Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NEWORDER.exe

Overview

General Information

Sample name:NEWORDER.exe
Analysis ID:1592063
MD5:53ae35ae01c79a16eca864ee78a086ef
SHA1:aaae775bb0f19a8ef5d1c19b8005aad129b06cac
SHA256:e3140471b8e10e218754105e8fe4305bd7045f0f1da7eee586b07e5cfe4206b5
Tags:AutoITexemalwaretrojanuser-Joker
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • NEWORDER.exe (PID: 6104 cmdline: "C:\Users\user\Desktop\NEWORDER.exe" MD5: 53AE35AE01C79A16ECA864EE78A086EF)
    • RegSvcs.exe (PID: 6808 cmdline: "C:\Users\user\Desktop\NEWORDER.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "ask4help@br4inb0xc.com", "Password": "wWg24EKAsnUH", "Server": "br4inb0xc.com", "To": "asper1@br4inb0xc.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf1df:$a1: get_encryptedPassword
        • 0xf507:$a2: get_encryptedUsername
        • 0xef7a:$a3: get_timePasswordChanged
        • 0xf09b:$a4: get_passwordField
        • 0xf1f5:$a5: set_encryptedPassword
        • 0x10b51:$a7: get_logins
        • 0x10802:$a8: GetOutlookPasswords
        • 0x105f4:$a9: StartKeylogger
        • 0x10aa1:$a10: KeyLoggerEventArgs
        • 0x10651:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1417f:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1367d:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1398b:$a4: \Orbitum\User Data\Default\Login Data
        • 0x14783:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.NEWORDER.exe.1110000.1.raw.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          0.2.NEWORDER.exe.1110000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.NEWORDER.exe.1110000.1.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.NEWORDER.exe.1110000.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0xf1df:$a1: get_encryptedPassword
              • 0xf507:$a2: get_encryptedUsername
              • 0xef7a:$a3: get_timePasswordChanged
              • 0xf09b:$a4: get_passwordField
              • 0xf1f5:$a5: set_encryptedPassword
              • 0x10b51:$a7: get_logins
              • 0x10802:$a8: GetOutlookPasswords
              • 0x105f4:$a9: StartKeylogger
              • 0x10aa1:$a10: KeyLoggerEventArgs
              • 0x10651:$a11: KeyLoggerEventArgsEventHandler
              0.2.NEWORDER.exe.1110000.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1417f:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1367d:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1398b:$a4: \Orbitum\User Data\Default\Login Data
              • 0x14783:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 10 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T18:09:06.923625+010028032742Potentially Bad Traffic192.168.2.649710132.226.247.7380TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "ask4help@br4inb0xc.com", "Password": "wWg24EKAsnUH", "Server": "br4inb0xc.com", "To": "asper1@br4inb0xc.com", "Port": 587}
              Source: NEWORDER.exeVirustotal: Detection: 41%Perma Link
              Source: NEWORDER.exeReversingLabs: Detection: 36%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: NEWORDER.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: NEWORDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49712 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: NEWORDER.exe, 00000000.00000003.2181931628.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, NEWORDER.exe, 00000000.00000003.2179069061.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: NEWORDER.exe, 00000000.00000003.2181931628.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, NEWORDER.exe, 00000000.00000003.2179069061.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0065C2A2 FindFirstFileExW,0_2_0065C2A2
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006968EE FindFirstFileW,FindClose,0_2_006968EE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0069698F
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0068D076
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0068D3A9
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00699642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00699642
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0069979D
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00699B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00699B2B
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0068DBBE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00695C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00695C97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02D15782h2_2_02D15366
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02D151B9h2_2_02D14F08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02D15782h2_2_02D156AF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05880740h2_2_05880498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 058802E8h2_2_05880040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esp, ebp2_2_05884D8B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esp, ebp2_2_05884DCA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_05880B20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 058817FDh2_2_05881620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05882187h2_2_05881620
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
              Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
              Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49710 -> 132.226.247.73:80
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49712 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0069CE44
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002E9E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
              Source: NEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002ECD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002ECD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: NEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: NEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0069EAFF
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0069ED6A
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0069EAFF
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0068AA57
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006B9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_006B9576

