d8cf226e597bf731358d9d917bf0fc392
                                      • Opcode Fuzzy Hash: f424c7b21ce8ed17012e0699e6f76b938e7243596ac4ca97ca61b8813c2f8147
                                      • Instruction Fuzzy Hash: 66E012B0804208EFCB40AFB4DA08A7DBBB1FB18310B109408E84AE7350CB789A02EF40
                                      APIs
                                        • Part of subcall function 00867620: _wcslen.LIBCMT ref: 00867625
                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 008D4ED4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Connection_wcslen
                                      • String ID: *$LPT
                                      • API String ID: 1725874428-3443410124
                                      • Opcode ID: 0dbcbd79b5e14428a06fd094eb4e9f6aea5d12f5011ce8111a596eea86219e3d
                                      • Instruction ID: 1029cf0cac2c851b020eace22a44e50f4a533e3fe5a7fc4cf60177a1cfbbbf89
                                      • Opcode Fuzzy Hash: 0dbcbd79b5e14428a06fd094eb4e9f6aea5d12f5011ce8111a596eea86219e3d
                                      • Instruction Fuzzy Hash: 27914D75A002449FCB14DF58C484EAABBF1FF44318F19919AE80A9F362DB71ED85CB91
                                      APIs
                                      • __startOneArgErrorHandling.LIBCMT ref: 0088E30D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ErrorHandling__start
                                      • String ID: pow
                                      • API String ID: 3213639722-2276729525
                                      • Opcode ID: e91e2551c8c4db7272d56bd113caf163583fbf67c5521c96f2762ab3d8fb9556
                                      • Instruction ID: 20ee0abf8995bafc70ebc2da2e1fd4abf1da22f70667e1bd84cca7fd7790af95
                                      • Opcode Fuzzy Hash: e91e2551c8c4db7272d56bd113caf163583fbf67c5521c96f2762ab3d8fb9556
                                      • Instruction Fuzzy Hash: BD515C61A2C2069ADF157718C9053BD3BA4FF40B44F384968F0D6C23EDEB358C919B46
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: #
                                      • API String ID: 0-1885708031
                                      • Opcode ID: e93c4256cb784015fb6cbe7c43b04b133d49fa8c02cd6fd30b148e10acfbb871
                                      • Instruction ID: e602a7f93ddb9ae4254d8ab4338c04e7c1119e7f37a9ce6d9011db8fb3c9712a
                                      • Opcode Fuzzy Hash: e93c4256cb784015fb6cbe7c43b04b133d49fa8c02cd6fd30b148e10acfbb871
                                      • Instruction Fuzzy Hash: A451013560424AAFDB15DF68C081AFA7BA4FF29310F248099F891DB391DA34DD42DB91
                                      APIs
                                      • Sleep.KERNEL32(00000000), ref: 0087F2A2
                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0087F2BB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: GlobalMemorySleepStatus
                                      • String ID: @
                                      • API String ID: 2783356886-2766056989
                                      • Opcode ID: 82480bcbd5d75ced11187aebb3f886f20f1c291715f73dbbfca7a3b8080001d1
                                      • Instruction ID: 6836f52bd1dae79069444d0ec05685a8454a07db02b5fc2fe6d1f8f444662844
                                      • Opcode Fuzzy Hash: 82480bcbd5d75ced11187aebb3f886f20f1c291715f73dbbfca7a3b8080001d1
                                      • Instruction Fuzzy Hash: 3251687141C7459BD320AF54D886BABBBF8FB84304F82884CF2D981195EB718529CB67
                                      APIs
                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008E57E0
                                      • _wcslen.LIBCMT ref: 008E57EC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: BuffCharUpper_wcslen
                                      • String ID: CALLARGARRAY
                                      • API String ID: 157775604-1150593374
                                      • Opcode ID: 467d75795aa8ccf2b20a2c05a867c0379a53fd46e50e2667ce5722830a1e5dbf
                                      • Instruction ID: 79a535f21cdb407d97ea1b9e43060be8ccbf5de290aa2c67ccfaffee9ac3ae5b
                                      • Opcode Fuzzy Hash: 467d75795aa8ccf2b20a2c05a867c0379a53fd46e50e2667ce5722830a1e5dbf