              System Summary

              barindex
              Source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: NEWORDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: NEWORDER.exe, 00000000.00000000.2169692303.00000000006E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_46130edc-8
              Source: NEWORDER.exe, 00000000.00000000.2169692303.00000000006E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a90c5db9-c
              Source: NEWORDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_12a36fe9-3
              Source: NEWORDER.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_eb07e4dd-e
              Source: initial sampleStatic PE information: Filename: NEWORDER.exe
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0068D5EB
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00681201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00681201
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0068E8F6
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006280600_2_00628060
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006920460_2_00692046
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006882980_2_00688298
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0065E4FF0_2_0065E4FF
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0065676B0_2_0065676B
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006B48730_2_006B4873
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0062CAF00_2_0062CAF0
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0064CAA00_2_0064CAA0
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0063CC390_2_0063CC39
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00656DD90_2_00656DD9
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0063B1190_2_0063B119
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006291C00_2_006291C0
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006413940_2_00641394
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0064781B0_2_0064781B
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0063997D0_2_0063997D
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006279200_2_00627920
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00647A4A0_2_00647A4A
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00647CA70_2_00647CA7
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006ABE440_2_006ABE44
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00659EEE0_2_00659EEE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0062BF400_2_0062BF40
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0144F0F00_2_0144F0F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D1C1682_2_02D1C168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D127B92_2_02D127B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D1CA582_2_02D1CA58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D17E682_2_02D17E68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D14F082_2_02D14F08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D12DD12_2_02D12DD1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D1B9E02_2_02D1B9E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D14EF82_2_02D14EF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D17E632_2_02D17E63
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0588048A2_2_0588048A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058804982_2_05880498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058826872_2_05882687
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058826982_2_05882698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058840002_2_05884000
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058800072_2_05880007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058800402_2_05880040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05882CD02_2_05882CD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05882CE02_2_05882CE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05880B202_2_05880B20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05884AE02_2_05884AE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058816102_2_05881610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058816202_2_05881620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058833202_2_05883320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058833302_2_05883330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05883FEF2_2_05883FEF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058839802_2_05883980
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058839742_2_05883974
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: String function: 0063F9F2 appears 40 times
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: String function: 00640A30 appears 46 times
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: String function: 00629CB3 appears 31 times
              Source: NEWORDER.exe, 00000000.00000003.2183155768.0000000003BC3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NEWORDER.exe
              Source: NEWORDER.exe, 00000000.00000003.2183942795.0000000003D6D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NEWORDER.exe
              Source: NEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs NEWORDER.exe
              Source: NEWORDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006937B5 GetLastError,FormatMessageW,0_2_006937B5
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006810BF AdjustTokenPrivileges,CloseHandle,0_2_006810BF
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006816C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006816C3
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006951CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006951CD
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006AA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_006AA67C
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0069648E
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006242A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_006242A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\NEWORDER.exeFile created: C:\Users\user\AppData\Local\Temp\overfertilizeJump to behavior
              Source: NEWORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\NEWORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.3407838999.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002F2E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3408422037.0000000003E5D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002F4F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: NEWORDER.exeVirustotal: Detection: 41%
              Source: NEWORDER.exeReversingLabs: Detection: 36%
              Source: unknownProcess created: C:\Users\user\Desktop\NEWORDER.exe "C:\Users\user\Desktop\NEWORDER.exe"
              Source: C:\Users\user\Desktop\NEWORDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NEWORDER.exe"
              Source: C:\Users\user\Desktop\NEWORDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NEWORDER.exe"Jump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: NEWORDER.exeStatic file information: File size 1357312 > 1048576
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: NEWORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: NEWORDER.exe, 00000000.00000003.2181931628.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, NEWORDER.exe, 00000000.00000003.2179069061.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: NEWORDER.exe, 00000000.00000003.2181931628.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, NEWORDER.exe, 00000000.00000003.2179069061.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
              Source: NEWORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: NEWORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: NEWORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: NEWORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: NEWORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006242DE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00640A76 push ecx; ret 0_2_00640A89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D1F273 push ebp; retf 2_2_02D1F281
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0588BDB8 push es; ret 2_2_0588C230
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0063F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0063F98E
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006B1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_006B1C41
              Source: C:\Users\user\Desktop\NEWORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\NEWORDER.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95645
              Source: C:\Users\user\Desktop\NEWORDER.exeAPI/Special instruction interceptor: Address: 144ED14
              Source: C:\Users\user\Desktop\NEWORDER.exeAPI coverage: 3.4 %
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0065C2A2 FindFirstFileExW,0_2_0065C2A2
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006968EE FindFirstFileW,FindClose,0_2_006968EE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0069698F
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0068D076
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0068D3A9
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00699642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00699642
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0069979D
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00699B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00699B2B
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0068DBBE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00695C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00695C97
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006242DE
              Source: RegSvcs.exe, 00000002.00000002.3407178583.00000000011D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D1C168 LdrInitializeThunk,LdrInitializeThunk,2_2_02D1C168
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0069EAA2 BlockInput,0_2_0069EAA2
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00652622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00652622
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006242DE
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00644CE8 mov eax, dword ptr fs:[00000030h]0_2_00644CE8
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0144EFE0 mov eax, dword ptr fs:[00000030h]0_2_0144EFE0
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0144EF80 mov eax, dword ptr fs:[00000030h]0_2_0144EF80
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0144D910 mov eax, dword ptr fs:[00000030h]0_2_0144D910
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00680B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00680B62
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00652622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00652622
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0064083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0064083F
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006409D5 SetUnhandledExceptionFilter,0_2_006409D5
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00640C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00640C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\NEWORDER.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C95008Jump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00681201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00681201
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00662BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00662BA5
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0068B226 SendInput,keybd_event,0_2_0068B226
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006A22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_006A22DA
              Source: C:\Users\user\Desktop\NEWORDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NEWORDER.exe"Jump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00680B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00680B62
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00681663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00681663
              Source: NEWORDER.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: NEWORDER.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00640698 cpuid 0_2_00640698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_00698195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00698195
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0067D27A GetUserNameW,0_2_0067D27A
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_0065B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0065B952
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006242DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: NEWORDER.exeBinary or memory string: WIN_81
              Source: NEWORDER.exeBinary or memory string: WIN_XP
              Source: NEWORDER.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: NEWORDER.exeBinary or memory string: WIN_XPe
              Source: NEWORDER.exeBinary or memory string: WIN_VISTA
              Source: NEWORDER.exeBinary or memory string: WIN_7
              Source: NEWORDER.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3407838999.0000000002F86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NEWORDER.exe.1110000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NEWORDER.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6808, type: MEMORYSTR
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006A1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_006A1204
              Source: C:\Users\user\Desktop\NEWORDER.exeCode function: 0_2_006A1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_006A1806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              1
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS127
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets221
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              NEWORDER.exe42%VirustotalBrowse
              NEWORDER.exe37%ReversingLabsWin32.Trojan.Cerbu
              NEWORDER.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.96.1
              truefalse
                high
                checkip.dyndns.com
                132.226.247.73
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comdRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qNEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://reallyfreegeoip.orgdRegSvcs.exe, 00000002.00000002.3407838999.0000000002ECD000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.3407838999.0000000002ECD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.orgdRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.3407838999.0000000002E9E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.org/dRegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3407838999.0000000002E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.telegram.org/bot-/sendDocument?chat_id=NEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/NEWORDER.exe, 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3407838999.0000000002EB0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    104.21.96.1
                                                    reallyfreegeoip.orgUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    132.226.247.73
                                                    checkip.dyndns.comUnited States
                                                    16989UTMEMUSfalse
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1592063
                                                    Start date and time:2025-01-15 18:08:07 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 3s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:7
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:NEWORDER.exe
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 99%
                                                    • Number of executed functions: 45
                                                    • Number of non-executed functions: 299
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                    No simulations
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    104.21.96.1k9OEsV37GE.exeGet hashmaliciousFormBookBrowse
                                                    • www.uzshou.world/kbd2/?EtJTX=_JVX4ryxDRQpLJF&cNPH=ufZ7RYF4yLxNXVSq5Vx/4TYieRbcnKjskkbM3L5RbgB1pAgqHA7sfCNkYWLyXRMMwBB3JLbYKUw1FAOWml6VLpxPVZ4qXf58MsNUIQgw/PJ5HUGIvLQvrl5frN9PrRFpPiAd2cDcH6Sr
                                                    gH3LlhcRzg.exeGet hashmaliciousFormBookBrowse
                                                    • www.dejikenkyu.cyou/58m5/
                                                    EIvidclKOb.exeGet hashmaliciousFormBookBrowse
                                                    • www.mffnow.info/0pqe/
                                                    zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                    • www.aonline.top/fqlg/
                                                    QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                    • www.mzkd6gp5.top/3u0p/
                                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                    • pelisplus.so/administrator/index.php
                                                    Recibos.exeGet hashmaliciousFormBookBrowse
                                                    • www.mffnow.info/1a34/
                                                    132.226.247.73QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    RENH3RE2025QUOTE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • checkip.dyndns.org/
                                                    rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • checkip.dyndns.org/
                                                    Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                    • checkip.dyndns.org/
                                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • checkip.dyndns.org/
                                                    rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                    • checkip.dyndns.org/
                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    reallyfreegeoip.orgInvoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.112.1
                                                    PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 104.21.96.1
                                                    PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 104.21.80.1
                                                    1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 104.21.112.1
                                                    Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.48.1
                                                    rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 104.21.64.1
                                                    checkip.dyndns.comInvoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 158.101.44.242
                                                    PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 193.122.130.0
                                                    PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 193.122.130.0
                                                    1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 193.122.130.0
                                                    Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 193.122.6.168
                                                    Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 193.122.6.168
                                                    rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 193.122.6.168
                                                    RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 158.101.44.242
                                                    QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.247.73
                                                    Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 132.226.8.169
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUShttps://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                                                    • 104.21.79.87
                                                    DOCU800147001.exeGet hashmaliciousGuLoaderBrowse
                                                    • 104.21.32.1
                                                    firstontario.docxGet hashmaliciousUnknownBrowse
                                                    • 1.1.1.1
                                                    lummm_lzmb.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.67.165
                                                    https://solve.lzmb.org/awjsx.captcha?u=a85c9e46-f1ff-475f-b74c-c23cf236a082Get hashmaliciousUnknownBrowse
                                                    • 104.21.78.33
                                                    https://solve.xfzz.org/awjsx.captcha?u=c56ed68e-fc67-4e24-b8ac-6adc700e0877%20#%20%E2%9C%85%20''I%20am%20not%20a%20robot%20-%20reCAPTCHA%20Verification%20ID:%203467''Get hashmaliciousUnknownBrowse
                                                    • 104.21.32.1
                                                    https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                                                    • 104.17.25.14
                                                    Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.25.14
                                                    https://bluefiles.com/fr/reader/document/2c33782e98658214c7dff875dd234fc3b9b9a60915ac1685fe35abcc657c139dGet hashmaliciousUnknownBrowse
                                                    • 1.1.1.1
                                                    UTMEMUS330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                                    • 132.224.47.164
                                                    QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.247.73
                                                    Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 132.226.8.169
                                                    TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.247.73
                                                    RENH3RE2025QUOTE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 132.226.247.73
                                                    PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.8.169
                                                    tN8GsMV1le.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 132.226.8.169
                                                    rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • 132.226.247.73
                                                    QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.8.169
                                                    PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.8.169
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    54328bd36c14bd82ddaa0c04b25ed9adInvoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 104.21.96.1
                                                    1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 104.21.96.1
                                                    50201668.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    No context
                                                    Process:C:\Users\user\Desktop\NEWORDER.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):93696
                                                    Entropy (8bit):6.86238420998648
                                                    Encrypted:false
                                                    SSDEEP:1536:LH0oYRsprXY2L6+WrWMfNXq9b73KAf0vXn35RX10pVZX5d0J16iAfrnkgx:ZE0Y2L6+WrWMfNXIfHf0vX3ihd0J16ic
                                                    MD5:DD4E293395F17005966633E7CB791802
                                                    SHA1:2628FF55CAE9CDCA78ADFE046399C9945E3FD03D
                                                    SHA-256:823CB58B5327F3D241BD7D9266D6AFD1D6E4525BDBC5D5E0D66CABC97E4B9D88
                                                    SHA-512:CE688176E591E84C6DF9A468933F4A4CCD23B8453FF7F1C1BC44289BEB38CEA489A199470A66F7574AABD548992458124A842ACFCAEDD5698036C6A5242250F4
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:z..R[7I3ROAR.7J.9UPVMO4.7M4RX7I3VOAR2M7JW9UPVMO4L7M4RX7I3VO.R2M9U.7U._.n.M{...0^:.&=.5@,Zj4X;>99oV).?A<x^'....r_"S/y4XZrMO4L7M4..7I.WLA.\..JW9UPVMO.L5L?S.7IWWOAZ2M7JW9..WMO.L7M.SX7IsVOaR2M5JW=UPVMO4L1M4RX7I3V.@R2O7JW9UPTM/.L7]4RH7I3V_AR"M7JW9U@VMO4L7M4RX7..WO.R2M7.V9.UVMO4L7M4RX7I3VOAR2M.KW5UPVMO4L7M4RX7I3VOAR2M7JW9UPVMO4L7M4RX7I3VOAR2M7JW9UPvMO<L7M4RX7I3VOIr2M.JW9UPVMO4L7c@7 CI3V.#S2M.JW91QVMM4L7M4RX7I3VOAR.M7*yK&"5MO4.2M4R.6I3POARTL7JW9UPVMO4L7MtRXwgA3#.12M;JW9U.WMO6L7MXSX7I3VOAR2M7JWyUP.MO4L7M4RX7I3VOAR..6JW9UP.MO4N7H4..7I..OAQ2M7.W9S..MO.L7M4RX7I3VOAR2M7JW9UPVMO4L7M4RX7I3VOAR2M7JW.(.Y...%D..RX7I3VNCQ6K?BW9UPVMO427M4.X7IsVOAe2M7oW9U=VMO.L7MJRX773VO%R2MEJW94PVM.4L7"4RXYI3V1AR2S5bH9UZ|kO6d.M4XX..@wOAX.L7JSJwPVG.6L7IGqX7C.UOAVAi7J].QPVI<.L7G.WX7M..OB.$K7JLVmPVGO7."K4RC.o3TgxR2G7`q9V.CKO4W.o4P.>I3Re.!/M7L.{UP\9F4L5.>RX3c-Tg.R2G.h)*UPRfO.nIY4R\.I.t1TR2I.J}.+FVMK.L.oJEX7M.VeGxPME.[9%S9,O4J..4RR..3VIAx.MIDW9QR9.O4F.g.RpgI3POi.2M1J}.U.eMO0`03.RX3b%(~AR6.12W9S#.MO>i.~4R\..3VEAx.M..W9SP~.O4J
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.737507307782037
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:NEWORDER.exe
                                                    File size:1'357'312 bytes
                                                    MD5:53ae35ae01c79a16eca864ee78a086ef
                                                    SHA1:aaae775bb0f19a8ef5d1c19b8005aad129b06cac
                                                    SHA256:e3140471b8e10e218754105e8fe4305bd7045f0f1da7eee586b07e5cfe4206b5
                                                    SHA512:939beb060314c73341de83dbf0fc4f910778ad9f52877b186665c7e191600d736a13ba233a67d4658eac7b31a63dbe5365db257e61cdb3a963756c8beee300e7
                                                    SSDEEP:24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8aGKLbpOyjRo1HTqUMxn:zTvC/MTQYxsWR7aGkbw2osV
                                                    TLSH:EF55C00333819062FF5B92330F6AE6555B7D6E2A4133A91F13AC3D79BA70172163E663
                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                    Icon Hash:98e2a3b29b9ba181
                                                    Entrypoint:0x420577
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6785AA95 [Tue Jan 14 00:06:45 2025 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                                    Instruction
                                                    call 00007F28FC85FC93h
                                                    jmp 00007F28FC85F59Fh
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    push dword ptr [ebp+08h]
                                                    mov esi, ecx
                                                    call 00007F28FC85F77Dh
                                                    mov dword ptr [esi], 0049FDF0h
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    and dword ptr [ecx+04h], 00000000h
                                                    mov eax, ecx
                                                    and dword ptr [ecx+08h], 00000000h
                                                    mov dword ptr [ecx+04h], 0049FDF8h
                                                    mov dword ptr [ecx], 0049FDF0h
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    push dword ptr [ebp+08h]
                                                    mov esi, ecx
                                                    call 00007F28FC85F74Ah
                                                    mov dword ptr [esi], 0049FE0Ch
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    and dword ptr [ecx+04h], 00000000h
                                                    mov eax, ecx
                                                    and dword ptr [ecx+08h], 00000000h
                                                    mov dword ptr [ecx+04h], 0049FE14h
                                                    mov dword ptr [ecx], 0049FE0Ch
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    mov esi, ecx
                                                    lea eax, dword ptr [esi+04h]
                                                    mov dword ptr [esi], 0049FDD0h
                                                    and dword ptr [eax], 00000000h
                                                    and dword ptr [eax+04h], 00000000h
                                                    push eax
                                                    mov eax, dword ptr [ebp+08h]
                                                    add eax, 04h
                                                    push eax
                                                    call 00007F28FC86233Dh
                                                    pop ecx
                                                    pop ecx
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    lea eax, dword ptr [ecx+04h]
                                                    mov dword ptr [ecx], 0049FDD0h
                                                    push eax
                                                    call 00007F28FC862388h
                                                    pop ecx
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    mov esi, ecx
                                                    lea eax, dword ptr [esi+04h]
                                                    mov dword ptr [esi], 0049FDD0h
                                                    push eax
                                                    call 00007F28FC862371h
                                                    test byte ptr [ebp+08h], 00000001h
                                                    pop ecx
                                                    Programming Language:
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x74bcc.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1490000x7594.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xd40000x74bcc0x74c00bed47b6405bed921e1b351c80469b2f5False0.6035490832441114data6.350362065560363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x1490000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                    RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                    RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                    RT_ICON0xd47d00x33428Device independent bitmap graphic, 198 x 512 x 32, image size 202752, resolution 7874 x 7874 px/mEnglishGreat Britain0.13495903981710802
                                                    RT_MENU0x107bf80x50dataEnglishGreat Britain0.9
                                                    RT_STRING0x107c480x594dataEnglishGreat Britain0.3333333333333333
                                                    RT_STRING0x1081dc0x68adataEnglishGreat Britain0.2735961768219833
                                                    RT_STRING0x1088680x490dataEnglishGreat Britain0.3715753424657534
                                                    RT_STRING0x108cf80x5fcdataEnglishGreat Britain0.3087467362924282
                                                    RT_STRING0x1092f40x65cdataEnglishGreat Britain0.34336609336609336
                                                    RT_STRING0x1099500x466dataEnglishGreat Britain0.3605683836589698
                                                    RT_STRING0x109db80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                    RT_RCDATA0x109f100x3e79edata1.0003360661503231
                                                    RT_GROUP_ICON0x1486b00x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x1486c40x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x1486d80x14dataEnglishGreat Britain1.15
                                                    RT_GROUP_ICON0x1486ec0x14dataEnglishGreat Britain1.25
                                                    RT_VERSION0x1487000xdcdataEnglishGreat Britain0.6181818181818182
                                                    RT_MANIFEST0x1487dc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                    DLLImport
                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                    PSAPI.DLLGetProcessMemoryInfo
                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                    UxTheme.dllIsThemeActive
                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishGreat Britain
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2025-01-15T18:09:06.923625+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649710132.226.247.7380TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 15, 2025 18:09:05.963357925 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:09:05.968194962 CET8049710132.226.247.73192.168.2.6
                                                    Jan 15, 2025 18:09:05.968274117 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:09:05.968671083 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:09:05.973433971 CET8049710132.226.247.73192.168.2.6
                                                    Jan 15, 2025 18:09:06.661544085 CET8049710132.226.247.73192.168.2.6
                                                    Jan 15, 2025 18:09:06.666459084 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:09:06.671286106 CET8049710132.226.247.73192.168.2.6
                                                    Jan 15, 2025 18:09:06.879221916 CET8049710132.226.247.73192.168.2.6