                                      • Instruction Fuzzy Hash: 7541B031A002199FCB14DFAAC8819BEBBB5FF5A318F104169E505EB291E730DD81CB91
                                      APIs
                                      • _wcslen.LIBCMT ref: 008DD130
                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 008DD13A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CrackInternet_wcslen
                                      • String ID: |
                                      • API String ID: 596671847-2343686810
                                      • Opcode ID: 6a8a0e3819d89d19e1b70ba6a09e1aeffae09bc6ff7ad5faf48d7bd5847e18fb
                                      • Instruction ID: 3a22b5ac5c62d830265138cab0d593ad1c053272d9673d6b19adbccdc33703d4
                                      • Opcode Fuzzy Hash: 6a8a0e3819d89d19e1b70ba6a09e1aeffae09bc6ff7ad5faf48d7bd5847e18fb
                                      • Instruction Fuzzy Hash: 41310C71D00219ABCF15EFA8CC85AEEBFB9FF04304F100119F815E6265EB31AA56DB91
                                      APIs
                                      • DestroyWindow.USER32(?,?,?,?), ref: 008F3621
                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 008F365C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$DestroyMove
                                      • String ID: static
                                      • API String ID: 2139405536-2160076837
                                      • Opcode ID: 2901a13481af7b9d0c7ff826ca55593625228c3d4af529c85ded02cd111b9fc4
                                      • Instruction ID: 7e41dcbc1322bd86f8cdf738c65056d7d42e3e485a418ccf5ed250ea00d48ee9
                                      • Opcode Fuzzy Hash: 2901a13481af7b9d0c7ff826ca55593625228c3d4af529c85ded02cd111b9fc4
                                      • Instruction Fuzzy Hash: 5A318B71110608AADB109F78DC80EBB73A9FF98724F008619FAA5D7290DA34ED91DB60
                                      APIs
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 008F461F
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008F4634
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: '
                                      • API String ID: 3850602802-1997036262
                                      • Opcode ID: 15dc8c9934cf85b020f175fba1d1ccd5e4f717a8462aaa6395db47f252da5068
                                      • Instruction ID: 035589d5a2f20373ff241f1c8325fbc5fea0df0a66666f38813df0d887dbd501
                                      • Opcode Fuzzy Hash: 15dc8c9934cf85b020f175fba1d1ccd5e4f717a8462aaa6395db47f252da5068
                                      • Instruction Fuzzy Hash: BC313874A0020E9FDB14DFA9C980BEA7BB5FF09300F10506AEA04EB351D770A941CF90
                                      APIs
                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 008F327C
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008F3287
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: Combobox
                                      • API String ID: 3850602802-2096851135
                                      • Opcode ID: dcb73631fbaa4f14e876add93c6592d604b13b9739eef02db260fb47c53a2e0a
                                      • Instruction ID: 3612288a03d1284544307e85af7f44daff154332b6cb109121428ff960a58394
                                      • Opcode Fuzzy Hash: dcb73631fbaa4f14e876add93c6592d604b13b9739eef02db260fb47c53a2e0a
                                      • Instruction Fuzzy Hash: 5311B27130020CBFFF219EA4DC80EBB376AFB94365F104129FA18E7290D6319D519B60
                                      APIs
                                        • Part of subcall function 0086600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0086604C
                                        • Part of subcall function 0086600E: GetStockObject.GDI32(00000011), ref: 00866060
                                        • Part of subcall function 0086600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0086606A
                                      • GetWindowRect.USER32(00000000,?), ref: 008F377A
                                      • GetSysColor.USER32(00000012), ref: 008F3794
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                      • String ID: static
                                      • API String ID: 1983116058-2160076837