                                                    Jan 15, 2025 18:09:06.891393900 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:06.891452074 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:06.891525030 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:06.901324987 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:06.901349068 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:06.923624992 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:09:07.390995026 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:07.391280890 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:07.396121025 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:07.396158934 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:07.396581888 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:07.439363956 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:07.452600002 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:07.495362043 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:07.612427950 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:07.612495899 CET44349712104.21.96.1192.168.2.6
                                                    Jan 15, 2025 18:09:07.612592936 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:09:07.619805098 CET49712443192.168.2.6104.21.96.1
                                                    Jan 15, 2025 18:10:11.879041910 CET8049710132.226.247.73192.168.2.6
                                                    Jan 15, 2025 18:10:11.879254103 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:10:46.892849922 CET4971080192.168.2.6132.226.247.73
                                                    Jan 15, 2025 18:10:46.897658110 CET8049710132.226.247.73192.168.2.6
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 15, 2025 18:09:05.714477062 CET5405253192.168.2.61.1.1.1
                                                    Jan 15, 2025 18:09:05.721187115 CET53540521.1.1.1192.168.2.6
                                                    Jan 15, 2025 18:09:06.881403923 CET6252953192.168.2.61.1.1.1
                                                    Jan 15, 2025 18:09:06.890608072 CET53625291.1.1.1192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jan 15, 2025 18:09:05.714477062 CET192.168.2.61.1.1.10xd4eeStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.881403923 CET192.168.2.61.1.1.10x4655Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jan 15, 2025 18:09:05.721187115 CET1.1.1.1192.168.2.60xd4eeNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                    Jan 15, 2025 18:09:05.721187115 CET1.1.1.1192.168.2.60xd4eeNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:05.721187115 CET1.1.1.1192.168.2.60xd4eeNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:05.721187115 CET1.1.1.1192.168.2.60xd4eeNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:05.721187115 CET1.1.1.1192.168.2.60xd4eeNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:05.721187115 CET1.1.1.1192.168.2.60xd4eeNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                    Jan 15, 2025 18:09:06.890608072 CET1.1.1.1192.168.2.60x4655No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                    • reallyfreegeoip.org
                                                    • checkip.dyndns.org
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.649710132.226.247.73806808C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 15, 2025 18:09:05.968671083 CET151OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                    Host: checkip.dyndns.org
                                                    Connection: Keep-Alive
                                                    Jan 15, 2025 18:09:06.661544085 CET273INHTTP/1.1 200 OK
                                                    Date: Wed, 15 Jan 2025 17:09:06 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 104
                                                    Connection: keep-alive
                                                    Cache-Control: no-cache
                                                    Pragma: no-cache
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                    Jan 15, 2025 18:09:06.666459084 CET127OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                    Host: checkip.dyndns.org
                                                    Jan 15, 2025 18:09:06.879221916 CET273INHTTP/1.1 200 OK
                                                    Date: Wed, 15 Jan 2025 17:09:06 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 104
                                                    Connection: keep-alive
                                                    Cache-Control: no-cache
                                                    Pragma: no-cache
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.649712104.21.96.14436808C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-01-15 17:09:07 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                    Host: reallyfreegeoip.org
                                                    Connection: Keep-Alive
                                                    2025-01-15 17:09:07 UTC863INHTTP/1.1 200 OK
                                                    Date: Wed, 15 Jan 2025 17:09:07 GMT
                                                    Content-Type: text/xml
                                                    Content-Length: 362
                                                    Connection: close
                                                    Age: 2275736
                                                    Cache-Control: max-age=31536000
                                                    cf-cache-status: HIT
                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e0%2FzWAFzXT%2BDvESJAYBTEOWdl907BVSJWCPObbnP07e%2FR7R2aMkzzMFtWGwSwErgthjQuda4j6e1K5i2CnrLgzHyAfW9ukTERoFJO%2B7IYmGV%2Fr6Ukc%2Bnp4A82C%2BiSsifLVFcgBiK"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 902778c2084c72a4-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1975&min_rtt=1970&rtt_var=749&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1451292&cwnd=212&unsent_bytes=0&cid=2b99a85e23aff3be&ts=238&x=0"
                                                    2025-01-15 17:09:07 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:12:09:03
                                                    Start date:15/01/2025
                                                    Path:C:\Users\user\Desktop\NEWORDER.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\NEWORDER.exe"
                                                    Imagebase:0x620000
                                                    File size:1'357'312 bytes
                                                    MD5 hash:53AE35AE01C79A16ECA864EE78A086EF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.2188859928.0000000001110000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:12:09:04
                                                    Start date:15/01/2025
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\NEWORDER.exe"
                                                    Imagebase:0xb20000
                                                    File size:45'984 bytes
                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3406953590.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3407838999.0000000002F86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:2.8%
                                                      Dynamic/Decrypted Code Coverage:2.5%
                                                      Signature Coverage:3.4%
                                                      Total number of Nodes:1632
                                                      Total number of Limit Nodes:43
                                                      execution_graph 94781 622de3 94782 622df0 __wsopen_s 94781->94782 94783 622e09 94782->94783 94784 662c2b ___scrt_fastfail 94782->94784 94797 623aa2 94783->94797 94787 662c47 GetOpenFileNameW 94784->94787 94789 662c96 94787->94789 94855 626b57 94789->94855 94793 662cab 94793->94793 94794 622e27 94825 6244a8 94794->94825 94867 661f50 94797->94867 94800 623ae9 94873 62a6c3 94800->94873 94801 623ace 94802 626b57 22 API calls 94801->94802 94804 623ada 94802->94804 94869 6237a0 94804->94869 94807 622da5 94808 661f50 __wsopen_s 94807->94808 94809 622db2 GetLongPathNameW 94808->94809 94810 626b57 22 API calls 94809->94810 94811 622dda 94810->94811 94812 623598 94811->94812 94924 62a961 94812->94924 94815 623aa2 23 API calls 94816 6235b5 94815->94816 94817 6235c0 94816->94817 94818 6632eb 94816->94818 94929 62515f 94817->94929 94823 66330d 94818->94823 94941 63ce60 41 API calls 94818->94941 94824 6235df 94824->94794 94942 624ecb 94825->94942 94828 663833 94964 692cf9 94828->94964 94829 624ecb 94 API calls 94831 6244e1 94829->94831 94831->94828 94833 6244e9 94831->94833 94832 663848 94834 66384c 94832->94834 94835 663869 94832->94835 94837 663854 94833->94837 94838 6244f5 94833->94838 95014 624f39 94834->95014 94836 63fe0b 22 API calls 94835->94836 94854 6638ae 94836->94854 95020 68da5a 82 API calls 94837->95020 95013 62940c 136 API calls 2 library calls 94838->95013 94842 622e31 94843 663862 94843->94835 94844 663a5f 94849 663a67 94844->94849 94845 624f39 68 API calls 94845->94849 94849->94845 95022 68989b 82 API calls __wsopen_s 94849->95022 94851 629cb3 22 API calls 94851->94854 94854->94844 94854->94849 94854->94851 94990 68967e 94854->94990 94993 690b5a 94854->94993 94999 62a4a1 94854->94999 95007 623ff7 94854->95007 95021 6895ad 42 API calls _wcslen 94854->95021 94856 626b67 _wcslen 94855->94856 94857 664ba1 94855->94857 94860 626ba2 94856->94860 94861 626b7d 94856->94861 94858 6293b2 22 API calls 94857->94858 94859 664baa 94858->94859 94859->94859 94863 63fddb 22 API calls 94860->94863 95343 626f34 22 API calls 94861->95343 94865 626bae 94863->94865 94864 626b85 __fread_nolock 94864->94793 94866 63fe0b 22 API calls 94865->94866 94866->94864 94868 623aaf GetFullPathNameW 94867->94868 94868->94800 94868->94801 94870 6237ae 94869->94870 94879 6293b2 94870->94879 94872 622e12 94872->94807 94874 62a6d0 94873->94874 94875 62a6dd 94873->94875 94874->94804 94876 63fddb 22 API calls 94875->94876 94877 62a6e7 94876->94877 94878 63fe0b 22 API calls 94877->94878 94878->94874 94880 6293c0 94879->94880 94882 6293c9 __fread_nolock 94879->94882 94880->94882 94883 62aec9 94880->94883 94882->94872 94884 62aed9 __fread_nolock 94883->94884 94885 62aedc 94883->94885 94884->94882 94889 63fddb 94885->94889 94887 62aee7 94899 63fe0b 94887->94899 94891 63fde0 94889->94891 94892 63fdfa 94891->94892 94894 63fdfc 94891->94894 94909 64ea0c 94891->94909 94916 644ead 7 API calls 2 library calls 94891->94916 94892->94887 94895 64066d 94894->94895 94917 6432a4 RaiseException 94894->94917 94918 6432a4 RaiseException 94895->94918 94898 64068a 94898->94887 94901 63fddb 94899->94901 94900 64ea0c ___std_exception_copy 21 API calls 94900->94901 94901->94900 94902 63fdfa 94901->94902 94904 63fdfc 94901->94904 94921 644ead 7 API calls 2 library calls 94901->94921 94902->94884 94905 64066d 94904->94905 94922 6432a4 RaiseException 94904->94922 94923 6432a4 RaiseException 94905->94923 94908 64068a 94908->94884 94914 653820 _abort 94909->94914 94910 65385e 94920 64f2d9 20 API calls _abort 94910->94920 94912 653849 RtlAllocateHeap 94913 65385c 94912->94913 94912->94914 94913->94891 94914->94910 94914->94912 94919 644ead 7 API calls 2 library calls 94914->94919 94916->94891 94917->94895 94918->94898 94919->94914 94920->94913 94921->94901 94922->94905 94923->94908 94925 63fe0b 22 API calls 94924->94925 94926 62a976 94925->94926 94927 63fddb 22 API calls 94926->94927 94928 6235aa 94927->94928 94928->94815 94930 62516e 94929->94930 94934 62518f __fread_nolock 94929->94934 94933 63fe0b 22 API calls 94930->94933 94931 63fddb 22 API calls 94932 6235cc 94931->94932 94935 6235f3 94932->94935 94933->94934 94934->94931 94936 623605 94935->94936 94940 623624 __fread_nolock 94935->94940 94938 63fe0b 22 API calls 94936->94938 94937 63fddb 22 API calls 94939 62363b 94937->94939 94938->94940 94939->94824 94940->94937 94941->94818 95023 624e90 LoadLibraryA 94942->95023 94947 624ef6 LoadLibraryExW 95031 624e59 LoadLibraryA 94947->95031 94948 663ccf 94950 624f39 68 API calls 94948->94950 94952 663cd6 94950->94952 94953 624e59 3 API calls 94952->94953 94955 663cde 94953->94955 95053 6250f5 94955->95053 94956 624f20 94956->94955 94957 624f2c 94956->94957 94959 624f39 68 API calls 94957->94959 94961 6244cd 94959->94961 94961->94828 94961->94829 94963 663d05 94965 692d15 94964->94965 94966 62511f 64 API calls 94965->94966 94967 692d29 94966->94967 95203 692e66 94967->95203 94970 6250f5 40 API calls 94971 692d56 94970->94971 94972 6250f5 40 API calls 94971->94972 94973 692d66 94972->94973 94974 6250f5 40 API calls 94973->94974 94975 692d81 94974->94975 94976 6250f5 40 API calls 94975->94976 94977 692d9c 94976->94977 94978 62511f 64 API calls 94977->94978 94979 692db3 94978->94979 94980 64ea0c ___std_exception_copy 21 API calls 94979->94980 94981 692dba 94980->94981 94982 64ea0c ___std_exception_copy 21 API calls 94981->94982 94983 692dc4 94982->94983 94984 6250f5 40 API calls 94983->94984 94985 692dd8 94984->94985 94986 6928fe 27 API calls 94985->94986 94987 692dee 94986->94987 94989 692d3f 94987->94989 95209 6922ce 79 API calls 94987->95209 94989->94832 94991 63fe0b 22 API calls 94990->94991 94992 6896ae __fread_nolock 94991->94992 94992->94854 94994 690b65 94993->94994 94995 63fddb 22 API calls 94994->94995 94996 690b7c 94995->94996 95210 629cb3 94996->95210 95001 62a52b 94999->95001 95005 62a4b1 __fread_nolock 94999->95005 95000 63fddb 22 API calls 95002 62a4b8 95000->95002 95003 63fe0b 22 API calls 95001->95003 95004 63fddb 22 API calls 95002->95004 95006 62a4d6 95002->95006 95003->95005 95004->95006 95005->95000 95006->94854 95008 62400a 95007->95008 95012 6240ae 95007->95012 95009 63fe0b 22 API calls 95008->95009 95011 62403c 95008->95011 95009->95011 95010 63fddb 22 API calls 95010->95011 95011->95010 95011->95012 95012->94854 95013->94842 95015 624f43 95014->95015 95016 624f4a 95014->95016 95216 64e678 95015->95216 95018 624f6a FreeLibrary 95016->95018 95019 624f59 95016->95019 95018->95019 95019->94837 95020->94843 95021->94854 95022->94849 95024 624ec6 95023->95024 95025 624ea8 GetProcAddress 95023->95025 95028 64e5eb 95024->95028 95026 624eb8 95025->95026 95026->95024 95027 624ebf FreeLibrary 95026->95027 95027->95024 95061 64e52a 95028->95061 95030 624eea 95030->94947 95030->94948 95032 624e6e GetProcAddress 95031->95032 95033 624e8d 95031->95033 95034 624e7e 95032->95034 95036 624f80 95033->95036 95034->95033 95035 624e86 FreeLibrary 95034->95035 95035->95033 95037 63fe0b 22 API calls 95036->95037 95038 624f95 95037->95038 95129 625722 95038->95129 95040 624fa1 __fread_nolock 95041 624fdc 95040->95041 95042 6250a5 95040->95042 95043 663d1d 95040->95043 95046 663d22 95041->95046 95047 6250f5 40 API calls 95041->95047 95052 62506e ISource 95041->95052 95138 62511f 95041->95138 95132 6242a2 CreateStreamOnHGlobal 95042->95132 95143 69304d 74 API calls 95043->95143 95048 62511f 64 API calls 95046->95048 95047->95041 95049 663d45 95048->95049 95050 6250f5 40 API calls 95049->95050 95050->95052 95052->94956 95054 625107 95053->95054 95055 663d70 95053->95055 95165 64e8c4 95054->95165 95058 6928fe 95186 69274e 95058->95186 95060 692919 95060->94963 95064 64e536 BuildCatchObjectHelperInternal 95061->95064 95062 64e544 95086 64f2d9 20 API calls _abort 95062->95086 95064->95062 95066 64e574 95064->95066 95065 64e549 95087 6527ec 26 API calls _abort 95065->95087 95068 64e586 95066->95068 95069 64e579 95066->95069 95078 658061 95068->95078 95088 64f2d9 20 API calls _abort 95069->95088 95072 64e58f 95073 64e595 95072->95073 95074 64e5a2 95072->95074 95089 64f2d9 20 API calls _abort 95073->95089 95090 64e5d4 LeaveCriticalSection __fread_nolock 95074->95090 95076 64e554 __wsopen_s 95076->95030 95079 65806d BuildCatchObjectHelperInternal 95078->95079 95091 652f5e EnterCriticalSection 95079->95091 95081 65807b 95092 6580fb 95081->95092 95085 6580ac __wsopen_s 95085->95072 95086->95065 95087->95076 95088->95076 95089->95076 95090->95076 95091->95081 95100 65811e 95092->95100 95093 658088 95105 6580b7 95093->95105 95094 658177 95110 654c7d 95094->95110 95099 658189 95099->95093 95123 653405 11 API calls 2 library calls 95099->95123 95100->95093 95100->95094 95108 64918d EnterCriticalSection 95100->95108 95109 6491a1 LeaveCriticalSection 95100->95109 95102 6581a8 95124 64918d EnterCriticalSection 95102->95124 95128 652fa6 LeaveCriticalSection 95105->95128 95107 6580be 95107->95085 95108->95100 95109->95100 95116 654c8a _abort 95110->95116 95111 654cca 95126 64f2d9 20 API calls _abort 95111->95126 95112 654cb5 RtlAllocateHeap 95114 654cc8 95112->95114 95112->95116 95117 6529c8 95114->95117 95116->95111 95116->95112 95125 644ead 7 API calls 2 library calls 95116->95125 95118 6529d3 RtlFreeHeap 95117->95118 95122 6529fc __dosmaperr 95117->95122 95119 6529e8 95118->95119 95118->95122 95127 64f2d9 20 API calls _abort 95119->95127 95121 6529ee GetLastError 95121->95122 95122->95099 95123->95102 95124->95093 95125->95116 95126->95114 95127->95121 95128->95107 95130 63fddb 22 API calls 95129->95130 95131 625734 95130->95131 95131->95040 95133 6242d9 95132->95133 95134 6242bc FindResourceExW 95132->95134 95133->95041 95134->95133 95135 6635ba LoadResource 95134->95135 95135->95133 95136 6635cf SizeofResource 95135->95136 95136->95133 95137 6635e3 LockResource 95136->95137 95137->95133 95139 663d90 95138->95139 95140 62512e 95138->95140 95144 64ece3 95140->95144 95143->95046 95147 64eaaa 95144->95147 95146 62513c 95146->95041 95150 64eab6 BuildCatchObjectHelperInternal 95147->95150 95148 64eac2 95160 64f2d9 20 API calls _abort 95148->95160 95150->95148 95151 64eae8 95150->95151 95162 64918d EnterCriticalSection 95151->95162 95152 64eac7 95161 6527ec 26 API calls _abort 95152->95161 95155 64eaf4 95163 64ec0a 62 API calls 2 library calls 95155->95163 95157 64eb08 95164 64eb27 LeaveCriticalSection __fread_nolock 95157->95164 95159 64ead2 __wsopen_s 95159->95146 95160->95152 95161->95159 95162->95155 95163->95157 95164->95159 95168 64e8e1 95165->95168 95167 625118 95167->95058 95169 64e8ed BuildCatchObjectHelperInternal 95168->95169 95170 64e92d 95169->95170 95171 64e925 __wsopen_s 95169->95171 95173 64e900 ___scrt_fastfail 95169->95173 95183 64918d EnterCriticalSection 95170->95183 95171->95167 95181 64f2d9 20 API calls _abort 95173->95181 95174 64e937 95184 64e6f8 38 API calls 4 library calls 95174->95184 95177 64e91a 95182 6527ec 26 API calls _abort 95177->95182 95178 64e94e 95185 64e96c LeaveCriticalSection __fread_nolock 95178->95185 95181->95177 95182->95171 95183->95174 95184->95178 95185->95171 95189 64e4e8 95186->95189 95188 69275d 95188->95060 95192 64e469 95189->95192 95191 64e505 95191->95188 95193 64e48c 95192->95193 95194 64e478 95192->95194 95198 64e488 __alldvrm 95193->95198 95202 65333f 11 API calls 2 library calls 95193->95202 95200 64f2d9 20 API calls _abort 95194->95200 95197 64e47d 95201 6527ec 26 API calls _abort 95197->95201 95198->95191 95200->95197 95201->95198 95202->95198 95208 692e7a 95203->95208 95204 6250f5 40 API calls 95204->95208 95205 692d3b 95205->94970 95205->94989 95206 6928fe 27 API calls 95206->95208 95207 62511f 64 API calls 95207->95208 95208->95204 95208->95205 95208->95206 95208->95207 95209->94989 95211 629cc2 _wcslen 95210->95211 95212 63fe0b 22 API calls 95211->95212 95213 629cea __fread_nolock 95212->95213 95214 63fddb 22 API calls 95213->95214 95215 629d00 95214->95215 95215->94854 95217 64e684 BuildCatchObjectHelperInternal 95216->95217 95218 64e695 95217->95218 95219 64e6aa 95217->95219 95229 64f2d9 20 API calls _abort 95218->95229 95228 64e6a5 __wsopen_s 95219->95228 95231 64918d EnterCriticalSection 95219->95231 95221 64e69a 95230 6527ec 26 API calls _abort 95221->95230 95224 64e6c6 95232 64e602 95224->95232 95226 64e6d1 95248 64e6ee LeaveCriticalSection __fread_nolock 95226->95248 95228->95016 95229->95221 95230->95228 95231->95224 95233 64e624 95232->95233 95234 64e60f 95232->95234 95240 64e61f 95233->95240 95251 64dc0b 95233->95251 95249 64f2d9 20 API calls _abort 95234->95249 95236 64e614 95250 6527ec 26 API calls _abort 95236->95250 95240->95226 95244 64e646 95268 65862f 95244->95268 95247 6529c8 _free 20 API calls 95247->95240 95248->95228 95249->95236 95250->95240 95252 64dc23 95251->95252 95253 64dc1f 95251->95253 95252->95253 95254 64d955 __fread_nolock 26 API calls 95252->95254 95257 654d7a 95253->95257 95255 64dc43 95254->95255 95283 6559be 62 API calls 4 library calls 95255->95283 95258 64e640 95257->95258 95259 654d90 95257->95259 95261 64d955 95258->95261 95259->95258 95260 6529c8 _free 20 API calls 95259->95260 95260->95258 95262 64d976 95261->95262 95263 64d961 95261->95263 95262->95244 95284 64f2d9 20 API calls _abort 95263->95284 95265 64d966 95285 6527ec 26 API calls _abort 95265->95285 95267 64d971 95267->95244 95269 658653 95268->95269 95270 65863e 95268->95270 95272 65868e 95269->95272 95276 65867a 95269->95276 95286 64f2c6 20 API calls _abort 95270->95286 95291 64f2c6 20 API calls _abort 95272->95291 95273 658643 95287 64f2d9 20 API calls _abort 95273->95287 95288 658607 95276->95288 95277 658693 95292 64f2d9 20 API calls _abort 95277->95292 95280 65869b 95293 6527ec 26 API calls _abort 95280->95293 95281 64e64c 95281->95240 95281->95247 95283->95253 95284->95265 95285->95267 95286->95273 95287->95281 95294 658585 95288->95294 95290 65862b 95290->95281 95291->95277 95292->95280 95293->95281 95295 658591 BuildCatchObjectHelperInternal 95294->95295 95305 655147 EnterCriticalSection 95295->95305 95297 65859f 95298 6585c6 95297->95298 95299 6585d1 95297->95299 95306 6586ae 95298->95306 95321 64f2d9 20 API calls _abort 95299->95321 95302 6585cc 95322 6585fb LeaveCriticalSection __wsopen_s 95302->95322 95304 6585ee __wsopen_s 95304->95290 95305->95297 95323 6553c4 95306->95323 95308 6586c4 95336 655333 21 API calls 2 library calls 95308->95336 95309 6586be 95309->95308 95311 6553c4 __wsopen_s 26 API calls 95309->95311 95320 6586f6 95309->95320 95315 6586ed 95311->95315 95312 6553c4 __wsopen_s 26 API calls 95316 658702 CloseHandle 95312->95316 95313 65871c 95314 65873e 95313->95314 95337 64f2a3 20 API calls __dosmaperr 95313->95337 95314->95302 95318 6553c4 __wsopen_s 26 API calls 95315->95318 95316->95308 95319 65870e GetLastError 95316->95319 95318->95320 95319->95308 95320->95308 95320->95312 95321->95302 95322->95304 95324 6553e6 95323->95324 95325 6553d1 95323->95325 95329 65540b 95324->95329 95340 64f2c6 20 API calls _abort 95324->95340 95338 64f2c6 20 API calls _abort 95325->95338 95328 6553d6 95339 64f2d9 20 API calls _abort 95328->95339 95329->95309 95330 655416 95341 64f2d9 20 API calls _abort 95330->95341 95333 6553de 95333->95309 95334 65541e 95342 6527ec 26 API calls _abort 95334->95342 95336->95313 95337->95314 95338->95328 95339->95333 95340->95330 95341->95334 95342->95333 95343->94864 95344 662ba5 95345 622b25 95344->95345 95346 662baf 95344->95346 95372 622b83 7 API calls 95345->95372 95387 623a5a 95346->95387 95350 662bb8 95351 629cb3 22 API calls 95350->95351 95353 662bc6 95351->95353 95355 662bf5 95353->95355 95356 662bce 95353->95356 95354 622b2f 95360 622b44 95354->95360 95376 623837 95354->95376 95358 6233c6 22 API calls 95355->95358 95394 6233c6 95356->95394 95362 662bf1 GetForegroundWindow ShellExecuteW 95358->95362 95363 622b5f 95360->95363 95386 6230f2 Shell_NotifyIconW ___scrt_fastfail 95360->95386 95368 662c26 95362->95368 95369 622b66 SetCurrentDirectoryW 95363->95369 95368->95363 95371 622b7a 95369->95371 95370 6233c6 22 API calls 95370->95362 95412 622cd4 7 API calls 95372->95412 95374 622b2a 95375 622c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95374->95375 95375->95354 95377 623862 ___scrt_fastfail 95376->95377 95413 624212 95377->95413 95380 6238e8 95382 663386 Shell_NotifyIconW 95380->95382 95383 623906 Shell_NotifyIconW 95380->95383 95417 623923 95383->95417 95385 62391c 95385->95360 95386->95363 95388 661f50 __wsopen_s 95387->95388 95389 623a67 GetModuleFileNameW 95388->95389 95390 629cb3 22 API calls 95389->95390 95391 623a8d 95390->95391 95392 623aa2 23 API calls 95391->95392 95393 623a97 95392->95393 95393->95350 95395 6630bb 95394->95395 95396 6233dd 95394->95396 95398 63fddb 22 API calls 95395->95398 95449 6233ee 95396->95449 95400 6630c5 _wcslen 95398->95400 95399 6233e8 95403 626350 95399->95403 95401 63fe0b 22 API calls 95400->95401 95402 6630fe __fread_nolock 95401->95402 95404 626362 95403->95404 95405 664a51 95403->95405 95464 626373 95404->95464 95474 624a88 22 API calls __fread_nolock 95405->95474 95408 664a5b 95410 664a67 95408->95410 95411 62a8c7 22 API calls 95408->95411 95409 62636e 95409->95370 95411->95410 95412->95374 95414 6635a4 95413->95414 95415 6238b7 95413->95415 95414->95415 95416 6635ad DestroyIcon 95414->95416 95415->95380 95439 68c874 42 API calls _strftime 95415->95439 95416->95415 95418 623a13 95417->95418 95419 62393f 95417->95419 95418->95385 95440 626270 95419->95440 95422 663393 LoadStringW 95425 6633ad 95422->95425 95423 62395a 95424 626b57 22 API calls 95423->95424 95426 62396f 95424->95426 95433 623994 ___scrt_fastfail 95425->95433 95445 62a8c7 95425->95445 95427 62397c 95426->95427 95428 6633c9 95426->95428 95427->95425 95430 623986 95427->95430 95431 626350 22 API calls 95428->95431 95432 626350 22 API calls 95430->95432 95434 6633d7 95431->95434 95432->95433 95436 6239f9 Shell_NotifyIconW 95433->95436 95434->95433 95435 6233c6 22 API calls 95434->95435 95437 6633f9 95435->95437 95436->95418 95438 6233c6 22 API calls 95437->95438 95438->95433 95439->95380 95441 63fe0b 22 API calls 95440->95441 95442 626295 95441->95442 95443 63fddb 22 API calls 95442->95443 95444 62394d 95443->95444 95444->95422 95444->95423 95446 62a8ea __fread_nolock 95445->95446 95447 62a8db 95445->95447 95446->95433 95447->95446 95448 63fe0b 22 API calls 95447->95448 95448->95446 95450 6233fe _wcslen 95449->95450 95451 623411 95450->95451 95452 66311d 95450->95452 95459 62a587 95451->95459 95454 63fddb 22 API calls 95452->95454 95456 663127 95454->95456 95455 62341e __fread_nolock 95455->95399 95457 63fe0b 22 API calls 95456->95457 95458 663157 __fread_nolock 95457->95458 95460 62a59d 95459->95460 95463 62a598 __fread_nolock 95459->95463 95461 63fe0b 22 API calls 95460->95461 95462 66f80f 95460->95462 95461->95463 95463->95455 95465 6263b6 __fread_nolock 95464->95465 95466 626382 95464->95466 95465->95409 95466->95465 95467 664a82 95466->95467 95468 6263a9 95466->95468 95470 63fddb 22 API calls 95467->95470 95469 62a587 22 API calls 95468->95469 95469->95465 95471 664a91 95470->95471 95472 63fe0b 22 API calls 95471->95472 95473 664ac5 __fread_nolock 95472->95473 95474->95408 95475 673a41 95479 6910c0 95475->95479 95477 673a4c 95478 6910c0 53 API calls 95477->95478 95478->95477 95484 6910cd 95479->95484 95489 6910fa 95479->95489 95480 6910fc 95514 63fa11 53 API calls 95480->95514 95482 691101 95490 627510 95482->95490 95484->95480 95484->95482 95487 6910f4 95484->95487 95484->95489 95486 626350 22 API calls 95486->95489 95513 62b270 39 API calls 95487->95513 95489->95477 95491 627522 95490->95491 95492 627525 95490->95492 95491->95486 95493 62755b 95492->95493 95494 62752d 95492->95494 95496 6650f6 95493->95496 95499 62756d 95493->95499 95504 66500f 95493->95504 95515 6451c6 26 API calls 95494->95515 95518 645183 26 API calls 95496->95518 95497 62753d 95503 63fddb 22 API calls 95497->95503 95516 63fb21 51 API calls 95499->95516 95500 66510e 95500->95500 95505 627547 95503->95505 95507 63fe0b 22 API calls 95504->95507 95512 665088 95504->95512 95506 629cb3 22 API calls 95505->95506 95506->95491 95508 665058 95507->95508 95509 63fddb 22 API calls 95508->95509 95510 66507f 95509->95510 95511 629cb3 22 API calls 95510->95511 95511->95512 95517 63fb21 51 API calls 95512->95517 95513->95489 95514->95482 95515->95497 95516->95497 95517->95496 95518->95500 95519 621044 95524 6210f3 95519->95524 95521 62104a 95560 6400a3 29 API calls __onexit 95521->95560 95523 621054 95561 621398 95524->95561 95528 62116a 95529 62a961 22 API calls 95528->95529 95530 621174 95529->95530 95531 62a961 22 API calls 95530->95531 95532 62117e 95531->95532 95533 62a961 22 API calls 95532->95533 95534 621188 95533->95534 95535 62a961 22 API calls 95534->95535 95536 6211c6 95535->95536 95537 62a961 22 API calls 95536->95537 95538 621292 95537->95538 95571 62171c 95538->95571 95542 6212c4 95543 62a961 22 API calls 95542->95543 95544 6212ce 95543->95544 95592 631940 95544->95592 95546 6212f9 95602 621aab 95546->95602 95548 621315 95549 621325 GetStdHandle 95548->95549 95550 662485 95549->95550 95551 62137a 95549->95551 95550->95551 95552 66248e 95550->95552 95554 621387 OleInitialize 95551->95554 95553 63fddb 22 API calls 95552->95553 95555 662495 95553->95555 95554->95521 95609 69011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95555->95609 95557 66249e 95610 690944 CreateThread 95557->95610 95559 6624aa CloseHandle 95559->95551 95560->95523 95611 6213f1 95561->95611 95564 6213f1 22 API calls 95565 6213d0 95564->95565 95566 62a961 22 API calls 95565->95566 95567 6213dc 95566->95567 95568 626b57 22 API calls 95567->95568 95569 621129 95568->95569 95570 621bc3 6 API calls 95569->95570 95570->95528 95572 62a961 22 API calls 95571->95572 95573 62172c 95572->95573 95574 62a961 22 API calls 95573->95574 95575 621734 95574->95575 95576 62a961 22 API calls 95575->95576 95577 62174f 95576->95577 95578 63fddb 22 API calls 95577->95578 95579 62129c 95578->95579 95580 621b4a 95579->95580 95581 621b58 95580->95581 95582 62a961 22 API calls 95581->95582 95583 621b63 95582->95583 95584 62a961 22 API calls 95583->95584 95585 621b6e 95584->95585 95586 62a961 22 API calls 95585->95586 95587 621b79 95586->95587 95588 62a961 22 API calls 95587->95588 95589 621b84 95588->95589 95590 63fddb 22 API calls 95589->95590 95591 621b96 RegisterWindowMessageW 95590->95591 95591->95542 95593 631981 95592->95593 95594 63195d 95592->95594 95618 640242 5 API calls __Init_thread_wait 95593->95618 95601 63196e 95594->95601 95620 640242 5 API calls __Init_thread_wait 95594->95620 95597 63198b 95597->95594 95619 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95597->95619 95598 638727 95598->95601 95621 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95598->95621 95601->95546 95603 621abb 95602->95603 95604 66272d 95602->95604 95605 63fddb 22 API calls 95603->95605 95622 693209 23 API calls 95604->95622 95608 621ac3 95605->95608 95607 662738 95608->95548 95609->95557 95610->95559 95623 69092a 28 API calls 95610->95623 95612 62a961 22 API calls 95611->95612 95613 6213fc 95612->95613 95614 62a961 22 API calls 95613->95614 95615 621404 95614->95615 95616 62a961 22 API calls 95615->95616 95617 6213c6 95616->95617 95617->95564 95618->95597 95619->95594 95620->95598 95621->95601 95622->95607 95624 672a00 95639 62d7b0 ISource 95624->95639 95625 62db11 PeekMessageW 95625->95639 95626 62d807 GetInputState 95626->95625 95626->95639 95628 671cbe TranslateAcceleratorW 95628->95639 95629 62da04 timeGetTime 95629->95639 95630 62db73 TranslateMessage DispatchMessageW 95631 62db8f PeekMessageW 95630->95631 95631->95639 95632 62dbaf Sleep 95654 62dbc0 95632->95654 95633 672b74 Sleep 95633->95654 95634 63e551 timeGetTime 95634->95654 95635 671dda timeGetTime 95745 63e300 23 API calls 95635->95745 95638 672c0b GetExitCodeProcess 95641 672c37 CloseHandle 95638->95641 95642 672c21 WaitForSingleObject 95638->95642 95639->95625 95639->95626 95639->95628 95639->95629 95639->95630 95639->95631 95639->95632 95639->95633 95639->95635 95644 62d9d5 95639->95644 95656 62dd50 95639->95656 95663 62dfd0 95639->95663 95686 631310 95639->95686 95743 62bf40 207 API calls 2 library calls 95639->95743 95744 63edf6 IsDialogMessageW GetClassLongW 95639->95744 95746 693a2a 23 API calls 95639->95746 95747 62ec40 95639->95747 95771 69359c 82 API calls __wsopen_s 95639->95771 95641->95654 95642->95639 95642->95641 95643 672a31 95643->95644 95645 6b29bf GetForegroundWindow 95645->95654 95646 672ca9 Sleep 95646->95639 95654->95634 95654->95638 95654->95639 95654->95643 95654->95644 95654->95645 95654->95646 95772 6a5658 23 API calls 95654->95772 95773 68e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95654->95773 95774 68d4dc 47 API calls 95654->95774 95657 62dd83 95656->95657 95658 62dd6f 95656->95658 95776 69359c 82 API calls __wsopen_s 95657->95776 95775 62d260 207 API calls 2 library calls 95658->95775 95661 62dd7a 95661->95639 95662 672f75 95662->95662 95664 62e010 95663->95664 95680 62e0dc ISource 95664->95680 95779 640242 5 API calls __Init_thread_wait 95664->95779 95667 672fca 95669 62a961 22 API calls 95667->95669 95667->95680 95668 62a961 22 API calls 95668->95680 95670 672fe4 95669->95670 95780 6400a3 29 API calls __onexit 95670->95780 95674 672fee 95781 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95674->95781 95678 62a8c7 22 API calls 95678->95680 95679 69359c 82 API calls 95679->95680 95680->95668 95680->95678 95680->95679 95681 62ec40 207 API calls 95680->95681 95682 62e3e1 95680->95682 95683 6304f0 22 API calls 95680->95683 95777 62a81b 41 API calls 95680->95777 95778 63a308 207 API calls 95680->95778 95782 640242 5 API calls __Init_thread_wait 95680->95782 95783 6400a3 29 API calls __onexit 95680->95783 95784 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95680->95784 95785 6a47d4 207 API calls 95680->95785 95786 6a68c1 207 API calls 95680->95786 95681->95680 95682->95639 95683->95680 95687 6317b0 95686->95687 95688 631376 95686->95688 95939 640242 5 API calls __Init_thread_wait 95687->95939 95689 631390 95688->95689 95690 676331 95688->95690 95692 631940 9 API calls 95689->95692 95898 6a709c 95690->95898 95695 6313a0 95692->95695 95694 6317ba 95697 6317fb 95694->95697 95698 629cb3 22 API calls 95694->95698 95699 631940 9 API calls 95695->95699 95696 67633d 95696->95639 95701 676346 95697->95701 95703 63182c 95697->95703 95706 6317d4 95698->95706 95700 6313b6 95699->95700 95700->95697 95702 6313ec 95700->95702 95944 69359c 82 API calls __wsopen_s 95701->95944 95702->95701 95726 631408 __fread_nolock 95702->95726 95941 62aceb 23 API calls ISource 95703->95941 95940 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95706->95940 95707 631839 95942 63d217 207 API calls 95707->95942 95710 67636e 95945 69359c 82 API calls __wsopen_s 95710->95945 95711 63152f 95713 6763d1 95711->95713 95714 63153c 95711->95714 95947 6a5745 54 API calls _wcslen 95713->95947 95716 631940 9 API calls 95714->95716 95717 631549 95716->95717 95721 6764fa 95717->95721 95723 631940 9 API calls 95717->95723 95718 63fddb 22 API calls 95718->95726 95719 631872 95943 63faeb 23 API calls 95719->95943 95720 63fe0b 22 API calls 95720->95726 95730 676369 95721->95730 95948 69359c 82 API calls __wsopen_s 95721->95948 