                                      • Opcode ID: fa5527db536b74297d81c20b785737cadebb6cd2ed488b782ccf085572def0d4
                                      • Instruction ID: 484464bf8955f3d84c0144b2a00efef9aec012dc690dc8eaf09fc7743e43f475
                                      • Opcode Fuzzy Hash: fa5527db536b74297d81c20b785737cadebb6cd2ed488b782ccf085572def0d4
                                      • Instruction Fuzzy Hash: 491106B2610209AFDB00EFB8C845ABA7BA8FB08314F004924FA55E2250E735E951DB60
                                      APIs
                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 008DCD7D
                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 008DCDA6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Internet$OpenOption
                                      • String ID: <local>
                                      • API String ID: 942729171-4266983199
                                      • Opcode ID: 8b5c928251a1b6d8d779152dba5e5f4fb657b75af6c9099ea55181c595998526
                                      • Instruction ID: ba52ad860135be2f02c187071ca953cdfa9168862ae91731e2043996bbe235b4
                                      • Opcode Fuzzy Hash: 8b5c928251a1b6d8d779152dba5e5f4fb657b75af6c9099ea55181c595998526
                                      • Instruction Fuzzy Hash: E311A3712056367ED7284A668C45EF7BF6AFF127A8F004327F109C3280D6609940D6F0
                                      APIs
                                      • GetWindowTextLengthW.USER32(00000000), ref: 008F34AB
                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008F34BA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LengthMessageSendTextWindow
                                      • String ID: edit
                                      • API String ID: 2978978980-2167791130
                                      • Opcode ID: 5d4b030e6d1ec503d4208ca97931bb3129c3c20b9277479eb6e3823149ef60f4
                                      • Instruction ID: 46531f9ee3049204831cfb810248f4d7982a4168d1f66050e57ef3695cb6c212
                                      • Opcode Fuzzy Hash: 5d4b030e6d1ec503d4208ca97931bb3129c3c20b9277479eb6e3823149ef60f4
                                      • Instruction Fuzzy Hash: F8116D7110010CAAEB118E74DC44ABA376AFB25378F504724FA61D31E0D775DD919B69
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                      • CharUpperBuffW.USER32(?,?,?), ref: 008C6CB6
                                      • _wcslen.LIBCMT ref: 008C6CC2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharUpper
                                      • String ID: STOP
                                      • API String ID: 1256254125-2411985666
                                      • Opcode ID: 133488185a35a47f0fedb865cc87b6aa0b999623b1ed6280e66e5a5bf166faa5
                                      • Instruction ID: 274346cd0ea5bda08defef42ad60c853d35e8eee48e8b463bbf57732418a1a4c
                                      • Opcode Fuzzy Hash: 133488185a35a47f0fedb865cc87b6aa0b999623b1ed6280e66e5a5bf166faa5
                                      • Instruction Fuzzy Hash: 0601C432A0052A8BCB20AFBDDC80EBF77B5FB61714B11053CE962D7194FA32D920C651
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008C3CCA
                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 008C1D4C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: e849a87fdf666e4dd7670e049f57c1dbe10997110679287e712c90eda5fdb8bb
                                      • Instruction ID: e516b0763ba5c1791e0197d7dd4064659366a08d5d71e8037024309ab82d6d46
                                      • Opcode Fuzzy Hash: e849a87fdf666e4dd7670e049f57c1dbe10997110679287e712c90eda5fdb8bb
                                      • Instruction Fuzzy Hash: CB019271601218ABCB04ABA8CD95EFE7378FB56350B14091DF963D72C2EA3099098661
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008C3CCA
                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 008C1C46
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: ac344a0c766f3242212fdf87bb3016f33a2b352d0633f30b661932889eb75a31
                                      • Instruction ID: a9bbcbc310b6e5e802ebe8d190989d947ae21c7f32047958a7bbe19c3b1d04ed
                                      • Opcode Fuzzy Hash: ac344a0c766f3242212fdf87bb3016f33a2b352d0633f30b661932889eb75a31
                                      • Instruction Fuzzy Hash: 9D015E7568110866CF04EBA4DA95EFE77A8EB62340B150019B446E72C2EA34DA18A6B2
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008C3CCA
                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 008C1CC8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: 180dfc84e1e06ad2461c86ceca4dca1b6e36fdef0cb40765392cecb5c043c1f4
                                      • Instruction ID: 08ba2908631365615bacc8f3bda2e15615dcc813dec2fff116c7bdc10a81b60b
                                      • Opcode Fuzzy Hash: 180dfc84e1e06ad2461c86ceca4dca1b6e36fdef0cb40765392cecb5c043c1f4
                                      • Instruction Fuzzy Hash: B5017C7168111867CF14EBA8CA55EFE73ACFB22340B150019B842E7282EA30DB19D672
                                      APIs
                                        • Part of subcall function 00869CB3: _wcslen.LIBCMT ref: 00869CBD
                                        • Part of subcall function 008C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 008C3CCA
                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 008C1DD3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: 02c22ea46da46e0bfb15e130db5ee47c50fa2c85c3923ab7272efd9dad1d930c
                                      • Instruction ID: cbf97a2fc5560f6da24a4585d12a1f099c81c7adffe44efeb1edc05abcebbd94
                                      • Opcode Fuzzy Hash: 02c22ea46da46e0bfb15e130db5ee47c50fa2c85c3923ab7272efd9dad1d930c
                                      • Instruction Fuzzy Hash: B1F0F471A4121867CB04F7A8DD96FFE737CFB12344F05091DF962E72C6DA709A088261
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID: 3, 3, 16, 1
                                      • API String ID: 176396367-3042988571
                                      • Opcode ID: 2187e3a5f95c8774139d7248fb8acca64c24e11763af74f3a3561735d13424fe
                                      • Instruction ID: d724ed60526d481a81871a31af0681a410166364893089a204452696ade4eff2
                                      • Opcode Fuzzy Hash: 2187e3a5f95c8774139d7248fb8acca64c24e11763af74f3a3561735d13424fe
                                      • Instruction Fuzzy Hash: BBE02B03205261209231227FACC197F5A89FFCA750710282BF985D22BAEA94CD9193A6
                                      APIs
                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 008C0B23
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Message
                                      • String ID: AutoIt$Error allocating memory.
                                      • API String ID: 2030045667-4017498283
                                      • Opcode ID: 0747bd125cb3f59e617f2ef5afe536135cd863796c7d6ccf7bc30dd9239a37dd
                                      • Instruction ID: 65245645ec2ae889f308dd40fbb080365b56f678809772e2deadca7a4075e749
                                      • Opcode Fuzzy Hash: 0747bd125cb3f59e617f2ef5afe536135cd863796c7d6ccf7bc30dd9239a37dd
                                      • Instruction Fuzzy Hash: C3E0D83228431C2AD21036A97D03F997A84FF05B60F10442AF798D55C38BE1659046EA
                                      APIs
                                        • Part of subcall function 0087F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00880D71,?,?,?,0086100A), ref: 0087F7CE
                                      • IsDebuggerPresent.KERNEL32(?,?,?,0086100A), ref: 00880D75
                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0086100A), ref: 00880D84
                                      Strings
                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00880D7F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                      • API String ID: 55579361-631824599
                                      • Opcode ID: 2454ab2b0819d186a9c735f810219a8d8d4ba447fc4f3f15a483206b7acd2688
                                      • Instruction ID: 4b750e19992792b887f4d53d153e19bef80b761333dddebfb431ab63c0763921
                                      • Opcode Fuzzy Hash: 2454ab2b0819d186a9c735f810219a8d8d4ba447fc4f3f15a483206b7acd2688
                                      • Instruction Fuzzy Hash: 21E039702007418BD360AFB8D5046527BE4FF00740F008A2DE686C6652DBB4E448CF92
                                      APIs
                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 008D302F