95728 631563 95723->95728 95725 62ec40 207 API calls 95725->95726 95726->95707 95726->95710 95726->95711 95726->95718 95726->95720 95726->95725 95727 6763b2 95726->95727 95726->95730 95946 69359c 82 API calls __wsopen_s 95727->95946 95728->95721 95731 62a8c7 22 API calls 95728->95731 95733 6315c7 ISource 95728->95733 95730->95639 95731->95733 95732 631940 9 API calls 95732->95733 95733->95719 95733->95721 95733->95730 95733->95732 95735 63167b ISource 95733->95735 95787 626246 95733->95787 95791 6a958b 95733->95791 95794 69744a 95733->95794 95850 6983da 95733->95850 95853 69f0ec 95733->95853 95862 6ae204 95733->95862 95734 63171d 95734->95639 95735->95734 95938 63ce17 22 API calls ISource 95735->95938 95743->95639 95744->95639 95745->95639 95746->95639 95752 62ec76 ISource 95747->95752 95748 674beb 96217 69359c 82 API calls __wsopen_s 95748->96217 95750 63fddb 22 API calls 95750->95752 95752->95748 95752->95750 95753 674b0b 95752->95753 95754 62a8c7 22 API calls 95752->95754 95755 62ed9d ISource 95752->95755 95756 62f3ae ISource 95752->95756 95757 62fef7 95752->95757 95758 674600 95752->95758 95762 640242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95752->95762 95765 62fbe3 95752->95765 95766 62a961 22 API calls 95752->95766 95767 6400a3 29 API calls pre_c_initialization 95752->95767 95770 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95752->95770 96212 6301e0 207 API calls 2 library calls 95752->96212 96213 6306a0 41 API calls ISource 95752->96213 96215 69359c 82 API calls __wsopen_s 95753->96215 95754->95752 95755->95639 95756->95755 96214 69359c 82 API calls __wsopen_s 95756->96214 95757->95755 95761 62a8c7 22 API calls 95757->95761 95758->95755 95763 62a8c7 22 API calls 95758->95763 95761->95755 95762->95752 95763->95755 95765->95755 95765->95756 95768 674bdc 95765->95768 95766->95752 95767->95752 96216 69359c 82 API calls __wsopen_s 95768->96216 95770->95752 95771->95639 95772->95654 95773->95654 95774->95654 95775->95661 95776->95662 95777->95680 95778->95680 95779->95667 95780->95674 95781->95680 95782->95680 95783->95680 95784->95680 95785->95680 95786->95680 95788 626250 95787->95788 95789 62625f 95787->95789 95788->95733 95789->95788 95790 626264 CloseHandle 95789->95790 95790->95788 95949 6a7f59 95791->95949 95793 6a959b 95793->95733 95795 697469 95794->95795 95796 697474 95794->95796 96050 62b567 39 API calls 95795->96050 95799 62a961 22 API calls 95796->95799 95831 697554 95796->95831 95798 63fddb 22 API calls 95800 697587 95798->95800 95801 697495 95799->95801 95802 63fe0b 22 API calls 95800->95802 95803 62a961 22 API calls 95801->95803 95804 697598 95802->95804 95805 69749e 95803->95805 95806 626246 CloseHandle 95804->95806 95807 627510 53 API calls 95805->95807 95808 6975a3 95806->95808 95809 6974aa 95807->95809 95810 62a961 22 API calls 95808->95810 96051 62525f 22 API calls 95809->96051 95812 6975ab 95810->95812 95813 626246 CloseHandle 95812->95813 95815 6975b2 95813->95815 95814 6974bf 95816 626350 22 API calls 95814->95816 95817 627510 53 API calls 95815->95817 95818 6974f2 95816->95818 95819 6975be 95817->95819 95820 69754a 95818->95820 96052 68d4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 95818->96052 95821 626246 CloseHandle 95819->95821 96054 62b567 39 API calls 95820->96054 95824 6975c8 95821->95824 95823 697502 95823->95820 95826 697506 95823->95826 96042 625745 95824->96042 95827 629cb3 22 API calls 95826->95827 95829 697513 95827->95829 96053 68d2c1 26 API calls 95829->96053 95831->95798 95848 6976a4 95831->95848 95833 6975ea 96055 6253de 27 API calls ISource 95833->96055 95834 6976de GetLastError 95835 6976f7 95834->95835 96062 626216 CloseHandle ISource 95835->96062 95838 69751c 95838->95820 95839 6975f8 96056 6253c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95839->96056 95841 697645 95842 63fddb 22 API calls 95841->95842 95844 697679 95842->95844 95843 6975ff 95843->95841 96057 68ccff 95843->96057 95845 62a961 22 API calls 95844->95845 95847 697686 95845->95847 95847->95848 96061 68417d 22 API calls __fread_nolock 95847->96061 95848->95733 96065 6998e3 95850->96065 95852 6983ea 95852->95733 95854 627510 53 API calls 95853->95854 95855 69f126 95854->95855 96128 629e90 95855->96128 95857 69f136 95858 69f15b 95857->95858 95859 62ec40 207 API calls 95857->95859 95861 69f15f 95858->95861 96156 629c6e 22 API calls 95858->96156 95859->95858 95861->95733 95863 62a961 22 API calls 95862->95863 95864 6ae21b 95863->95864 95865 627510 53 API calls 95864->95865 95866 6ae22a 95865->95866 95867 626270 22 API calls 95866->95867 95868 6ae23d 95867->95868 95869 627510 53 API calls 95868->95869 95870 6ae24a 95869->95870 95871 6ae262 95870->95871 95872 6ae2c7 95870->95872 96183 62b567 39 API calls 95871->96183 95873 627510 53 API calls 95872->95873 95875 6ae2cc 95873->95875 95877 6ae2d9 95875->95877 95878 6ae314 95875->95878 95876 6ae267 95876->95877 95879 6ae280 95876->95879 96186 629c6e 22 API calls 95877->96186 95880 6ae32c 95878->95880 96187 62b567 39 API calls 95878->96187 96184 626d25 22 API calls __fread_nolock 95879->96184 95884 6ae345 95880->95884 96188 62b567 39 API calls 95880->96188 95887 62a8c7 22 API calls 95884->95887 95885 6ae28d 95888 626350 22 API calls 95885->95888 95889 6ae35f 95887->95889 95892 6ae29b 95888->95892 96164 6892c8 95889->96164 95891 6ae2e6 95891->95733 96185 626d25 22 API calls __fread_nolock 95892->96185 95893 6ae2c2 96189 6262b5 22 API calls 95893->96189 95895 6ae2b4 95896 626350 22 API calls 95895->95896 95896->95893 95899 6a70db 95898->95899 95900 6a70f5 95898->95900 96204 69359c 82 API calls __wsopen_s 95899->96204 96193 6a5689 95900->96193 95903 6a70ed 95903->95696 95905 62ec40 206 API calls 95906 6a7164 95905->95906 95906->95903 95907 6a71ff 95906->95907 95908 6a71a6 95906->95908 95909 6a7253 95907->95909 95910 6a7205 95907->95910 95915 690acc 22 API calls 95908->95915 95909->95903 95911 627510 53 API calls 95909->95911 96205 691119 22 API calls 95910->96205 95912 6a7265 95911->95912 95916 62aec9 22 API calls 95912->95916 95914 6a7228 96206 62a673 22 API calls 95914->96206 95918 6a71de 95915->95918 95919 6a7289 CharUpperBuffW 95916->95919 95921 631310 206 API calls 95918->95921 95922 6a72a3 95919->95922 95920 6a7230 96207 62bf40 207 API calls 2 library calls 95920->96207 95921->95903 95923 6a72aa 95922->95923 95924 6a72f6 95922->95924 96200 690acc 95923->96200 95926 627510 53 API calls 95924->95926 95927 6a72fe 95926->95927 96208 63e300 23 API calls 95927->96208 95931 631310 206 API calls 95931->95903 95932 6a7308 95932->95903 95933 627510 53 API calls 95932->95933 95934 6a7323 95933->95934 96209 62a673 22 API calls 95934->96209 95936 6a7333 96210 62bf40 207 API calls 2 library calls 95936->96210 95938->95735 95939->95694 95940->95697 95941->95707 95942->95719 95943->95719 95944->95730 95945->95730 95946->95730 95947->95728 95948->95730 95950 627510 53 API calls 95949->95950 95951 6a7f90 95950->95951 95975 6a7fd5 ISource 95951->95975 95987 6a8cd3 95951->95987 95953 6a8281 95954 6a844f 95953->95954 95959 6a828f 95953->95959 96028 6a8ee4 60 API calls 95954->96028 95957 6a845e 95958 6a846a 95957->95958 95957->95959 95958->95975 96000 6a7e86 95959->96000 95960 627510 53 API calls 95978 6a8049 95960->95978 95965 6a82c8 96015 63fc70 95965->96015 95968 6a82e8 96021 69359c 82 API calls __wsopen_s 95968->96021 95969 6a8302 96022 6263eb 22 API calls 95969->96022 95972 6a82f3 GetCurrentProcess TerminateProcess 95972->95969 95973 6a8311 96023 626a50 22 API calls 95973->96023 95975->95793 95976 6a832a 95986 6a8352 95976->95986 96024 6304f0 22 API calls 95976->96024 95978->95953 95978->95960 95978->95975 96019 68417d 22 API calls __fread_nolock 95978->96019 96020 6a851d 42 API calls _strftime 95978->96020 95979 6a84c5 95979->95975 95981 6a84d9 FreeLibrary 95979->95981 95980 6a8341 96025 6a8b7b 75 API calls 95980->96025 95981->95975 95986->95979 96026 6304f0 22 API calls 95986->96026 96027 62aceb 23 API calls ISource 95986->96027 96029 6a8b7b 75 API calls 95986->96029 95988 62aec9 22 API calls 95987->95988 95989 6a8cee CharLowerBuffW 95988->95989 96030 688e54 95989->96030 95993 62a961 22 API calls 95994 6a8d2a 95993->95994 96037 626d25 22 API calls __fread_nolock 95994->96037 95996 6a8d3e 95997 6293b2 22 API calls 95996->95997 95999 6a8d48 _wcslen 95997->95999 95998 6a8e5e _wcslen 95998->95978 95999->95998 96038 6a851d 42 API calls _strftime 95999->96038 96001 6a7ea1 96000->96001 96005 6a7eec 96000->96005 96002 63fe0b 22 API calls 96001->96002 96003 6a7ec3 96002->96003 96004 63fddb 22 API calls 96003->96004 96003->96005 96004->96003 96006 6a9096 96005->96006 96007 6a92ab ISource 96006->96007 96013 6a90ba _strcat _wcslen 96006->96013 96007->95965 96008 62b567 39 API calls 96008->96013 96009 62b38f 39 API calls 96009->96013 96010 62b6b5 39 API calls 96010->96013 96011 627510 53 API calls 96011->96013 96012 64ea0c 21 API calls ___std_exception_copy 96012->96013 96013->96007 96013->96008 96013->96009 96013->96010 96013->96011 96013->96012 96041 68efae 24 API calls _wcslen 96013->96041 96016 63fc85 96015->96016 96017 63fd1d VirtualProtect 96016->96017 96018 63fceb 96016->96018 96017->96018 96018->95968 96018->95969 96019->95978 96020->95978 96021->95972 96022->95973 96023->95976 96024->95980 96025->95986 96026->95986 96027->95986 96028->95957 96029->95986 96031 688e74 _wcslen 96030->96031 96032 688f63 96031->96032 96035 688ea9 96031->96035 96036 688f68 96031->96036 96032->95993 96032->95999 96035->96032 96039 63ce60 41 API calls 96035->96039 96036->96032 96040 63ce60 41 API calls 96036->96040 96037->95996 96038->95998 96039->96035 96040->96036 96041->96013 96043 664035 96042->96043 96044 62575c CreateFileW 96042->96044 96045 66403b CreateFileW 96043->96045 96046 62577b 96043->96046 96044->96046 96045->96046 96047 664063 96045->96047 96046->95833 96046->95834 96063 6254c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96047->96063 96049 66406e 96049->96046 96050->95796 96051->95814 96052->95823 96053->95838 96054->95831 96055->95839 96056->95843 96058 68cd19 WriteFile 96057->96058 96059 68cd0e 96057->96059 96058->95841 96064 68cc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96059->96064 96061->95848 96062->95848 96063->96049 96064->96058 96066 6999e8 96065->96066 96067 699902 96065->96067 96123 699caa 39 API calls 96066->96123 96069 63fddb 22 API calls 96067->96069 96070 699909 96069->96070 96072 63fe0b 22 API calls 96070->96072 96071 6999ca 96071->95852 96073 69991a 96072->96073 96075 626246 CloseHandle 96073->96075 96074 699ac5 96116 691e96 96074->96116 96077 699925 96075->96077 96079 62a961 22 API calls 96077->96079 96078 6999a2 96078->96071 96078->96074 96080 699a33 96078->96080 96081 69992d 96079->96081 96083 627510 53 API calls 96080->96083 96084 626246 CloseHandle 96081->96084 96082 699acc 96086 68ccff 4 API calls 96082->96086 96094 699a3a 96083->96094 96085 699934 96084->96085 96087 627510 53 API calls 96085->96087 96110 699aa8 96086->96110 96089 699940 96087->96089 96088 699abb 96125 68cd57 30 API calls 96088->96125 96092 626246 CloseHandle 96089->96092 96090 699a6e 96093 626270 22 API calls 96090->96093 96095 69994a 96092->96095 96096 699a7e 96093->96096 96094->96088 96094->96090 96099 625745 5 API calls 96095->96099 96100 699a8e 96096->96100 96103 62a8c7 22 API calls 96096->96103 96097 626246 CloseHandle 96098 699b1e 96097->96098 96126 626216 CloseHandle ISource 96098->96126 96102 699959 96099->96102 96104 6233c6 22 API calls 96100->96104 96105 69995d 96102->96105 96106 6999c2 96102->96106 96103->96100 96107 699a9c 96104->96107 96120 6253de 27 API calls ISource 96105->96120 96122 626216 CloseHandle ISource 96106->96122 96124 68cd57 30 API calls 96107->96124 96110->96071 96110->96097 96112 69996b 96121 6253c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96112->96121 96114 699972 96114->96078 96115 68ccff 4 API calls 96114->96115 96115->96078 96117 691e9f 96116->96117 96118 691ea4 96116->96118 96127 690f67 24 API calls __fread_nolock 96117->96127 96118->96082 96120->96112 96121->96114 96122->96071 96123->96078 96124->96110 96125->96110 96126->96071 96127->96118 96129 626270 22 API calls 96128->96129 96155 629eb5 96129->96155 96130 629fd2 96131 62a4a1 22 API calls 96130->96131 96132 629fec 96131->96132 96132->95857 96135 62a6c3 22 API calls 96135->96155 96136 66f7c4 96162 6896e2 84 API calls __wsopen_s 96136->96162 96137 66f699 96143 63fddb 22 API calls 96137->96143 96138 62a405 96138->96132 96163 6896e2 84 API calls __wsopen_s 96138->96163 96141 62a4a1 22 API calls 96141->96155 96145 66f754 96143->96145 96144 66f7d2 96146 62a4a1 22 API calls 96144->96146 96148 63fe0b 22 API calls 96145->96148 96147 66f7e8 96146->96147 96147->96132 96149 62a12c __fread_nolock 96148->96149 96149->96136 96149->96138 96151 62a587 22 API calls 96151->96155 96152 62aec9 22 API calls 96153 62a0db CharUpperBuffW 96152->96153 96158 62a673 22 API calls 96153->96158 96155->96130 96155->96135 96155->96136 96155->96137 96155->96138 96155->96141 96155->96149 96155->96151 96155->96152 96157 624573 41 API calls _wcslen 96155->96157 96159 6248c8 23 API calls 96155->96159 96160 6249bd 22 API calls __fread_nolock 96155->96160 96161 62a673 22 API calls 96155->96161 96156->95861 96157->96155 96158->96155 96159->96155 96160->96155 96161->96155 96162->96144 96163->96132 96165 62a961 22 API calls 96164->96165 96166 6892de 96165->96166 96167 626270 22 API calls 96166->96167 96168 6892f2 96167->96168 96169 688e54 41 API calls 96168->96169 96175 689314 96168->96175 96170 68930e 96169->96170 96170->96175 96190 626d25 22 API calls __fread_nolock 96170->96190 96171 688e54 41 API calls 96171->96175 96174 626350 22 API calls 96174->96175 96175->96171 96175->96174 96176 6893b3 96175->96176 96178 689397 96175->96178 96191 626d25 22 API calls __fread_nolock 96175->96191 96177 62a8c7 22 API calls 96176->96177 96179 6893c2 96176->96179 96177->96179 96192 626d25 22 API calls __fread_nolock 96178->96192 96179->95893 96181 6893a7 96182 626350 22 API calls 96181->96182 96182->96176 96183->95876 96184->95885 96185->95895 96186->95891 96187->95880 96188->95884 96189->95891 96190->96175 96191->96175 96192->96181 96194 6a56a4 96193->96194 96199 6a56f2 96193->96199 96195 63fe0b 22 API calls 96194->96195 96197 6a56c6 96195->96197 96196 63fddb 22 API calls 96196->96197 96197->96196 96197->96199 96211 690a59 22 API calls 96197->96211 96199->95905 96201 690b13 96200->96201 96202 690ada 96200->96202 96201->95931 96202->96201 96203 63fddb 22 API calls 96202->96203 96203->96201 96204->95903 96205->95914 96206->95920 96207->95903 96208->95932 96209->95936 96210->95903 96211->96197 96212->95752 96213->95752 96214->95755 96215->95755 96216->95748 96217->95755 96218 658402 96223 6581be 96218->96223 96221 65842a 96228 6581ef try_get_first_available_module 96223->96228 96225 6583ee 96242 6527ec 26 API calls _abort 96225->96242 96227 658343 96227->96221 96235 660984 96227->96235 96228->96228 96231 658338 96228->96231 96238 648e0b 40 API calls 2 library calls 96228->96238 96230 65838c 96230->96231 96239 648e0b 40 API calls 2 library calls 96230->96239 96231->96227 96241 64f2d9 20 API calls _abort 96231->96241 96233 6583ab 96233->96231 96240 648e0b 40 API calls 2 library calls 96233->96240 96243 660081 96235->96243 96237 66099f 96237->96221 96238->96230 96239->96233 96240->96231 96241->96225 96242->96227 96246 66008d BuildCatchObjectHelperInternal 96243->96246 96244 66009b 96301 64f2d9 20 API calls _abort 96244->96301 96246->96244 96248 6600d4 96246->96248 96247 6600a0 96302 6527ec 26 API calls _abort 96247->96302 96254 66065b 96248->96254 96253 6600aa __wsopen_s 96253->96237 96304 66042f 96254->96304 96257 6606a6 96322 655221 96257->96322 96258 66068d 96336 64f2c6 20 API calls _abort 96258->96336 96261 6606ab 96263 6606b4 96261->96263 96264 6606cb 96261->96264 96262 660692 96337 64f2d9 20 API calls _abort 96262->96337 96338 64f2c6 20 API calls _abort 96263->96338 96335 66039a CreateFileW 96264->96335 96268 6606b9 96339 64f2d9 20 API calls _abort 96268->96339 96270 660781 GetFileType 96271 6607d3 96270->96271 96272 66078c GetLastError 96270->96272 96344 65516a 21 API calls 2 library calls 96271->96344 96342 64f2a3 20 API calls __dosmaperr 96272->96342 96273 660756 GetLastError 96341 64f2a3 20 API calls __dosmaperr 96273->96341 96276 660704 96276->96270 96276->96273 96340 66039a CreateFileW 96276->96340 96277 66079a CloseHandle 96277->96262 96281 6607c3 96277->96281 96280 660749 96280->96270 96280->96273 96343 64f2d9 20 API calls _abort 96281->96343 96282 6607f4 96284 660840 96282->96284 96345 6605ab 72 API calls 3 library calls 96282->96345 96289 66086d 96284->96289 96346 66014d 72 API calls 4 library calls 96284->96346 96285 6607c8 96285->96262 96288 660866 96288->96289 96291 66087e 96288->96291 96290 6586ae __wsopen_s 29 API calls 96289->96290 96292 6600f8 96290->96292 96291->96292 96293 6608fc CloseHandle 96291->96293 96303 660121 LeaveCriticalSection __wsopen_s 96292->96303 96347 66039a CreateFileW 96293->96347 96295 660927 96296 66095d 96295->96296 96297 660931 GetLastError 96295->96297 96296->96292 96348 64f2a3 20 API calls __dosmaperr 96297->96348 96299 66093d 96349 655333 21 API calls 2 library calls 96299->96349 96301->96247 96302->96253 96303->96253 96305 66046a 96304->96305 96306 660450 96304->96306 96350 6603bf 96305->96350 96306->96305 96357 64f2d9 20 API calls _abort 96306->96357 96308 6604a2 96312 6604d1 96308->96312 96359 64f2d9 20 API calls _abort 96308->96359 96310 66045f 96358 6527ec 26 API calls _abort 96310->96358 96320 660524 96312->96320 96361 64d70d 26 API calls 2 library calls 96312->96361 96315 66051f 96317 66059e 96315->96317 96315->96320 96316 6604c6 96360 6527ec 26 API calls _abort 96316->96360 96362 6527fc 11 API calls _abort 96317->96362 96320->96257 96320->96258 96321 6605aa 96323 65522d BuildCatchObjectHelperInternal 96322->96323 96365 652f5e EnterCriticalSection 96323->96365 96326 655259 96369 655000 96326->96369 96328 6552a4 __wsopen_s 96328->96261 96329 655234 96329->96326 96331 6552c7 EnterCriticalSection 96329->96331 96333 65527b 96329->96333 96331->96333 96334 6552d4 LeaveCriticalSection 96331->96334 96366 65532a 96333->96366 96334->96329 96335->96276 96336->96262 96337->96292 96338->96268 96339->96262 96340->96280 96341->96262 96342->96277 96343->96285 96344->96282 96345->96284 96346->96288 96347->96295 96348->96299 96349->96296 96352 6603d7 96350->96352 96351 6603f2 96351->96308 96352->96351 96363 64f2d9 20 API calls _abort 96352->96363 96354 660416 96364 6527ec 26 API calls _abort 96354->96364 96356 660421 96356->96308 96357->96310 96358->96305 96359->96316 96360->96312 96361->96315 96362->96321 96363->96354 96364->96356 96365->96329 96377 652fa6 LeaveCriticalSection 96366->96377 96368 655331 96368->96328 96370 654c7d _abort 20 API calls 96369->96370 96372 655012 96370->96372 96371 6529c8 _free 20 API calls 96373 655071 96371->96373 96375 65501f 96372->96375 96378 653405 11 API calls 2 library calls 96372->96378 96373->96333 96376 655147 EnterCriticalSection 96373->96376 96375->96371 96376->96333 96377->96368 96378->96372 96379 62dee5 96382 62b710 96379->96382 96383 62b72b 96382->96383 96384 670146 96383->96384 96385 6700f8 96383->96385 96405 62b750 96383->96405 96424 6a58a2 207 API calls 2 library calls 96384->96424 96388 670102 96385->96388 96391 67010f 96385->96391 96385->96405 96422 6a5d33 207 API calls 96388->96422 96403 62ba20 96391->96403 96423 6a61d0 207 API calls 2 library calls 96391->96423 96394 6703d9 96394->96394 96396 62bbe0 40 API calls 96396->96405 96399 62ba4e 96400 670322 96427 6a5c0c 82 API calls 96400->96427 96403->96399 96428 69359c 82 API calls __wsopen_s 96403->96428 96405->96396 96405->96399 96405->96400 96405->96403 96409 63d336 40 API calls 96405->96409 96410 62ec40 207 API calls 96405->96410 96411 62a8c7 22 API calls 96405->96411 96413 62a81b 41 API calls 96405->96413 96414 63d2f0 40 API calls 96405->96414 96415 63a01b 207 API calls 96405->96415 96416 640242 5 API calls __Init_thread_wait 96405->96416 96417 63edcd 22 API calls 96405->96417 96418 6400a3 29 API calls __onexit 96405->96418 96419 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96405->96419 96420 63ee53 82 API calls 96405->96420 96421 63e5ca 207 API calls 96405->96421 96425 62aceb 23 API calls ISource 96405->96425 96426 67f6bf 23 API calls 96405->96426 96409->96405 96410->96405 96411->96405 96413->96405 96414->96405 96415->96405 96416->96405 96417->96405 96418->96405 96419->96405 96420->96405 96421->96405 96422->96391 96423->96403 96424->96405 96425->96405 96426->96405 96427->96403 96428->96394 96429 621cad SystemParametersInfoW 96430 621033 96435 624c91 96430->96435 96434 621042 96436 62a961 22 API calls 96435->96436 96437 624cff 96436->96437 96443 623af0 96437->96443 96440 624d9c 96441 621038 96440->96441 96446 6251f7 22 API calls __fread_nolock 96440->96446 96442 6400a3 29 API calls __onexit 96441->96442 96442->96434 96447 623b1c 96443->96447 96446->96440 96448 623b0f 96447->96448 96449 623b29 96447->96449 96448->96440 96449->96448 96450 623b30 RegOpenKeyExW 96449->96450 96450->96448 96451 623b4a RegQueryValueExW 96450->96451 96452 623b80 RegCloseKey 96451->96452 96453 623b6b 96451->96453 96452->96448 96453->96452 96454 144de50 96468 144baa0 96454->96468 96456 144df4d 96471 144dd40 96456->96471 96458 144df76 CreateFileW 96460 144dfcd 96458->96460 96461 144dfc8 96458->96461 96460->96461 96462 144dfe4 VirtualAlloc 96460->96462 96462->96461 96463 144e002 ReadFile 96462->96463 96463->96461 96464 144e01d 96463->96464 96465 144cd40 13 API calls 96464->96465 96467 144e050 96465->96467 96466 144e073 ExitProcess 96466->96461 96467->96466 96474 144ef80 GetPEB 96468->96474 96470 144c12b 96470->96456 96472 144dd49 Sleep 96471->96472 96473 144dd57 96472->96473 96475 144efaa 96474->96475 96475->96470 96476 623156 96479 623170 96476->96479 96480 623187 96479->96480 96481 6231eb 96480->96481 96482 62318c 96480->96482 96519 6231e9 96480->96519 96484 6231f1 96481->96484 96485 662dfb 96481->96485 96486 623265 PostQuitMessage 96482->96486 96487 623199 96482->96487 96483 6231d0 DefWindowProcW 96521 62316a 96483->96521 96490 6231f8 96484->96490 96491 62321d SetTimer RegisterWindowMessageW 96484->96491 96528 6218e2 10 API calls 96485->96528 96486->96521 96488 6231a4 96487->96488 96489 662e7c 96487->96489 96494 6231ae 96488->96494 96495 662e68 96488->96495 96533 68bf30 34 API calls ___scrt_fastfail 96489->96533 96498 623201 KillTimer 96490->96498 96499 662d9c 96490->96499 96496 623246 CreatePopupMenu 96491->96496 96491->96521 96493 662e1c 96529 63e499 42 API calls 96493->96529 96501 662e4d 96494->96501 96502 6231b9 96494->96502 96532 68c161 27 API calls ___scrt_fastfail 96495->96532 96496->96521 96524 6230f2 Shell_NotifyIconW ___scrt_fastfail 96498->96524 96504 662dd7 MoveWindow 96499->96504 96505 662da1 96499->96505 96501->96483 96531 680ad7 22 API calls 96501->96531 96509 6231c4 96502->96509 96510 623253 96502->96510 96503 662e8e 96503->96483 96503->96521 96504->96521 96511 662dc6 SetFocus 96505->96511 96512 662da7 96505->96512 96508 623263 96508->96521 96509->96483 96530 6230f2 Shell_NotifyIconW ___scrt_fastfail 96509->96530 96526 62326f 44 API calls ___scrt_fastfail 96510->96526 96511->96521 96512->96509 96515 662db0 96512->96515 96513 623214 96525 623c50 DeleteObject DestroyWindow 96513->96525 96527 6218e2 10 API calls 96515->96527 96519->96483 96522 662e41 96523 623837 49 API calls 96522->96523 96523->96519 96524->96513 96525->96521 96526->96508 96527->96521 96528->96493 96529->96509 96530->96522 96531->96519 96532->96508 96533->96503 96534 622e37 96535 62a961 22 API calls 96534->96535 96536 622e4d 96535->96536 96613 624ae3 96536->96613 96538 622e6b 96539 623a5a 24 API calls 96538->96539 96540 622e7f 96539->96540 96541 629cb3 22 API calls 96540->96541 96542 622e8c 96541->96542 96543 624ecb 94 API calls 96542->96543 96544 622ea5 96543->96544 96545 662cb0 96544->96545 96546 622ead 96544->96546 96547 692cf9 80 API calls 96545->96547 96549 62a8c7 22 API calls 96546->96549 96548 662cc3 96547->96548 96550 662ccf 96548->96550 96552 624f39 68 API calls 96548->96552 96551 622ec3 96549->96551 96554 624f39 68 API calls 96550->96554 96627 626f88 22 API calls 96551->96627 96552->96550 96556 662ce5 96554->96556 96555 622ecf 96557 629cb3 22 API calls 96555->96557 96643 623084 22 API calls 96556->96643 96558 622edc 96557->96558 96628 62a81b 41 API calls 96558->96628 96561 622eec 96563 629cb3 22 API calls 96561->96563 96562 662d02 96644 623084 22 API calls 96562->96644 96565 622f12 96563->96565 96629 62a81b 41 API calls 96565->96629 96567 662d1e 96568 623a5a 24 API calls 96567->96568 96570 662d44 96568->96570 96569 622f21 96573 62a961 22 API calls 96569->96573 96645 623084 22 API calls 96570->96645 96572 662d50 96574 62a8c7 22 API calls 96572->96574 96575 622f3f 96573->96575 96576 662d5e 96574->96576 96630 623084 22 API calls 96575->96630 96646 623084 22 API calls 96576->96646 96579 622f4b 96631 644a28 40 API calls 3 library calls 96579->96631 96580 662d6d 96584 62a8c7 22 API calls 96580->96584 96582 622f59 96582->96556 96583 622f63 96582->96583 96632 644a28 40 API calls 3 library calls 96583->96632 96586 662d83 96584->96586 96647 623084 22 API calls 96586->96647 96587 622f6e 96587->96562 96589 622f78 96587->96589 96633 644a28 40 API calls 3 library calls 96589->96633 96591 662d90 96592 622f83 96592->96567 96593 622f8d 96592->96593 96634 644a28 40 API calls 3 library calls 96593->96634 96595 622f98 96596 622fdc 96595->96596 96635 623084 22 API calls 96595->96635 96596->96580 96597 622fe8 96596->96597 96597->96591 96637 6263eb 22 API calls 96597->96637 96600 622fbf 96602 62a8c7 22 API calls 96600->96602 96601 622ff8 96638 626a50 22 API calls 96601->96638 96604 622fcd 96602->96604 96636 623084 22 API calls 96604->96636 96605 623006 96639 6270b0 23 API calls 96605->96639 96610 623021 96611 623065 96610->96611 96640 626f88 22 API calls 96610->96640 96641 6270b0 23 API calls 96610->96641 96642 623084 22 API calls 96610->96642 96614 624af0 __wsopen_s 96613->96614 96615 626b57 22 API calls 96614->96615 96616 624b22 96614->96616 96615->96616 96626 624b58 96616->96626 96648 624c6d 96616->96648 96618 629cb3 22 API calls 96620 624c52 96618->96620 96619 629cb3 22 API calls 96619->96626 96622 62515f 22 API calls 96620->96622 96621 624c6d 22 API calls 96621->96626 96624 624c5e 96622->96624 96623 62515f 22 API calls 96623->96626 96624->96538 96625 624c29 96625->96618 96625->96624 96626->96619 96626->96621 96626->96623 96626->96625 96627->96555 96628->96561 96629->96569 96630->96579 96631->96582 96632->96587 96633->96592 96634->96595 96635->96600 96636->96596 96637->96601 96638->96605 96639->96610 96640->96610 96641->96610 96642->96610 96643->96562 96644->96567 96645->96572 96646->96580 96647->96591 96649 62aec9 22 API calls 96648->96649 96650 624c78 96649->96650 96650->96616 96651 62105b 96656 62344d 96651->96656 96653 62106a 96687 6400a3 29 API calls __onexit 96653->96687 96655 621074 96657 62345d __wsopen_s 96656->96657 96658 62a961 22 API calls 96657->96658 96659 623513 96658->96659 96660 623a5a 24 API calls 96659->96660 96661 62351c 96660->96661 96688 623357 96661->96688 96664 6233c6 22 API calls 96665 623535 96664->96665 96666 62515f 22 API calls 96665->96666 96667 623544 96666->96667 96668 62a961 22 API calls 96667->96668 96669 62354d 96668->96669 96670 62a6c3 22 API calls 96669->96670 96671 623556 RegOpenKeyExW 96670->96671 96672 663176 RegQueryValueExW 96671->96672 96677 623578 96671->96677 96673 663193 96672->96673 96674 66320c RegCloseKey 96672->96674 96675 63fe0b 22 API calls 96673->96675 96674->96677 96686 66321e _wcslen 96674->96686 96676 6631ac 96675->96676 96679 625722 22 API calls 96676->96679 96677->96653 96678 624c6d 22 API calls 96678->96686 96680 6631b7 RegQueryValueExW 96679->96680 96681 6631d4 96680->96681 96683 6631ee ISource 96680->96683 96682 626b57 22 API calls 96681->96682 96682->96683 96683->96674 96684 629cb3 22 API calls 96684->96686 96685 62515f 22 API calls 96685->96686 96686->96677 96686->96678 96686->96684 96686->96685 96687->96655 96689 661f50 __wsopen_s 96688->96689 96690 623364 GetFullPathNameW 96689->96690 96691 623386 96690->96691 96692 626b57 22 API calls 96691->96692 96693 6233a4 96692->96693 96693->96664 96694 621098 96699 6242de 96694->96699 96698 6210a7 96700 62a961 22 API calls 96699->96700 96701 6242f5 GetVersionExW 96700->96701 96702 626b57 22 API calls 96701->96702 96703 624342 96702->96703 96704 6293b2 22 API calls 96703->96704 96716 624378 96703->96716 96705 62436c 96704->96705 96707 6237a0 22 API calls 96705->96707 96706 62441b GetCurrentProcess IsWow64Process 96708 624437 96706->96708 96707->96716 96709 663824 GetSystemInfo 96708->96709 96710 62444f LoadLibraryA 96708->96710 96711 624460 GetProcAddress 96710->96711 96712 62449c GetSystemInfo 96710->96712 96711->96712 96714 624470 GetNativeSystemInfo 96711->96714 96715 624476 96712->96715 96713 6637df 96714->96715 96717 62109d 96715->96717 96718 62447a FreeLibrary 96715->96718 96716->96706 96716->96713 96719 6400a3 29 API calls __onexit 96717->96719 96718->96717 96719->96698 96720 62f7bf 96721 62f7d3 96720->96721 96722 62fcb6 96720->96722 96724 62fcc2 96721->96724 96726 63fddb 22 API calls 96721->96726 96757 62aceb 23 API calls ISource 96722->96757 96758 62aceb 23 API calls ISource 96724->96758 96727 62f7e5 96726->96727 96727->96724 96728 62f83e 96727->96728 96729 62fd3d 96727->96729 96731 631310 207 API calls 96728->96731 96746 62ed9d ISource 96728->96746 96759 691155 22 API calls 96729->96759 96748 62ec76 ISource 96731->96748 96732 674beb 96763 69359c 82 API calls __wsopen_s 96732->96763 96734 62fef7 96742 62a8c7 22 API calls 96734->96742 96734->96746 96735 63fddb 22 API calls 96735->96748 96737 674b0b 96761 69359c 82 API calls __wsopen_s 96737->96761 96738 62a8c7 22 API calls 96738->96748 96739 674600 96744 62a8c7 22 API calls 96739->96744 96739->96746 96742->96746 96744->96746 96745 640242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96745->96748 96747 62fbe3 96747->96746 96751 674bdc 96747->96751 96754 62f3ae ISource 96747->96754 96748->96732 96748->96734 96748->96735 96748->96737 96748->96738 96748->96739 96748->96745 96748->96746 96748->96747 96749 62a961 22 API calls 96748->96749 96750 6400a3 29 API calls pre_c_initialization 96748->96750 96753 6401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96748->96753 96748->96754 96755 6301e0 207 API calls 2 library calls 96748->96755 96756 6306a0 41 API calls ISource 96748->96756 96749->96748 96750->96748 96762 69359c 82 API calls __wsopen_s 96751->96762 96753->96748 96754->96746 96760 69359c 82 API calls __wsopen_s 96754->96760 96755->96748 96756->96748 96757->96724 96758->96729 96759->96746 96760->96746 96761->96746 96762->96732 96763->96746 96764 144e3fb 96765 144e400 96764->96765 96766 144baa0 GetPEB 96765->96766 96767 144e40c 96766->96767 96768 144e4c0 96767->96768 96769 144e42a 96767->96769 96786 144ed70 9 API calls 96768->96786 96773 144e0d0 96769->96773 96772 144e4a7 96774 144baa0 GetPEB 96773->96774 96777 144e16f 96774->96777 96776 144e1a0 CreateFileW 96776->96777 96779 144e1ad 96776->96779 96778 144e1c9 VirtualAlloc 96777->96778 96777->96779 96784 144e2d0 CloseHandle 96777->96784 96785 144e2e0 VirtualFree 96777->96785 96787 144efe0 GetPEB 96777->96787 96778->96779 96780 144e1ea ReadFile 96778->96780 96782 144e3bc VirtualFree 96779->96782 96783 144e3ca 96779->96783 96780->96779 96781 144e208 VirtualAlloc 96780->96781 96781->96777 96781->96779 96782->96783 96783->96772 96784->96777 96785->96777 96786->96772 96788 144f00a 96787->96788 96788->96776 96789 6403fb 96790 640407 BuildCatchObjectHelperInternal 96789->96790 96818 63feb1 96790->96818 96792 64040e 96793 640561 96792->96793 96796 640438 96792->96796 96845 64083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96793->96845 96795 640568 96846 644e52 28 API calls _abort 96795->96846 96805 640477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96796->96805 96829 65247d 96796->96829 96798 64056e 96847 644e04 28 API calls _abort 96798->96847 96802 640576 96803 640457 96809 6404d8 96805->96809 96841 644e1a 38 API calls 2 library calls 96805->96841 96807 6404de 96810 6404f3 96807->96810 96837 640959 96809->96837 96842 640992 GetModuleHandleW 96810->96842 96812 6404fa 96812->96795 96813 6404fe 96812->96813 96814 640507 96813->96814 96843 644df5 28 API calls _abort 96813->96843 96844 640040 13 API calls 2 library calls 96814->96844 96817 64050f 96817->96803 96819 63feba 96818->96819 96848 640698 IsProcessorFeaturePresent 96819->96848 96821 63fec6 96849 642c94 10 API calls 3 library calls 96821->96849 96823 63fecb 96824 63fecf 96823->96824 96850 652317 96823->96850 96824->96792 96827 63fee6 96827->96792 96831 652494 96829->96831 96830 640a8c CatchGuardHandler 5 API calls 96832 640451 96830->96832 96831->96830 96832->96803 96833 652421 96832->96833 96834 652450 96833->96834 96835 640a8c CatchGuardHandler 5 API calls 96834->96835 96836 652479 96835->96836 96836->96805 96901 642340 96837->96901 96840 64097f 96840->96807 96841->96809 96842->96812 96843->96814 96844->96817 96845->96795 96846->96798 96847->96802 96848->96821 96849->96823 96854 65d1f6 96850->96854 96853 642cbd 8 API calls 3 library calls 96853->96824 96855 65d213 96854->96855 96858 65d20f 96854->96858 96855->96858 96860 654bfb 96855->96860 96857 63fed8 96857->96827 96857->96853 96872 640a8c 96858->96872 96861 654c07 BuildCatchObjectHelperInternal 96860->96861 96879 652f5e EnterCriticalSection 96861->96879 96863 654c0e 96880 6550af 96863->96880 96865 654c1d 96871 654c2c 96865->96871 96893 654a8f 29 API calls 96865->96893 96868 654c27 96894 654b45 GetStdHandle GetFileType 96868->96894 96870 654c3d __wsopen_s 96870->96855 96895 654c48 LeaveCriticalSection _abort 96871->96895 96873 640a95 96872->96873 96874 640a97 IsProcessorFeaturePresent 96872->96874 96873->96857 96876 640c5d 96874->96876 96900 640c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96876->96900 96878 640d40 96878->96857 96879->96863 96881 6550bb BuildCatchObjectHelperInternal 96880->96881 96882 6550df 96881->96882 96883 6550c8 96881->96883 96896 652f5e EnterCriticalSection 96882->96896 96897 64f2d9 20 API calls _abort 96883->96897 96886 6550cd 96898 6527ec 26 API calls _abort 96886->96898 96888 655117 96899 65513e LeaveCriticalSection _abort 96888->96899 96889 6550d7 __wsopen_s 96889->96865 96890 6550eb 96890->96888 96892 655000 __wsopen_s 21 API calls 96890->96892 96892->96890 96893->96868 96894->96871 96895->96870 96896->96890 96897->96886 96898->96889 96899->96889 96900->96878 96902 64096c GetStartupInfoW 96901->96902 96902->96840