                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 008D3044
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: Temp$FileNamePath
                                      • String ID: aut
                                      • API String ID: 3285503233-3010740371
                                      • Opcode ID: 51cd517cf5a5d83b7a2565beb28112e3188f83e7679e735e6ba2b9f81873eedb
                                      • Instruction ID: e4c52c0beae8db53551665b5b007417de3ae714b7a25bce6e7aa88c8833ed2a0
                                      • Opcode Fuzzy Hash: 51cd517cf5a5d83b7a2565beb28112e3188f83e7679e735e6ba2b9f81873eedb
                                      • Instruction Fuzzy Hash: 75D05E72500328A7DA20A7A4AD0EFDB3A6CEB04750F4002A1B655E2096DAB09A84CAD0
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: LocalTime
                                      • String ID: %.3d$X64
                                      • API String ID: 481472006-1077770165
                                      • Opcode ID: 75136b8e7d9c910639ded33e6805143759dddffe6eddfbbf45db4195628a4578
                                      • Instruction ID: dc2da191a7c8c3c029a30e03bade5e0f6d3549ab73977b7e0a2fd889c4737d25
                                      • Opcode Fuzzy Hash: 75136b8e7d9c910639ded33e6805143759dddffe6eddfbbf45db4195628a4578
                                      • Instruction Fuzzy Hash: B5D01261C0935DF9CB5096E0DC458F9B77CFB48305F508462F90AE1145F634E548AB61
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008F232C
                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 008F233F
                                        • Part of subcall function 008CE97B: Sleep.KERNEL32 ref: 008CE9F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 8f2d9c256b1e3fc00027f2174a1e4de8687d064dfc55382c3544df36686ef8ae
                                      • Instruction ID: 074a6c6ed9cac77d5d8ce99c8937070f7bf32ad337a707eba1fbbd66b03b6a54
                                      • Opcode Fuzzy Hash: 8f2d9c256b1e3fc00027f2174a1e4de8687d064dfc55382c3544df36686ef8ae
                                      • Instruction Fuzzy Hash: 04D02232384310B7E2A4B730EC0FFD67A28BB00B00F00091A7305EA0D0C8F0A801CA00
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008F236C
                                      • PostMessageW.USER32(00000000), ref: 008F2373
                                        • Part of subcall function 008CE97B: Sleep.KERNEL32 ref: 008CE9F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 9c6fb74d356890f699d32d74fb6f2e18d771cbef8611fcd613838de6aaec58db
                                      • Instruction ID: c8f09d5961d55c13e1075599faa303de1f52e8d1b7a1cb896791f7b0d82c033c
                                      • Opcode Fuzzy Hash: 9c6fb74d356890f699d32d74fb6f2e18d771cbef8611fcd613838de6aaec58db
                                      • Instruction Fuzzy Hash: 3BD022323C03107BE2A4B730EC0FFC67A28BB04B00F00091A7301EA0D0C8F0B801CA04
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0089BE93
                                      • GetLastError.KERNEL32 ref: 0089BEA1
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0089BEFC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2030352009.0000000000861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
                                      • Associated: 00000000.00000002.2030323549.0000000000860000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.00000000008FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030406855.0000000000922000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030482146.000000000092C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2030511921.0000000000934000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_860000_new order.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1717984340-0
                                      • Opcode ID: 909d4c5a7664bd962a53b32050cafb0d6aa485a96b5043da5f524742e72e8d2c
                                      • Instruction ID: e9aad82dc21cb06b9c6d46d845db9a62629575cadf63e5ef987e0e7b7204236b
                                      • Opcode Fuzzy Hash: 909d4c5a7664bd962a53b32050cafb0d6aa485a96b5043da5f524742e72e8d2c
                                      • Instruction Fuzzy Hash: 3A41D73460020AAFCF21AF65EE44ABA7BA9FF41310F184169F959D71A1DF708D00CB61