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 234 6242de-62434d call 62a961 GetVersionExW call 626b57 239 663617-66362a 234->239 240 624353 234->240 241 66362b-66362f 239->241 242 624355-624357 240->242 243 663632-66363e 241->243 244 663631 241->244 245 663656 242->245 246 62435d-6243bc call 6293b2 call 6237a0 242->246 243->241 247 663640-663642 243->247 244->243 250 66365d-663660 245->250 263 6243c2-6243c4 246->263 264 6637df-6637e6 246->264 247->242 249 663648-66364f 247->249 249->239 252 663651 249->252 253 663666-6636a8 250->253 254 62441b-624435 GetCurrentProcess IsWow64Process 250->254 252->245 253->254 258 6636ae-6636b1 253->258 256 624437 254->256 257 624494-62449a 254->257 260 62443d-624449 256->260 257->260 261 6636b3-6636bd 258->261 262 6636db-6636e5 258->262 269 663824-663828 GetSystemInfo 260->269 270 62444f-62445e LoadLibraryA 260->270 271 6636bf-6636c5 261->271 272 6636ca-6636d6 261->272 265 6636e7-6636f3 262->265 266 6636f8-663702 262->266 263->250 273 6243ca-6243dd 263->273 267 663806-663809 264->267 268 6637e8 264->268 265->254 277 663704-663710 266->277 278 663715-663721 266->278 279 6637f4-6637fc 267->279 280 66380b-66381a 267->280 276 6637ee 268->276 281 624460-62446e GetProcAddress 270->281 282 62449c-6244a6 GetSystemInfo 270->282 271->254 272->254 274 663726-66372f 273->274 275 6243e3-6243e5 273->275 285 663731-663737 274->285 286 66373c-663748 274->286 283 6243eb-6243ee 275->283 284 66374d-663762 275->284 276->279 277->254 278->254 279->267 280->276 287 66381c-663822 280->287 281->282 288 624470-624474 GetNativeSystemInfo 281->288 289 624476-624478 282->289 290 6243f4-62440f 283->290 291 663791-663794 283->291 292 663764-66376a 284->292 293 66376f-66377b 284->293 285->254 286->254 287->279 288->289 294 624481-624493 289->294 295 62447a-62447b FreeLibrary 289->295 296 663780-66378c 290->296 297 624415 290->297 291->254 298 66379a-6637c1 291->298 292->254 293->254 295->294 296->254 297->254 299 6637c3-6637c9 298->299 300 6637ce-6637da 298->300 299->254 300->254
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 0062430D
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      • GetCurrentProcess.KERNEL32(?,006BCB64,00000000,?,?), ref: 00624422
                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00624429
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00624454
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00624466
                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00624474
                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0062447B
                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 006244A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                      • API String ID: 3290436268-3101561225
                                                      • Opcode ID: 6aa2329760cba0b0a7a6e700e0a0e9bcdd46e2b43e910183475397a2e21ee125
                                                      • Instruction ID: d2b1efe3ca4b153a922e117182ffe3e70d68718063e024542034d7698e11aeb3
                                                      • Opcode Fuzzy Hash: 6aa2329760cba0b0a7a6e700e0a0e9bcdd46e2b43e910183475397a2e21ee125
                                                      • Instruction Fuzzy Hash: A2A1906790A6F4DFCB11DB6DBC411F57FE7AB27380B087899D0819BB22D6204649CF25

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1270 6242a2-6242ba CreateStreamOnHGlobal 1271 6242da-6242dd 1270->1271 1272 6242bc-6242d3 FindResourceExW 1270->1272 1273 6242d9 1272->1273 1274 6635ba-6635c9 LoadResource 1272->1274 1273->1271 1274->1273 1275 6635cf-6635dd SizeofResource 1274->1275 1275->1273 1276 6635e3-6635ee LockResource 1275->1276 1276->1273 1277 6635f4-663612 1276->1277 1277->1273
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,006250AA,?,?,00000000,00000000), ref: 006242B2
                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,006250AA,?,?,00000000,00000000), ref: 006242C9
                                                      • LoadResource.KERNEL32(?,00000000,?,?,006250AA,?,?,00000000,00000000,?,?,?,?,?,?,00624F20), ref: 006635BE
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,006250AA,?,?,00000000,00000000,?,?,?,?,?,?,00624F20), ref: 006635D3
                                                      • LockResource.KERNEL32(006250AA,?,?,006250AA,?,?,00000000,00000000,?,?,?,?,?,?,00624F20,?), ref: 006635E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                      • String ID: SCRIPT
                                                      • API String ID: 3051347437-3967369404
                                                      • Opcode ID: a2bda213532d9c9ef323ec5f539eaaab51437db3b38ffe684fb6795161c959f1
                                                      • Instruction ID: 3f48ae220d9c8b76646a9a29871a059e45913f88fed969365e5c0afb657b8a99
                                                      • Opcode Fuzzy Hash: a2bda213532d9c9ef323ec5f539eaaab51437db3b38ffe684fb6795161c959f1
                                                      • Instruction Fuzzy Hash: F2117CB0201B10FFDB218B66EC48F677BBAEFC5B61F104269F40296250DB71DE408A30

                                                      Control-flow Graph

                                                      APIs
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00622B6B
                                                        • Part of subcall function 00623A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006F1418,?,00622E7F,?,?,?,00000000), ref: 00623A78
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,006E2224), ref: 00662C10
                                                      • ShellExecuteW.SHELL32(00000000,?,?,006E2224), ref: 00662C17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                      • String ID: runas
                                                      • API String ID: 448630720-4000483414
                                                      • Opcode ID: c880d7b69a69f2d7c90ce66f0e9e1f21d269faf501261f6467d2a80b702193a4
                                                      • Instruction ID: 21de4637f0f43f5b3c677c8341afc313814f6bea2e705fb96baf582bf694cfbc
                                                      • Opcode Fuzzy Hash: c880d7b69a69f2d7c90ce66f0e9e1f21d269faf501261f6467d2a80b702193a4
                                                      • Instruction Fuzzy Hash: 0F110A31204B66AAC744FF20F8619BE77A79FD1355F44182CF142171A2CF258649CF16
                                                      APIs
                                                      • GetInputState.USER32 ref: 0062D807
                                                      • timeGetTime.WINMM ref: 0062DA07
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0062DB28
                                                      • TranslateMessage.USER32(?), ref: 0062DB7B
                                                      • DispatchMessageW.USER32(?), ref: 0062DB89
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0062DB9F
                                                      • Sleep.KERNEL32(0000000A), ref: 0062DBB1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                      • String ID:
                                                      • API String ID: 2189390790-0
                                                      • Opcode ID: f6bcbb94d4f60d68703730075c8096064e88a296bc2537058a835fe7d9bf1fdb
                                                      • Instruction ID: 483b2c5e58b844f6cd6f3bbd67b10af354c64a704c7c2452bb9402fe16b53e44
                                                      • Opcode Fuzzy Hash: f6bcbb94d4f60d68703730075c8096064e88a296bc2537058a835fe7d9bf1fdb
                                                      • Instruction Fuzzy Hash: 4042DF70608A52DFD729CF24D894BAAB7E3BF46304F14861DE4598B391D771E884CF92

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00622D07
                                                      • RegisterClassExW.USER32(00000030), ref: 00622D31
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00622D42
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00622D5F
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00622D6F
                                                      • LoadIconW.USER32(000000A9), ref: 00622D85
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00622D94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: e38354cbfcb1d90acc8b7d5f5143100108b06b10478c9e1d7f10df25e32e22c6
                                                      • Instruction ID: 1aa25020d59893390c2ec809e18ec9b1ed80644e2ddcbb549b221a9aff94f98a
                                                      • Opcode Fuzzy Hash: e38354cbfcb1d90acc8b7d5f5143100108b06b10478c9e1d7f10df25e32e22c6
                                                      • Instruction Fuzzy Hash: 0B21E5B1901208EFDB00DFA4E849BEDBBB6FB09751F00621AF511AA2A0D7B10680CF90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 302 66065b-66068b call 66042f 305 6606a6-6606b2 call 655221 302->305 306 66068d-660698 call 64f2c6 302->306 311 6606b4-6606c9 call 64f2c6 call 64f2d9 305->311 312 6606cb-660714 call 66039a 305->312 313 66069a-6606a1 call 64f2d9 306->313 311->313 322 660716-66071f 312->322 323 660781-66078a GetFileType 312->323 320 66097d-660983 313->320 327 660756-66077c GetLastError call 64f2a3 322->327 328 660721-660725 322->328 324 6607d3-6607d6 323->324 325 66078c-6607bd GetLastError call 64f2a3 CloseHandle 323->325 331 6607df-6607e5 324->331 332 6607d8-6607dd 324->332 325->313 341 6607c3-6607ce call 64f2d9 325->341 327->313 328->327 333 660727-660754 call 66039a 328->333 336 6607e9-660837 call 65516a 331->336 337 6607e7 331->337 332->336 333->323 333->327 344 660847-66086b call 66014d 336->344 345 660839-660845 call 6605ab 336->345 337->336 341->313 352 66087e-6608c1 344->352 353 66086d 344->353 345->344 351 66086f-660879 call 6586ae 345->351 351->320 355 6608e2-6608f0 352->355 356 6608c3-6608c7 352->356 353->351 357 6608f6-6608fa 355->357 358 66097b 355->358 356->355 360 6608c9-6608dd 356->360 357->358 361 6608fc-66092f CloseHandle call 66039a 357->361 358->320 360->355 364 660963-660977 361->364 365 660931-66095d GetLastError call 64f2a3 call 655333 361->365 364->358 365->364
                                                      APIs
                                                        • Part of subcall function 0066039A: CreateFileW.KERNELBASE(00000000,00000000,?,00660704,?,?,00000000,?,00660704,00000000,0000000C), ref: 006603B7
                                                      • GetLastError.KERNEL32 ref: 0066076F
                                                      • __dosmaperr.LIBCMT ref: 00660776
                                                      • GetFileType.KERNELBASE(00000000), ref: 00660782
                                                      • GetLastError.KERNEL32 ref: 0066078C
                                                      • __dosmaperr.LIBCMT ref: 00660795
                                                      • CloseHandle.KERNEL32(00000000), ref: 006607B5
                                                      • CloseHandle.KERNEL32(?), ref: 006608FF
                                                      • GetLastError.KERNEL32 ref: 00660931
                                                      • __dosmaperr.LIBCMT ref: 00660938
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                      • String ID: H
                                                      • API String ID: 4237864984-2852464175
                                                      • Opcode ID: 5744adbd8962b0a06700d114af3d8ac6af4ec6d859bd61b8f6f67501d477cfa5
                                                      • Instruction ID: 1f73ece0fdd88da63aa6d218aefe65b15404baa2845c97bbfac8728a56864469
                                                      • Opcode Fuzzy Hash: 5744adbd8962b0a06700d114af3d8ac6af4ec6d859bd61b8f6f67501d477cfa5
                                                      • Instruction Fuzzy Hash: 9DA12432A141058FEF19EF68D851BAF7BE2AB06320F14016DF815EB392DB319D12CB95

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00623A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006F1418,?,00622E7F,?,?,?,00000000), ref: 00623A78
                                                        • Part of subcall function 00623357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00623379
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0062356A
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0066318D
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006631CE
                                                      • RegCloseKey.ADVAPI32(?), ref: 00663210
                                                      • _wcslen.LIBCMT ref: 00663277
                                                      • _wcslen.LIBCMT ref: 00663286
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 98802146-2727554177
                                                      • Opcode ID: 0c474bf6db3128c17d06e40ef8ddda9d0c50d8deee9d64b272af15a5c0bc1096
                                                      • Instruction ID: 828c8962d02851d518b7f072f747fb72e541f93a8b5e7972b81f85cbd431f5a6
                                                      • Opcode Fuzzy Hash: 0c474bf6db3128c17d06e40ef8ddda9d0c50d8deee9d64b272af15a5c0bc1096
                                                      • Instruction Fuzzy Hash: 2871A1B25047129FC314EF65ECA19ABBBEAFF85740F40182EF54587260DB349A48CF65

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00622B8E
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00622B9D
                                                      • LoadIconW.USER32(00000063), ref: 00622BB3
                                                      • LoadIconW.USER32(000000A4), ref: 00622BC5
                                                      • LoadIconW.USER32(000000A2), ref: 00622BD7
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00622BEF
                                                      • RegisterClassExW.USER32(?), ref: 00622C40
                                                        • Part of subcall function 00622CD4: GetSysColorBrush.USER32(0000000F), ref: 00622D07
                                                        • Part of subcall function 00622CD4: RegisterClassExW.USER32(00000030), ref: 00622D31
                                                        • Part of subcall function 00622CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00622D42
                                                        • Part of subcall function 00622CD4: InitCommonControlsEx.COMCTL32(?), ref: 00622D5F
                                                        • Part of subcall function 00622CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00622D6F
                                                        • Part of subcall function 00622CD4: LoadIconW.USER32(000000A9), ref: 00622D85
                                                        • Part of subcall function 00622CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00622D94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: 5a72870fb0fd40d25e8a96cbbde3e387e9bdd3f5c203b378d1824ceaa58ed753
                                                      • Instruction ID: 62dba6df1516f9b4247e2c96158af728766b4bc59019dec7d2264f337ab685aa
                                                      • Opcode Fuzzy Hash: 5a72870fb0fd40d25e8a96cbbde3e387e9bdd3f5c203b378d1824ceaa58ed753
                                                      • Instruction Fuzzy Hash: 1D2133B2E00315EFDB109F96EC55BAD7FB6FB49B90F00112AF500AA660D7B10A44CF94
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0062BB4E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: p#o$p#o$p#o$p#o$p%o$p%o$x#o$x#o
                                                      • API String ID: 1385522511-1468649385
                                                      • Opcode ID: 3781ca5b88803a32d95349e6dc67a17fd37b5957ac230dee5d74a449f2b26533
                                                      • Instruction ID: b9adbddb790c8b9ad49232861707227aa3b49ce8b8e4c1e2e81fc90a1fb67ae5
                                                      • Opcode Fuzzy Hash: 3781ca5b88803a32d95349e6dc67a17fd37b5957ac230dee5d74a449f2b26533
                                                      • Instruction Fuzzy Hash: 8432DC71A0062ADFEB20CF54D894ABEB7B7EF45310F149059E909AB351C774AD82CFA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 650 623170-623185 651 623187-62318a 650->651 652 6231e5-6231e7 650->652 654 6231eb 651->654 655 62318c-623193 651->655 652->651 653 6231e9 652->653 656 6231d0-6231d8 DefWindowProcW 653->656 657 6231f1-6231f6 654->657 658 662dfb-662e23 call 6218e2 call 63e499 654->658 659 623265-62326d PostQuitMessage 655->659 660 623199-62319e 655->660 663 6231de-6231e4 656->663 665 6231f8-6231fb 657->665 666 62321d-623244 SetTimer RegisterWindowMessageW 657->666 693 662e28-662e2f 658->693 664 623219-62321b 659->664 661 6231a4-6231a8 660->661 662 662e7c-662e90 call 68bf30 660->662 669 6231ae-6231b3 661->669 670 662e68-662e77 call 68c161 661->670 662->664 687 662e96 662->687 664->663 673 623201-623214 KillTimer call 6230f2 call 623c50 665->673 674 662d9c-662d9f 665->674 666->664 671 623246-623251 CreatePopupMenu 666->671 676 662e4d-662e54 669->676 677 6231b9-6231be 669->677 670->664 671->664 673->664 679 662dd7-662df6 MoveWindow 674->679 680 662da1-662da5 674->680 676->656 690 662e5a-662e63 call 680ad7 676->690 685 623253-623263 call 62326f 677->685 686 6231c4-6231ca 677->686 679->664 688 662dc6-662dd2 SetFocus 680->688 689 662da7-662daa 680->689 685->664 686->656 686->693 687->656 688->664 689->686 694 662db0-662dc1 call 6218e2 689->694 690->656 693->656 698 662e35-662e48 call 6230f2 call 623837 693->698 694->664 698->656
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0062316A,?,?), ref: 006231D8
                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,0062316A,?,?), ref: 00623204
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00623227
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0062316A,?,?), ref: 00623232
                                                      • CreatePopupMenu.USER32 ref: 00623246
                                                      • PostQuitMessage.USER32(00000000), ref: 00623267
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: 077ea2a4db6220d51169a67afd2b17528d77c52c182f8937950653b11ba992de
                                                      • Instruction ID: 22a7075cde8282e2f97fc806ee7285acad4282c61fb2c90dc78d8958749e6380
                                                      • Opcode Fuzzy Hash: 077ea2a4db6220d51169a67afd2b17528d77c52c182f8937950653b11ba992de
                                                      • Instruction Fuzzy Hash: 0E414D31204A39EBDB141B78BC2DBB93A5BEB07390F041129F54199392CB7ACB41DFA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: D%o$D%o$D%o$D%o$D%oD%o$Variable must be of type 'Object'.
                                                      • API String ID: 0-87526932
                                                      • Opcode ID: cfaa95854ec6473a512b23b72d805a4697ec7e9b940273ddab47b7c5b6c04744
                                                      • Instruction ID: 3c2d5e2dfe16f54d4acb31ee5fee046b5ed744aaafac403eff72658b8f2ff62d
                                                      • Opcode Fuzzy Hash: cfaa95854ec6473a512b23b72d805a4697ec7e9b940273ddab47b7c5b6c04744
                                                      • Instruction Fuzzy Hash: 25C27B71E00625CFCB24CF98D880AADB7B2BF08310F248569E955AB391D376ED42CF95

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1216 144e0d0-144e17e call 144baa0 1219 144e185-144e1ab call 144efe0 CreateFileW 1216->1219 1222 144e1b2-144e1c2 1219->1222 1223 144e1ad 1219->1223 1231 144e1c4 1222->1231 1232 144e1c9-144e1e3 VirtualAlloc 1222->1232 1224 144e2fd-144e301 1223->1224 1225 144e343-144e346 1224->1225 1226 144e303-144e307 1224->1226 1228 144e349-144e350 1225->1228 1229 144e313-144e317 1226->1229 1230 144e309-144e30c 1226->1230 1233 144e3a5-144e3ba 1228->1233 1234 144e352-144e35d 1228->1234 1235 144e327-144e32b 1229->1235 1236 144e319-144e323 1229->1236 1230->1229 1231->1224 1237 144e1e5 1232->1237 1238 144e1ea-144e201 ReadFile 1232->1238 1243 144e3bc-144e3c7 VirtualFree 1233->1243 1244 144e3ca-144e3d2 1233->1244 1241 144e361-144e36d 1234->1241 1242 144e35f 1234->1242 1245 144e32d-144e337 1235->1245 1246 144e33b 1235->1246 1236->1235 1237->1224 1239 144e203 1238->1239 1240 144e208-144e248 VirtualAlloc 1238->1240 1239->1224 1247 144e24f-144e26a call 144f230 1240->1247 1248 144e24a 1240->1248 1249 144e381-144e38d 1241->1249 1250 144e36f-144e37f 1241->1250 1242->1233 1243->1244 1245->1246 1246->1225 1256 144e275-144e27f 1247->1256 1248->1224 1253 144e38f-144e398 1249->1253 1254 144e39a-144e3a0 1249->1254 1252 144e3a3 1250->1252 1252->1228 1253->1252 1254->1252 1257 144e281-144e2b0 call 144f230 1256->1257 1258 144e2b2-144e2c6 call 144f040 1256->1258 1257->1256 1264 144e2c8 1258->1264 1265 144e2ca-144e2ce 1258->1265 1264->1224 1266 144e2d0-144e2d4 CloseHandle 1265->1266 1267 144e2da-144e2de 1265->1267 1266->1267 1268 144e2e0-144e2eb VirtualFree 1267->1268 1269 144e2ee-144e2f7 1267->1269 1268->1269 1269->1219 1269->1224
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0144E1A1
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0144E3C7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2190890557.000000000144B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0144B000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_144b000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateFileFreeVirtual
                                                      • String ID:
                                                      • API String ID: 204039940-0
                                                      • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                                      • Instruction ID: 169aafbbd8105d4914a840d07e6f738c153792716141d414fb07d0609d5ad920
                                                      • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                                      • Instruction Fuzzy Hash: 46A10A74E00209EFEB14CFA4C994BEEBBB5FF48304F20855AE601BB291D7799A41CB54

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1280 622c63-622cd3 CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00622C91
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00622CB2
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00621CAD,?), ref: 00622CC6
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00621CAD,?), ref: 00622CCF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 5eb406b259f3ce5f74b1b57f63346163ef13753388b2e2d2a033e6a520e83993
                                                      • Instruction ID: 67cf32ad3193daa0ba19d775da39da9c7dd2b7d872f7a32b1c72dc079cdd0494
                                                      • Opcode Fuzzy Hash: 5eb406b259f3ce5f74b1b57f63346163ef13753388b2e2d2a033e6a520e83993
                                                      • Instruction Fuzzy Hash: 55F0D077544290BBE73117176C08E772E7FD7C7FB0B011059F900DA560C6611850DA70

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1395 144de50-144dfc6 call 144baa0 call 144dd40 CreateFileW 1402 144dfcd-144dfdd 1395->1402 1403 144dfc8 1395->1403 1406 144dfe4-144dffe VirtualAlloc 1402->1406 1407 144dfdf 1402->1407 1404 144e07d-144e082 1403->1404 1408 144e000 1406->1408 1409 144e002-144e019 ReadFile 1406->1409 1407->1404 1408->1404 1410 144e01d-144e057 call 144dd80 call 144cd40 1409->1410 1411 144e01b 1409->1411 1416 144e073-144e07b ExitProcess 1410->1416 1417 144e059-144e06e call 144ddd0 1410->1417 1411->1404 1416->1404 1417->1416
                                                      APIs
                                                        • Part of subcall function 0144DD40: Sleep.KERNELBASE(000001F4), ref: 0144DD51
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0144DFB9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2190890557.000000000144B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0144B000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_144b000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateFileSleep
                                                      • String ID: 7M4RX7I3VOAR2M7JW9UPVMO4L
                                                      • API String ID: 2694422964-1063000210
                                                      • Opcode ID: f7a842ef1d44a2586c82e088afb30fecc0e690cf6034310ffb94b7222bed2f36
                                                      • Instruction ID: d8fcfbd0dbe79587bdea228e2cf7f3af230f0c87d4b91a121abb67631e9ba3c5
                                                      • Opcode Fuzzy Hash: f7a842ef1d44a2586c82e088afb30fecc0e690cf6034310ffb94b7222bed2f36
                                                      • Instruction Fuzzy Hash: A0618470D04288DBEF11DBF4D844BEFBB75AF19304F00419AE258BB2C1D6BA1A45CB66

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1729 623b1c-623b27 1730 623b99-623b9b 1729->1730 1731 623b29-623b2e 1729->1731 1733 623b8c-623b8f 1730->1733 1731->1730 1732 623b30-623b48 RegOpenKeyExW 1731->1732 1732->1730 1734 623b4a-623b69 RegQueryValueExW 1732->1734 1735 623b80-623b8b RegCloseKey 1734->1735 1736 623b6b-623b76 1734->1736 1735->1733 1737 623b90-623b97 1736->1737 1738 623b78-623b7a 1736->1738 1739 623b7e 1737->1739 1738->1739 1739->1735
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00623B0F,SwapMouseButtons,00000004,?), ref: 00623B40
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00623B0F,SwapMouseButtons,00000004,?), ref: 00623B61
                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00623B0F,SwapMouseButtons,00000004,?), ref: 00623B83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: 1b6fd048a73b3749c5652ad64d46ffe5ac6adedaa2f9f7558ff683b0ce8ee04d
                                                      • Instruction ID: 24c3f902ac722796115816021b851045ef3a474c44dd72efa84defd750393e18
                                                      • Opcode Fuzzy Hash: 1b6fd048a73b3749c5652ad64d46ffe5ac6adedaa2f9f7558ff683b0ce8ee04d
                                                      • Instruction Fuzzy Hash: EE115AB5510628FFDB208FA5EC44AEEB7B9EF24795B108559B801D7210D3319F409B60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1740 144cd40-144cde0 call 144f210 * 3 1747 144cdf7 1740->1747 1748 144cde2-144cdec 1740->1748 1750 144cdfe-144ce07 1747->1750 1748->1747 1749 144cdee-144cdf5 1748->1749 1749->1750 1751 144ce0e-144d4c0 1750->1751 1752 144d4c2-144d4c6 1751->1752 1753 144d4d3-144d500 1751->1753 1754 144d50c-144d539 1752->1754 1755 144d4c8-144d4cc 1752->1755 1767 144d502-144d505 1753->1767 1768 144d50a 1753->1768 1777 144d543 1754->1777 1778 144d53b-144d53e 1754->1778 1756 144d545-144d572 CreateProcessW 1755->1756 1757 144d4ce 1755->1757 1760 144d57c-144d596 Wow64GetThreadContext 1756->1760 1770 144d574-144d577 1756->1770 1757->1760 1762 144d59d-144d5b8 ReadProcessMemory 1760->1762 1763 144d598 1760->1763 1765 144d5bf-144d5c8 1762->1765 1766 144d5ba 1762->1766 1771 144d8aa-144d8ae 1763->1771 1773 144d5f1-144d610 call 144e890 1765->1773 1774 144d5ca-144d5d9 1765->1774 1766->1771 1772 144d901-144d903 1767->1772 1768->1760 1770->1772 1775 144d8b0-144d8b4 1771->1775 1776 144d8ff 1771->1776 1789 144d617-144d63a call 144e9d0 1773->1789 1790 144d612 1773->1790 1774->1773 1779 144d5db-144d5ea call 144e7e0 1774->1779 1780 144d8b6-144d8c2 1775->1780 1781 144d8c9-144d8cd 1775->1781 1776->1772 1777->1760 1778->1772 1779->1773 1795 144d5ec 1779->1795 1780->1781 1785 144d8cf-144d8d2 1781->1785 1786 144d8d9-144d8dd 1781->1786 1785->1786 1791 144d8df-144d8e2 1786->1791 1792 144d8e9-144d8ed 1786->1792 1799 144d684-144d6a5 call 144e9d0 1789->1799 1800 144d63c-144d643 1789->1800 1790->1771 1791->1792 1793 144d8ef-144d8f5 call 144e7e0 1792->1793 1794 144d8fa-144d8fd 1792->1794 1793->1794 1794->1772 1795->1771 1807 144d6a7 1799->1807 1808 144d6ac-144d6ca call 144f230 1799->1808 1802 144d645-144d676 call 144e9d0 1800->1802 1803 144d67f 1800->1803 1809 144d67d 1802->1809 1810 144d678 1802->1810 1803->1771 1807->1771 1813 144d6d5-144d6df 1808->1813 1809->1799 1810->1771 1814 144d715-144d719 1813->1814 1815 144d6e1-144d713 call 144f230 1813->1815 1816 144d804-144d821 call 144e3e0 1814->1816 1817 144d71f-144d72f 1814->1817 1815->1813 1825 144d823 1816->1825 1826 144d828-144d847 Wow64SetThreadContext 1816->1826 1817->1816 1820 144d735-144d745 1817->1820 1820->1816 1823 144d74b-144d76f 1820->1823 1827 144d772-144d776 1823->1827 1825->1771 1828 144d849 1826->1828 1829 144d84b-144d856 call 144e710 1826->1829 1827->1816 1830 144d77c-144d791 1827->1830 1828->1771 1836 144d858 1829->1836 1837 144d85a-144d85e 1829->1837 1832 144d7a5-144d7a9 1830->1832 1834 144d7e7-144d7ff 1832->1834 1835 144d7ab-144d7b7 1832->1835 1834->1827 1838 144d7e5 1835->1838 1839 144d7b9-144d7e3 1835->1839 1836->1771 1840 144d860-144d863 1837->1840 1841 144d86a-144d86e 1837->1841 1838->1832 1839->1838 1840->1841 1843 144d870-144d873 1841->1843 1844 144d87a-144d87e 1841->1844 1843->1844 1845 144d880-144d883 1844->1845 1846 144d88a-144d88e 1844->1846 1845->1846 1847 144d890-144d896 call 144e7e0 1846->1847 1848 144d89b-144d8a4 1846->1848 1847->1848 1848->1751 1848->1771
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0144D56D
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0144D591
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0144D5B3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2190890557.000000000144B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0144B000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_144b000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                                                      • Instruction ID: 1f882f35efe6a6d0082cf8b58ce87107ae08d3e68f6e20f91319a7a1cd8bee40
                                                      • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                                                      • Instruction Fuzzy Hash: 6A62FD70E142589BEB24DFA4C850BDEB772EF68300F1091A9D10DEB3A4E7759E81CB59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1850 623923-623939 1851 623a13-623a17 1850->1851 1852 62393f-623954 call 626270 1850->1852 1855 663393-6633a2 LoadStringW 1852->1855 1856 62395a-623976 call 626b57 1852->1856 1858 6633ad-6633b6 1855->1858 1862 62397c-623980 1856->1862 1863 6633c9-6633e5 call 626350 call 623fcf 1856->1863 1860 623994-623a0e call 642340 call 623a18 call 644983 Shell_NotifyIconW call 62988f 1858->1860 1861 6633bc-6633c4 call 62a8c7 1858->1861 1860->1851 1861->1860 1862->1858 1865 623986-62398f call 626350 1862->1865 1863->1860 1876 6633eb-663409 call 6233c6 call 623fcf call 6233c6 1863->1876 1865->1860 1876->1860
                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006633A2
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00623A04
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                      • String ID: Line:
                                                      • API String ID: 2289894680-1585850449
                                                      • Opcode ID: 6d578ee521632213277aec78811781de27e180eb6a4f480715924bf9f99abc32
                                                      • Instruction ID: 73e94b7e76f5712881a40e74d219f512e9a07bd8367a4ff31184c2ffc0850ec4
                                                      • Opcode Fuzzy Hash: 6d578ee521632213277aec78811781de27e180eb6a4f480715924bf9f99abc32
                                                      • Instruction Fuzzy Hash: 6E310471408774AAC365EB10EC45BEB73DAAB42350F00592EF599922D1EB749748CFC6
                                                      APIs
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00662C8C
                                                        • Part of subcall function 00623AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00623A97,?,?,00622E7F,?,?,?,00000000), ref: 00623AC2
                                                        • Part of subcall function 00622DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00622DC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen
                                                      • String ID: X$`en
                                                      • API String ID: 779396738-457593827
                                                      • Opcode ID: 7427e6390a152410bfe7e1897e723441615709744cda220c4069473bfe58beb1
                                                      • Instruction ID: c097a8fe5dad90c754641908131c3187923ee85ce097209e5bbd1844c008b78d
                                                      • Opcode Fuzzy Hash: 7427e6390a152410bfe7e1897e723441615709744cda220c4069473bfe58beb1
                                                      • Instruction Fuzzy Hash: 12210870A006A89FCB41EF94D805BEE7BFAAF49314F00801DF404B7341DBB856498FA5
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00640668
                                                        • Part of subcall function 006432A4: RaiseException.KERNEL32(?,?,?,0064068A,?,006F1444,?,?,?,?,?,?,0064068A,00621129,006E8738,00621129), ref: 00643304
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00640685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: Unknown exception
                                                      • API String ID: 3476068407-410509341
                                                      • Opcode ID: 34dd766842190c31eb34e78b4362ee4e53273c707d9f4a237652444194e19d9a
                                                      • Instruction ID: 4c7ee97eaf05392f768bcf4bf0264cf008bb78657700e3fb420098b40cc6f79d
                                                      • Opcode Fuzzy Hash: 34dd766842190c31eb34e78b4362ee4e53273c707d9f4a237652444194e19d9a
                                                      • Instruction Fuzzy Hash: 45F0C23490030DB7CB44BB64EC4AC9E7B6F9E40310F604539BA18966A2EF71DB66CAC4
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 006A82F5
                                                      • TerminateProcess.KERNEL32(00000000), ref: 006A82FC
                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 006A84DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                      • String ID:
                                                      • API String ID: 146820519-0
                                                      • Opcode ID: 76e8e15d96d4704b958c0ed7b940a1547a05eac9177ab7a0104d5c02325d40f5
                                                      • Instruction ID: b5afb66d470a7fe32f3409f14de21af9382e84af05694045a39c561787893cea
                                                      • Opcode Fuzzy Hash: 76e8e15d96d4704b958c0ed7b940a1547a05eac9177ab7a0104d5c02325d40f5
                                                      • Instruction Fuzzy Hash: D91248719083019FC754DF28C484B6ABBE6BF89318F14895DE8998B352DB31ED45CF92
                                                      APIs
                                                        • Part of subcall function 00621BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00621BF4
                                                        • Part of subcall function 00621BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00621BFC
                                                        • Part of subcall function 00621BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00621C07
                                                        • Part of subcall function 00621BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00621C12
                                                        • Part of subcall function 00621BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00621C1A
                                                        • Part of subcall function 00621BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00621C22
                                                        • Part of subcall function 00621B4A: RegisterWindowMessageW.USER32(00000004,?,006212C4), ref: 00621BA2
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0062136A
                                                      • OleInitialize.OLE32 ref: 00621388
                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 006624AB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID:
                                                      • API String ID: 1986988660-0
                                                      • Opcode ID: 7e92e4ab428119bdb6dfbc77a28ed771439c84d1daf09f191df34c8730bd44d0
                                                      • Instruction ID: 9340b5fea94e39e5af6831cd62023ce03e2b3e9df06122cddb57a609f506288f
                                                      • Opcode Fuzzy Hash: 7e92e4ab428119bdb6dfbc77a28ed771439c84d1daf09f191df34c8730bd44d0
                                                      • Instruction Fuzzy Hash: 1371C6F4915204CFC384EF7AA9456B53AE3BBAB3D4704A22E902ACF361EB314545CF44
                                                      APIs
                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,006585CC,?,006E8CC8,0000000C), ref: 00658704
                                                      • GetLastError.KERNEL32(?,006585CC,?,006E8CC8,0000000C), ref: 0065870E
                                                      • __dosmaperr.LIBCMT ref: 00658739
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2583163307-0
                                                      • Opcode ID: 292e9cee28ec0bb78a9a3f97150faa35ae1087d50a9b0a31e0e84f5880aa76c4
                                                      • Instruction ID: db131a51b37974e17911fb1c893d3ab0cec9656486d3b55724e668fcf7d2edc4
                                                      • Opcode Fuzzy Hash: 292e9cee28ec0bb78a9a3f97150faa35ae1087d50a9b0a31e0e84f5880aa76c4
                                                      • Instruction Fuzzy Hash: 25012B32A056201FD7A46334A8597BE678B4F91776F39021DFC19AB6D3EEA08C89C154
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 006317F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: CALL
                                                      • API String ID: 1385522511-4196123274
                                                      • Opcode ID: d675e1088af43673eaee41e6e1b0483eedc1e697072b2217be8980bbc066178e
                                                      • Instruction ID: 651cc06d1f07f6b343f7ca8d1a4a8acfc88ec8902b7f6070bb1901308f6fa1b0
                                                      • Opcode Fuzzy Hash: d675e1088af43673eaee41e6e1b0483eedc1e697072b2217be8980bbc066178e
                                                      • Instruction Fuzzy Hash: FF229CB06086019FC714DF14C490A6ABBF3BF8A314F18896DF49A8B362D771E945CF96
                                                      APIs
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00623908
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_
                                                      • String ID:
                                                      • API String ID: 1144537725-0
                                                      • Opcode ID: 33cd5b22cfca856ae93825a2606d0fa0d4ecd227fae10f446758fa9398f5715d
                                                      • Instruction ID: 3508039d9e235552edb896a1da5acb685014b945c09c29ec93cb5402e9f85f5d
                                                      • Opcode Fuzzy Hash: 33cd5b22cfca856ae93825a2606d0fa0d4ecd227fae10f446758fa9398f5715d
                                                      • Instruction Fuzzy Hash: DF319FB1604721DFD320DF24D8847A7BBE9FB4A358F00092EF5998B340E775AA44CB52
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0062949C,?,00008000), ref: 00625773
                                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0062949C,?,00008000), ref: 00664052
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 95f62530fdb02dbab4ecaaa26dcd63ec96c333ba13827c099f36a82c88e69b3c
                                                      • Instruction ID: dafa8a60b7d0f11c4f897391b1d26251bb4eaf5f26d14cd21476269e2c83a7ae
                                                      • Opcode Fuzzy Hash: 95f62530fdb02dbab4ecaaa26dcd63ec96c333ba13827c099f36a82c88e69b3c
                                                      • Instruction Fuzzy Hash: A7014031185635B6E3315A2ADC0EF977F99EF067B0F148310BA9D6E1E0CBB45855CB90
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0144D56D
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0144D591
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0144D5B3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2190890557.000000000144B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0144B000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_144b000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                                                      • Instruction ID: 4978762ccf9877695703aa6e38baf18baa1a8c8436b53bcf922cc03c1213a1ea
                                                      • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                                                      • Instruction Fuzzy Hash: 0612CD24E24658C7EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4E85CF5A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LoadString
                                                      • String ID:
                                                      • API String ID: 2948472770-0
                                                      • Opcode ID: 30c60319cf8c0abcdd70b876c9e87266a96ed16ef83f4e965d3e2a63be8c7774
                                                      • Instruction ID: 8bad74de9dc79f4b12a5bcae543e0f142c7354255961c602432a960db84c2685
                                                      • Opcode Fuzzy Hash: 30c60319cf8c0abcdd70b876c9e87266a96ed16ef83f4e965d3e2a63be8c7774
                                                      • Instruction Fuzzy Hash: 40D13875A04209EFCF14EF98D8819AEBBB6FF49310F154059E905AB391DB30AD82CF94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: b0cfcdaf032f5cc54923488a178d216f4993d2c184263e3b98ede12234f6db83
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: E931D175A0010A9BC718CF59D4849AAFBB6FF49300F2496A5E80ACB756DB31EDC1CBC0
                                                      APIs
                                                        • Part of subcall function 00624E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00624EDD,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624E9C
                                                        • Part of subcall function 00624E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00624EAE
                                                        • Part of subcall function 00624E90: FreeLibrary.KERNEL32(00000000,?,?,00624EDD,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624EC0
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624EFD
                                                        • Part of subcall function 00624E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00663CDE,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624E62
                                                        • Part of subcall function 00624E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00624E74
                                                        • Part of subcall function 00624E59: FreeLibrary.KERNEL32(00000000,?,?,00663CDE,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624E87
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressFreeProc
                                                      • String ID:
                                                      • API String ID: 2632591731-0
                                                      • Opcode ID: 4ce8943872f7e8d4cb6f637fe7bece55ac24a19551377989d76055cfba907c40
                                                      • Instruction ID: e8e2342a1078d3582617c5b2c27528dd2950921836bb75624f6581368997e7e2
                                                      • Opcode Fuzzy Hash: 4ce8943872f7e8d4cb6f637fe7bece55ac24a19551377989d76055cfba907c40
                                                      • Instruction Fuzzy Hash: 9F112731600A25AADF24AB60ED02FED77A7AFC0710F10842DF542A61C1DE719E459F58
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: __wsopen_s
                                                      • String ID:
                                                      • API String ID: 3347428461-0
                                                      • Opcode ID: 6ae900825d20df77095962f755b15272eb9b8b9d94a307f0f2a7e0419bd4923c
                                                      • Instruction ID: 3209c4dce86c6cd97358b7d7041c0e1c525c9ff5f2b516fe933288e4c1755580
                                                      • Opcode Fuzzy Hash: 6ae900825d20df77095962f755b15272eb9b8b9d94a307f0f2a7e0419bd4923c
                                                      • Instruction Fuzzy Hash: DA11487190410AAFCB05DF58E9409DA7BFAEF48300F104069FC09AB312DA31DA15CBA4
                                                      APIs
                                                        • Part of subcall function 00654C7D: RtlAllocateHeap.NTDLL(00000008,00621129,00000000,?,00652E29,00000001,00000364,?,?,?,0064F2DE,00653863,006F1444,?,0063FDF5,?), ref: 00654CBE
                                                      • _free.LIBCMT ref: 0065506C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                      • Instruction ID: b9e677510ddb9149ff2787e6a38f658874e1115789a0b56969681c37db4d3f83
                                                      • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                      • Instruction Fuzzy Hash: 4F014E722047055BE3318F55D84599AFBEEFB85371F25051DE985933C0EA306849C774
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                      • Instruction ID: 63ecc962419e7369a56c3d555e7192fb14f0334048a8372b286d19f8d063486c
                                                      • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                      • Instruction Fuzzy Hash: C9F02832910A109AC7713A799C05B9B339FAF62336F11071DFC25A32D2CF75D80686AD
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID:
                                                      • API String ID: 176396367-0
                                                      • Opcode ID: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                                      • Instruction ID: 92303df73eddc76c832b1ac3d4ba4327512dfbbc323b2c367630f0c17dbccb5a
                                                      • Opcode Fuzzy Hash: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                                      • Instruction Fuzzy Hash: 01F0C8B3600A117ED7149F29D806BA7BB95EF44760F10852EF619CB2D1DB71E5108BF4
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,00621129,00000000,?,00652E29,00000001,00000364,?,?,?,0064F2DE,00653863,006F1444,?,0063FDF5,?), ref: 00654CBE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 1c89f3419b2deecc764dedaacccdcdf5390c4b77281b9b5d7a022690f8e25c20
                                                      • Instruction ID: 32c38f290fa5fa521d173c74891ece959ed6d01bcb0428981035e00c37bfd633
                                                      • Opcode Fuzzy Hash: 1c89f3419b2deecc764dedaacccdcdf5390c4b77281b9b5d7a022690f8e25c20
                                                      • Instruction Fuzzy Hash: 61F0E93160222467DB215F62DC05B9B378BBFC17BAF144195BC15AB380CE71D88986E0
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,006F1444,?,0063FDF5,?,?,0062A976,00000010,006F1440,006213FC,?,006213C6,?,00621129), ref: 00653852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 866a3a3e6061f343655691f8a9c29d0b4c3f2c0872a5afdd8f9ccdc5dea465ae
                                                      • Instruction ID: 1aa7d1a842f37e1bfcd4b98e6263d2a6eb12c9f6d813716d92dc978e7adebf64
                                                      • Opcode Fuzzy Hash: 866a3a3e6061f343655691f8a9c29d0b4c3f2c0872a5afdd8f9ccdc5dea465ae
                                                      • Instruction Fuzzy Hash: 04E0E531100234A6D73526669C01BDB364FAF42FF2F050125BC55A7780CF51DE0582E4
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624F6D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 3181ce711683881a714a63cdf82bc2c9f566f2769beb07b4f9e3b0e0feba4a77
                                                      • Instruction ID: b1142f93e4c83d449df3bf9742ae0c90ecafba3979d40dc2eb31103d4d2ada9e
                                                      • Opcode Fuzzy Hash: 3181ce711683881a714a63cdf82bc2c9f566f2769beb07b4f9e3b0e0feba4a77
                                                      • Instruction Fuzzy Hash: 0FF03071105B62CFDB349F64E590852B7E6FF94329310C97EE1EA82611CB319884DF10
                                                      APIs
                                                      • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,0066EE51,006E3630,00000002), ref: 0068CD26
                                                        • Part of subcall function 0068CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,0068CD19,?,?,?), ref: 0068CC59
                                                        • Part of subcall function 0068CC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,0068CD19,?,?,?,?,0066EE51,006E3630,00000002), ref: 0068CC6E
                                                        • Part of subcall function 0068CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,0068CD19,?,?,?,?,0066EE51,006E3630,00000002), ref: 0068CC7A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$Write
                                                      • String ID:
                                                      • API String ID: 3847668363-0
                                                      • Opcode ID: 3eaf85fe66cd92caf1a5c8720ec6a9ea78e04a589521baf9e4b28123adee7e26
                                                      • Instruction ID: 3f340729fe833fdb858763f7ba014113fea352b7a84ebdef3910060330ef466e
                                                      • Opcode Fuzzy Hash: 3eaf85fe66cd92caf1a5c8720ec6a9ea78e04a589521baf9e4b28123adee7e26
                                                      • Instruction Fuzzy Hash: 63E06D7A400704EFC721AF9ADD008AAFBF9FF84360710862FE996D2510D3B1AA54DB60
                                                      APIs
                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00622DC4
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_wcslen
                                                      • String ID:
                                                      • API String ID: 541455249-0
                                                      • Opcode ID: 41fd4c5b895bda6ba6a069127ba61c0e6c743e8b0614fde2dbbc64d3992c0b2e
                                                      • Instruction ID: 7738bde89edfa1ddd1dd1961d6f92651373f45b13d91a9bcff5fc64386a56867
                                                      • Opcode Fuzzy Hash: 41fd4c5b895bda6ba6a069127ba61c0e6c743e8b0614fde2dbbc64d3992c0b2e
                                                      • Instruction Fuzzy Hash: 58E0CD726001245BC7209258DC05FDA77DEDFC8790F044175FD09D7248D970AD808654
                                                      APIs
                                                        • Part of subcall function 00623837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00623908
                                                        • Part of subcall function 0062D730: GetInputState.USER32 ref: 0062D807
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00622B6B
                                                        • Part of subcall function 006230F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0062314E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                      • String ID:
                                                      • API String ID: 3667716007-0
                                                      • Opcode ID: f8fa5ae1d360baf251960001ad7d4cda4c052c8ead99089dc6553d74ca004807
                                                      • Instruction ID: b7d0a274c3d11d668b67e285c719bd0837534ca193e1a69fb471facf3c24b976
                                                      • Opcode Fuzzy Hash: f8fa5ae1d360baf251960001ad7d4cda4c052c8ead99089dc6553d74ca004807
                                                      • Instruction Fuzzy Hash: 70E0262130063806C748BB34B8124BDA78B9BE2391F40293EF14247262CF2C46458A69
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,00660704,?,?,00000000,?,00660704,00000000,0000000C), ref: 006603B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 2cd898fcb9d5fe5a1732fe9210498c9e208f5904e82b3e8e860bf6a56b774d7d
                                                      • Instruction ID: 1ee46f6a5c1661707ad282079bd517a34e0f18a8b685a8f82ffec695e8971b48
                                                      • Opcode Fuzzy Hash: 2cd898fcb9d5fe5a1732fe9210498c9e208f5904e82b3e8e860bf6a56b774d7d
                                                      • Instruction Fuzzy Hash: 0AD06C3204010DBBDF028F84DD06EDA3BAAFB48714F014100BE1866020C732E961AB90
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00621CBC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem
                                                      • String ID:
                                                      • API String ID: 3098949447-0
                                                      • Opcode ID: e7c733d0316448621080d15d0a30458d8edf973d23a2d9be5cccf4d41c77fb79
                                                      • Instruction ID: c5634df2fa9bf507ed243db154a1573466663a1962a9130a05580eb37d08c07b
                                                      • Opcode Fuzzy Hash: e7c733d0316448621080d15d0a30458d8edf973d23a2d9be5cccf4d41c77fb79
                                                      • Instruction Fuzzy Hash: F9C09277280306EFF3248B84BC5AF207766A348B10F04A001F609A95E3C3A22870EA60
                                                      APIs
                                                        • Part of subcall function 00625745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0062949C,?,00008000), ref: 00625773
                                                      • GetLastError.KERNEL32(00000002,00000000), ref: 006976DE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorFileLast
                                                      • String ID:
                                                      • API String ID: 1214770103-0
                                                      • Opcode ID: 8a6a88ff841e2b0d1c7d202d23ac441dd05a7bfd550b3e7513c70949663c7068
                                                      • Instruction ID: b64d9d30ea32cfc3a809102ad2d20968583626b3976b585722a3f639d1b92881
                                                      • Opcode Fuzzy Hash: 8a6a88ff841e2b0d1c7d202d23ac441dd05a7bfd550b3e7513c70949663c7068
                                                      • Instruction Fuzzy Hash: 1281DF30608B119FCB54EF28D491AA9B7E6BF88310F04452CF8865B792DB30ED45CF96
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 0144DD51
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2190890557.000000000144B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0144B000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_144b000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                      • Instruction ID: e2d6f9dd3e3c6b61aabaa2a69d7e6c8ab94721557ebd363084ed8eb198d87808
                                                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                      • Instruction Fuzzy Hash: B5E09A7494010DAFDB10EFA8DA496AE7BB4EF04301F1005A1FD0597691DA309A548A62
                                                      APIs
                                                      • CloseHandle.KERNELBASE(?,?,00000000,006624E0), ref: 00626266
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: d5dab0f3bb0d272c446939f10c397cb1eab1ae4acfe0c82a37d659baa2f63f2d
                                                      • Instruction ID: d85b5e794daf610e08c04afae9315a90c2ee997b4838526c4ad5501a21ef0109
                                                      • Opcode Fuzzy Hash: d5dab0f3bb0d272c446939f10c397cb1eab1ae4acfe0c82a37d659baa2f63f2d
                                                      • Instruction Fuzzy Hash: D1E0B675401B11CFC3358F1AE804452FBF6FFE13613204A2EE0E592664D3B059868F50
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 0144DD51
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2190890557.000000000144B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0144B000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_144b000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction ID: b1c95eda2563496a4e77f2e4a733b6ebab7bdbdeba07b18c2245ccf88330391c
                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction Fuzzy Hash: C4E0E67494010DDFDB00EFF8DA496AE7FB4EF04301F100161FD01D2281D6309D508A62
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 006B961A
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006B965B
                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 006B969F
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006B96C9
                                                      • SendMessageW.USER32 ref: 006B96F2
                                                      • GetKeyState.USER32(00000011), ref: 006B978B
                                                      • GetKeyState.USER32(00000009), ref: 006B9798
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006B97AE
                                                      • GetKeyState.USER32(00000010), ref: 006B97B8
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006B97E9
                                                      • SendMessageW.USER32 ref: 006B9810
                                                      • SendMessageW.USER32(?,00001030,?,006B7E95), ref: 006B9918
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 006B992E
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 006B9941
                                                      • SetCapture.USER32(?), ref: 006B994A
                                                      • ClientToScreen.USER32(?,?), ref: 006B99AF
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 006B99BC
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006B99D6
                                                      • ReleaseCapture.USER32 ref: 006B99E1
                                                      • GetCursorPos.USER32(?), ref: 006B9A19
                                                      • ScreenToClient.USER32(?,?), ref: 006B9A26
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 006B9A80
                                                      • SendMessageW.USER32 ref: 006B9AAE
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 006B9AEB
                                                      • SendMessageW.USER32 ref: 006B9B1A
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 006B9B3B
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 006B9B4A
                                                      • GetCursorPos.USER32(?), ref: 006B9B68
                                                      • ScreenToClient.USER32(?,?), ref: 006B9B75
                                                      • GetParent.USER32(?), ref: 006B9B93
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 006B9BFA
                                                      • SendMessageW.USER32 ref: 006B9C2B
                                                      • ClientToScreen.USER32(?,?), ref: 006B9C84
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 006B9CB4
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 006B9CDE
                                                      • SendMessageW.USER32 ref: 006B9D01
                                                      • ClientToScreen.USER32(?,?), ref: 006B9D4E
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 006B9D82
                                                        • Part of subcall function 00639944: GetWindowLongW.USER32(?,000000EB), ref: 00639952
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B9E05
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                      • String ID: @GUI_DRAGID$F$p#o
                                                      • API String ID: 3429851547-906295620
                                                      • Opcode ID: 4270961af16c58ad8b0fd7a72910668feafa7f3b671882130a3de364ac229659
                                                      • Instruction ID: 0b5018c297b23331708e5a1e09b8a174fe38aace0b5e7ba940e92bcfc498435e
                                                      • Opcode Fuzzy Hash: 4270961af16c58ad8b0fd7a72910668feafa7f3b671882130a3de364ac229659
                                                      • Instruction Fuzzy Hash: 14429DB0204250AFE724CF24CC44EEABBE6FF4A360F145619F655872A1E771D991CFA1
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 006B48F3
                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 006B4908
                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 006B4927
                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 006B494B
                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 006B495C
                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 006B497B
                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 006B49AE
                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 006B49D4
                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 006B4A0F
                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 006B4A56
                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 006B4A7E
                                                      • IsMenu.USER32(?), ref: 006B4A97
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006B4AF2
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006B4B20
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B4B94
                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 006B4BE3
                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 006B4C82
                                                      • wsprintfW.USER32 ref: 006B4CAE
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006B4CC9
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 006B4CF1
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006B4D13
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006B4D33
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 006B4D5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                      • String ID: %d/%02d/%02d
                                                      • API String ID: 4054740463-328681919
                                                      • Opcode ID: f5f4c30166a475c15e06d734f18dcd1c2e5ff8ca16bccaccd3a125810576cfbe
                                                      • Instruction ID: 3c8022bbc1a36867a17e19479eab2e5c3d78cd346d9499ead5b017370d6fee7f
                                                      • Opcode Fuzzy Hash: f5f4c30166a475c15e06d734f18dcd1c2e5ff8ca16bccaccd3a125810576cfbe
                                                      • Instruction Fuzzy Hash: 2D12B1B1500215ABEB259F28CC49FEE7BBAEF85710F104219F515EB2A2DF749A81CB50
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0063F998
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0067F474
                                                      • IsIconic.USER32(00000000), ref: 0067F47D
                                                      • ShowWindow.USER32(00000000,00000009), ref: 0067F48A
                                                      • SetForegroundWindow.USER32(00000000), ref: 0067F494
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0067F4AA
                                                      • GetCurrentThreadId.KERNEL32 ref: 0067F4B1
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0067F4BD
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0067F4CE
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0067F4D6
                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0067F4DE
                                                      • SetForegroundWindow.USER32(00000000), ref: 0067F4E1
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0067F4F6
                                                      • keybd_event.USER32(00000012,00000000), ref: 0067F501
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0067F50B
                                                      • keybd_event.USER32(00000012,00000000), ref: 0067F510
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0067F519
                                                      • keybd_event.USER32(00000012,00000000), ref: 0067F51E
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0067F528
                                                      • keybd_event.USER32(00000012,00000000), ref: 0067F52D
                                                      • SetForegroundWindow.USER32(00000000), ref: 0067F530
                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0067F557
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 4125248594-2988720461
                                                      • Opcode ID: 4dea17565821f4527bd26a7a052cadee3b25e9cce9ee8d95ca1c5062d01b0d9b
                                                      • Instruction ID: 4a3c9ea6b4bdcd35061c2c642a977e86bbf170168f4704ae85ab49ee6d66f18d
                                                      • Opcode Fuzzy Hash: 4dea17565821f4527bd26a7a052cadee3b25e9cce9ee8d95ca1c5062d01b0d9b
                                                      • Instruction Fuzzy Hash: 0C31A8B1A403187FFB306BB58C49FBF7E6EEB44B60F105125FA04E61D1D6B05E50AA60
                                                      APIs
                                                        • Part of subcall function 006816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0068170D
                                                        • Part of subcall function 006816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0068173A
                                                        • Part of subcall function 006816C3: GetLastError.KERNEL32 ref: 0068174A
                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00681286
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 006812A8
                                                      • CloseHandle.KERNEL32(?), ref: 006812B9
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006812D1
                                                      • GetProcessWindowStation.USER32 ref: 006812EA
                                                      • SetProcessWindowStation.USER32(00000000), ref: 006812F4
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00681310
                                                        • Part of subcall function 006810BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006811FC), ref: 006810D4
                                                        • Part of subcall function 006810BF: CloseHandle.KERNEL32(?,?,006811FC), ref: 006810E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                      • String ID: $default$winsta0$Zn
                                                      • API String ID: 22674027-1505778627
                                                      • Opcode ID: a6cfd0fd6d75632b4cd4dcf1cd06c5661c2c581e154636de4865349d9c73b08b
                                                      • Instruction ID: a8b9919c8d000ca7dc8fbf3e626b0df9c9429d407e410e1cc767499cb96a2449
                                                      • Opcode Fuzzy Hash: a6cfd0fd6d75632b4cd4dcf1cd06c5661c2c581e154636de4865349d9c73b08b
                                                      • Instruction Fuzzy Hash: 618195B1900209AFDF21AFA4DC49FEE7BBEEF05714F144229F911BA250D7718A85CB64
                                                      APIs
                                                        • Part of subcall function 006810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00681114
                                                        • Part of subcall function 006810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 00681120
                                                        • Part of subcall function 006810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 0068112F
                                                        • Part of subcall function 006810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 00681136
                                                        • Part of subcall function 006810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0068114D
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00680BCC
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00680C00
                                                      • GetLengthSid.ADVAPI32(?), ref: 00680C17
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00680C51
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00680C6D
                                                      • GetLengthSid.ADVAPI32(?), ref: 00680C84
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00680C8C
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00680C93
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00680CB4
                                                      • CopySid.ADVAPI32(00000000), ref: 00680CBB
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00680CEA
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00680D0C
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00680D1E
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00680D45
                                                      • HeapFree.KERNEL32(00000000), ref: 00680D4C
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00680D55
                                                      • HeapFree.KERNEL32(00000000), ref: 00680D5C
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00680D65
                                                      • HeapFree.KERNEL32(00000000), ref: 00680D6C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00680D78
                                                      • HeapFree.KERNEL32(00000000), ref: 00680D7F
                                                        • Part of subcall function 00681193: GetProcessHeap.KERNEL32(00000008,00680BB1,?,00000000,?,00680BB1,?), ref: 006811A1
                                                        • Part of subcall function 00681193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00680BB1,?), ref: 006811A8
                                                        • Part of subcall function 00681193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00680BB1,?), ref: 006811B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 46ed7a6a01711da8f42e8dfa84b7f09ce82fe08c26cc36032a1d6e8c487d4d45
                                                      • Instruction ID: e8395ba894c9914ab7311f9167c9d88d5f81b4673e6bc18e438d5e4a06dcdf12
                                                      • Opcode Fuzzy Hash: 46ed7a6a01711da8f42e8dfa84b7f09ce82fe08c26cc36032a1d6e8c487d4d45
                                                      • Instruction Fuzzy Hash: 6B7161B190020AAFEF50EFA4DC44FEEBBBABF05310F144615F914A7251D771AA45CB60
                                                      APIs
                                                      • OpenClipboard.USER32(006BCC08), ref: 0069EB29
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0069EB37
                                                      • GetClipboardData.USER32(0000000D), ref: 0069EB43
                                                      • CloseClipboard.USER32 ref: 0069EB4F
                                                      • GlobalLock.KERNEL32(00000000), ref: 0069EB87
                                                      • CloseClipboard.USER32 ref: 0069EB91
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0069EBBC
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0069EBC9
                                                      • GetClipboardData.USER32(00000001), ref: 0069EBD1
                                                      • GlobalLock.KERNEL32(00000000), ref: 0069EBE2
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0069EC22
                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 0069EC38
                                                      • GetClipboardData.USER32(0000000F), ref: 0069EC44
                                                      • GlobalLock.KERNEL32(00000000), ref: 0069EC55
                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0069EC77
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0069EC94
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0069ECD2
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0069ECF3
                                                      • CountClipboardFormats.USER32 ref: 0069ED14
                                                      • CloseClipboard.USER32 ref: 0069ED59
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                      • String ID:
                                                      • API String ID: 420908878-0
                                                      • Opcode ID: 60c6a45b788ae1cebef45a76e88311fdc1bb6a20243dd7056fb86292dfc5d3b3
                                                      • Instruction ID: a45bba5a8dd1a54596e6efd3c93b45537be7cf36a72627c847a8e37d930e8a79
                                                      • Opcode Fuzzy Hash: 60c6a45b788ae1cebef45a76e88311fdc1bb6a20243dd7056fb86292dfc5d3b3
                                                      • Instruction Fuzzy Hash: 8B61E074204202AFD700EF24D884F6A77AAEF84724F14561DF456876A2DB32DE4ACB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 006969BE
                                                      • FindClose.KERNEL32(00000000), ref: 00696A12
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00696A4E
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00696A75
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00696AB2
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00696ADF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                      • API String ID: 3830820486-3289030164
                                                      • Opcode ID: d852e30f868e48698a5f19b0db0d578a241f7d9f9dc4ca6854ca5adfdf427380
                                                      • Instruction ID: a9a0cf298cf555a7e2fe6c4ad6cf898eb2d7c989690da20a220c6adcc134aa91
                                                      • Opcode Fuzzy Hash: d852e30f868e48698a5f19b0db0d578a241f7d9f9dc4ca6854ca5adfdf427380
                                                      • Instruction Fuzzy Hash: A1D160B1508310AFC754EBA0D991EAFB7EEBF88704F04491DF585C6191EB34DA48CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00699663
                                                      • GetFileAttributesW.KERNEL32(?), ref: 006996A1
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 006996BB
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 006996D3
                                                      • FindClose.KERNEL32(00000000), ref: 006996DE
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 006996FA
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0069974A
                                                      • SetCurrentDirectoryW.KERNEL32(006E6B7C), ref: 00699768
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00699772
                                                      • FindClose.KERNEL32(00000000), ref: 0069977F
                                                      • FindClose.KERNEL32(00000000), ref: 0069978F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1409584000-438819550
                                                      • Opcode ID: b74001ed082774f663e0f25361e53f72b770456d997ed3911073f84b03fcac61
                                                      • Instruction ID: 02ab23255515d5ea03f24a77e92306a3b8941b0c4e87a5796ec2d566394d35b8
                                                      • Opcode Fuzzy Hash: b74001ed082774f663e0f25361e53f72b770456d997ed3911073f84b03fcac61
                                                      • Instruction Fuzzy Hash: AE31C2725012196FDF14AFF9DC48ADE77AE9F49320F14425AF805E2290EB70DB808A24
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 006997BE
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00699819
                                                      • FindClose.KERNEL32(00000000), ref: 00699824
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00699840
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00699890
                                                      • SetCurrentDirectoryW.KERNEL32(006E6B7C), ref: 006998AE
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 006998B8
                                                      • FindClose.KERNEL32(00000000), ref: 006998C5
                                                      • FindClose.KERNEL32(00000000), ref: 006998D5
                                                        • Part of subcall function 0068DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0068DB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 2640511053-438819550
                                                      • Opcode ID: 33a10dcde31b6b7e506c58f467000415a3784a84ee2b52bc5ed4753e8edc7efb
                                                      • Instruction ID: aa3930a9efce323d7b8f632e1ddc4701056ad7b06c8ca599ddab55ebb1577ccf
                                                      • Opcode Fuzzy Hash: 33a10dcde31b6b7e506c58f467000415a3784a84ee2b52bc5ed4753e8edc7efb
                                                      • Instruction Fuzzy Hash: D831C3715012196FDF10AFB9DC48ADE77AE9F06320F14465EF810A26D1DB70DA858B34
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00698257
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00698267
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00698273
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00698310
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00698324
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00698356
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0069838C
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00698395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                      • String ID: *.*
                                                      • API String ID: 1464919966-438819550
                                                      • Opcode ID: e1730c41ee88176dc9e06897999642aba639b7929903bc5af6d6ed073c76aa8e
                                                      • Instruction ID: 8a81dc50e012827e9bf644c57d2089914e9df1c54bc2f3488237682417ee2889
                                                      • Opcode Fuzzy Hash: e1730c41ee88176dc9e06897999642aba639b7929903bc5af6d6ed073c76aa8e
                                                      • Instruction Fuzzy Hash: 7E6159B25047059FCB10EF60D84099EB3EAFF89320F04491DF989D7651DB31EA45CB96
                                                      APIs
                                                        • Part of subcall function 00623AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00623A97,?,?,00622E7F,?,?,?,00000000), ref: 00623AC2
                                                        • Part of subcall function 0068E199: GetFileAttributesW.KERNEL32(?,0068CF95), ref: 0068E19A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0068D122
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0068D1DD
                                                      • MoveFileW.KERNEL32(?,?), ref: 0068D1F0
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0068D20D
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068D237
                                                        • Part of subcall function 0068D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0068D21C,?,?), ref: 0068D2B2
                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 0068D253
                                                      • FindClose.KERNEL32(00000000), ref: 0068D264
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 1946585618-1173974218
                                                      • Opcode ID: 6b5c3e02df8ed1c00b4eb234b0055c1c2a6f242fce75eafffb58894a4641afe4
                                                      • Instruction ID: 7897a24177394429cadda81bf3d63e3ebc55dd7c4be744341628e7a1e7e64c42
                                                      • Opcode Fuzzy Hash: 6b5c3e02df8ed1c00b4eb234b0055c1c2a6f242fce75eafffb58894a4641afe4
                                                      • Instruction Fuzzy Hash: FF61483180112DAACF45FBA0E9929EDB7B6AF55300F244269E40277291EB356F49CF64
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: 477e69a696ed47520b6bfe5d0956d1aed4a0a2e6814e5949bc8cc9fa324969b7
                                                      • Instruction ID: 3987fc19530af34318af1a5db1630e7313ca28ff49394c629a5d210c622ca0fa
                                                      • Opcode Fuzzy Hash: 477e69a696ed47520b6bfe5d0956d1aed4a0a2e6814e5949bc8cc9fa324969b7
                                                      • Instruction Fuzzy Hash: 99419D75604611AFDB10CF15E888F59BBE6FF44328F14C199E4158BB62C736ED82CB90
                                                      APIs
                                                        • Part of subcall function 006816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0068170D
                                                        • Part of subcall function 006816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0068173A
                                                        • Part of subcall function 006816C3: GetLastError.KERNEL32 ref: 0068174A
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 0068E932
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $ $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-3163812486
                                                      • Opcode ID: a4e1d867d4b35e392ddddcc2d333fa00a105df126ed592ed93f2953ae8d69306
                                                      • Instruction ID: 42836505b551c608dfc3eff644b2245641dc47a301850bc82df127dead4e67fa
                                                      • Opcode Fuzzy Hash: a4e1d867d4b35e392ddddcc2d333fa00a105df126ed592ed93f2953ae8d69306
                                                      • Instruction Fuzzy Hash: 23012672610211ABEF6432B49C8AFFB725E9714761F150721F902E22E2D6E29D8083A4
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 006A1276
                                                      • WSAGetLastError.WSOCK32 ref: 006A1283
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 006A12BA
                                                      • WSAGetLastError.WSOCK32 ref: 006A12C5
                                                      • closesocket.WSOCK32(00000000), ref: 006A12F4
                                                      • listen.WSOCK32(00000000,00000005), ref: 006A1303
                                                      • WSAGetLastError.WSOCK32 ref: 006A130D
                                                      • closesocket.WSOCK32(00000000), ref: 006A133C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                      • String ID:
                                                      • API String ID: 540024437-0
                                                      • Opcode ID: 0d54af9ee199685a4e2a7e45c04294f8406309191de2d52e462986ea15f70cde
                                                      • Instruction ID: 9782e8ed46df3298bc1c73b728a9fe679bb87d22c3e392bcea7cc3259ef95f0b
                                                      • Opcode Fuzzy Hash: 0d54af9ee199685a4e2a7e45c04294f8406309191de2d52e462986ea15f70cde
                                                      • Instruction Fuzzy Hash: 21417F716001109FD710EF24D494B69BBE6AF87328F188198E8569F396C771EE81CFE1
                                                      APIs
                                                      • _free.LIBCMT ref: 0065B9D4
                                                      • _free.LIBCMT ref: 0065B9F8
                                                      • _free.LIBCMT ref: 0065BB7F
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,006C3700), ref: 0065BB91
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,006F121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0065BC09
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,006F1270,000000FF,?,0000003F,00000000,?), ref: 0065BC36
                                                      • _free.LIBCMT ref: 0065BD4B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                      • String ID:
                                                      • API String ID: 314583886-0
                                                      • Opcode ID: d16ec1751ecc14af08af04c3dc439d1889445ca90dc66c6e33acf438d977c1be
                                                      • Instruction ID: bf817cdc9a8fc271f95e4b75963b9b0ff8454df0641197f79e6b64be78b47636
                                                      • Opcode Fuzzy Hash: d16ec1751ecc14af08af04c3dc439d1889445ca90dc66c6e33acf438d977c1be
                                                      • Instruction Fuzzy Hash: 33C137719002459FCB209F69CC41AEA7BBBEF42351F18619EEC90DB351EB308E49C754
                                                      APIs
                                                        • Part of subcall function 00623AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00623A97,?,?,00622E7F,?,?,?,00000000), ref: 00623AC2
                                                        • Part of subcall function 0068E199: GetFileAttributesW.KERNEL32(?,0068CF95), ref: 0068E19A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0068D420
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0068D470
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068D481
                                                      • FindClose.KERNEL32(00000000), ref: 0068D498
                                                      • FindClose.KERNEL32(00000000), ref: 0068D4A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 2649000838-1173974218
                                                      • Opcode ID: 6aa4dad50ebae4b898912615f5e590405aac8679ca03db5a9f5b93496815b516
                                                      • Instruction ID: 3a5ba96b46c3d009479d6ef83e70bb5bac987b6d7e48ab50f89fdb4e2c031e50
                                                      • Opcode Fuzzy Hash: 6aa4dad50ebae4b898912615f5e590405aac8679ca03db5a9f5b93496815b516
                                                      • Instruction Fuzzy Hash: 10317C714087959BC344FF64E8918AFB7EABE91310F444E2DF4D1922D1EB34AA09CB67
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: 430485ec0f29c017f77835c3d3fb9bdf382dc570aa0107eba27ebed1514e8ec5
                                                      • Instruction ID: 1caeb9a62bf0fd7a57b4547e0825dc1de4545f25a62eb8f116d1b50c458e60d8
                                                      • Opcode Fuzzy Hash: 430485ec0f29c017f77835c3d3fb9bdf382dc570aa0107eba27ebed1514e8ec5
                                                      • Instruction Fuzzy Hash: 98C22B71E046288BDF69CF28DD407EAB7B6EB44306F1441EAD84DE7241E775AE898F40
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 006964DC
                                                      • CoInitialize.OLE32(00000000), ref: 00696639
                                                      • CoCreateInstance.OLE32(006BFCF8,00000000,00000001,006BFB68,?), ref: 00696650
                                                      • CoUninitialize.OLE32 ref: 006968D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 886957087-24824748
                                                      • Opcode ID: 1ca161e26cc2c6bdc3077756b812eeed14cf3124151195984ffa4e39673ff2ce
                                                      • Instruction ID: 546dcc7c4ddaf0063800d1ee5fcb772c084aaf244efe6e0ef017a9af2f9ad685
                                                      • Opcode Fuzzy Hash: 1ca161e26cc2c6bdc3077756b812eeed14cf3124151195984ffa4e39673ff2ce
                                                      • Instruction Fuzzy Hash: 74D14871508711AFC744EF24D891DABB7EABF98304F00496DF5958B2A1DB70E909CBA2
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 006A22E8
                                                        • Part of subcall function 0069E4EC: GetWindowRect.USER32(?,?), ref: 0069E504
                                                      • GetDesktopWindow.USER32 ref: 006A2312
                                                      • GetWindowRect.USER32(00000000), ref: 006A2319
                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 006A2355
                                                      • GetCursorPos.USER32(?), ref: 006A2381
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006A23DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                      • String ID:
                                                      • API String ID: 2387181109-0
                                                      • Opcode ID: 9300f1b4bb06dcb6c0b03aae6dd86a26d7aa1e94ccd3d38a7e598be06ffa9883
                                                      • Instruction ID: e32ed2825a446a0ca3e902e49df3336fde8f8acfbb96159ced13ad6ca8bab2ce
                                                      • Opcode Fuzzy Hash: 9300f1b4bb06dcb6c0b03aae6dd86a26d7aa1e94ccd3d38a7e598be06ffa9883
                                                      • Instruction Fuzzy Hash: E731C172544316AFCB20EF18C845A9BB7AAFF85310F000A1DF98597181DB35EE48CB91
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00699B78
                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00699C8B
                                                        • Part of subcall function 00693874: GetInputState.USER32 ref: 006938CB
                                                        • Part of subcall function 00693874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00693966
                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00699BA8
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00699C75
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                      • String ID: *.*
                                                      • API String ID: 1972594611-438819550
                                                      • Opcode ID: 91d6f63f73d9d2a7152e022bfdfbfebee34437cb3f5bcae0186af3aca313566e
                                                      • Instruction ID: 2fb06c5f0dbaf652af1647e601a2c9ab69caecbcd26746838befeeeef76a15a5
                                                      • Opcode Fuzzy Hash: 91d6f63f73d9d2a7152e022bfdfbfebee34437cb3f5bcae0186af3aca313566e
                                                      • Instruction Fuzzy Hash: 5A41827190061ADFCF54DF68DC85AEEBBBAEF05310F14415AE405A2291EB309F84CF64
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00639A4E
                                                      • GetSysColor.USER32(0000000F), ref: 00639B23
                                                      • SetBkColor.GDI32(?,00000000), ref: 00639B36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Color$LongProcWindow
                                                      • String ID:
                                                      • API String ID: 3131106179-0
                                                      • Opcode ID: 3e997ccb2111c87099e1af45f92738a24beabe211be7b2e42e4049d0322b9de9
                                                      • Instruction ID: 226c87812687073d15e42c0690f020e4f67ee0f34f863d48a8570a5fd72e31ab
                                                      • Opcode Fuzzy Hash: 3e997ccb2111c87099e1af45f92738a24beabe211be7b2e42e4049d0322b9de9
                                                      • Instruction Fuzzy Hash: 63A12AB1108404EEE7289A3D8C59EFB269FDF42350F15830DF502C6795CAA59D42DBF5
                                                      APIs
                                                        • Part of subcall function 006A304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 006A307A
                                                        • Part of subcall function 006A304E: _wcslen.LIBCMT ref: 006A309B
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 006A185D
                                                      • WSAGetLastError.WSOCK32 ref: 006A1884
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 006A18DB
                                                      • WSAGetLastError.WSOCK32 ref: 006A18E6
                                                      • closesocket.WSOCK32(00000000), ref: 006A1915
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 1601658205-0
                                                      • Opcode ID: 13c8863c3fde54a56b48b3b97eea6a72e47296989013d680f9088dbc1d5f38bb
                                                      • Instruction ID: 6e86fcbc37db571dc3fe55d65572b639bbb39fdf60eddb670cd7622aedec49fc
                                                      • Opcode Fuzzy Hash: 13c8863c3fde54a56b48b3b97eea6a72e47296989013d680f9088dbc1d5f38bb
                                                      • Instruction Fuzzy Hash: AB51B171A00610AFEB10AF24D896F6A77EAAF49718F04805CF9066F3C3C775AD418BE5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: a1c4b31a12b0e3d3ff6bfe8b4ccd47998be7e3b94a6d17c79cf80449d76b89a5
                                                      • Instruction ID: 69e2b431146657feff4482238049a29a582eea3c7fb2bd2b718dc422fab94141
                                                      • Opcode Fuzzy Hash: a1c4b31a12b0e3d3ff6bfe8b4ccd47998be7e3b94a6d17c79cf80449d76b89a5
                                                      • Instruction Fuzzy Hash: AF21B4B17402116FD7208F1AC864BEA7BE6AF86324B58805CE845CF352D775DD82CB94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                      • API String ID: 0-1546025612
                                                      • Opcode ID: 66e78b76f6db380e0bc806e7b07ab12eb7aef63bf0fe35e1fa9579539cf17c9c
                                                      • Instruction ID: 107188d8e01bc549a3b4f2383e04d720617ff27a4e1f3d33c9851cf3fda63f23
                                                      • Opcode Fuzzy Hash: 66e78b76f6db380e0bc806e7b07ab12eb7aef63bf0fe35e1fa9579539cf17c9c
                                                      • Instruction Fuzzy Hash: 59A24C70A0162ACFDF24CF58D9517EDB7B2BB54310F2481AAE816A7385DB749E81CF90
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006882AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($tbn$|
                                                      • API String ID: 1659193697-2322377913
                                                      • Opcode ID: d482810f2d654cd328c11b88110b13c73cd33ef1a1d8f614ae2a7a18b72e3636
                                                      • Instruction ID: 542aec9eb6af139ce1e93ee975698c78c8c8d3450c518b4cc2ea0a5e08aee161
                                                      • Opcode Fuzzy Hash: d482810f2d654cd328c11b88110b13c73cd33ef1a1d8f614ae2a7a18b72e3636
                                                      • Instruction Fuzzy Hash: A6324474A007059FCB28DF59C480AAAB7F1FF48710B55C56EE49ADB3A1EB70E981CB44
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 006AA6AC
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 006AA6BA
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 006AA79C
                                                      • CloseHandle.KERNEL32(00000000), ref: 006AA7AB
                                                        • Part of subcall function 0063CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00663303,?), ref: 0063CE8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                      • String ID:
                                                      • API String ID: 1991900642-0
                                                      • Opcode ID: 634788fed4ea79b29b16527a53a4bb124ab9ad134a27cdfc864ab95cb08ac812
                                                      • Instruction ID: 2c33e5a16d5f82ac00147f28e17d069fafccf71086b6dbab0b739ede7ad269b7
                                                      • Opcode Fuzzy Hash: 634788fed4ea79b29b16527a53a4bb124ab9ad134a27cdfc864ab95cb08ac812
                                                      • Instruction Fuzzy Hash: E7516C71508710AFD350EF24D886A6BBBEAFF89754F00492DF58597252EB30D904CFA6
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0068AAAC
                                                      • SetKeyboardState.USER32(00000080), ref: 0068AAC8
                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0068AB36
                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0068AB88
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 023c5494cd5ef52b311a048f258437e2237a850e5681d76b7fc15c52302b8d71
                                                      • Instruction ID: d2499c5dea4572b643b0b73b4c633431b81b264fd21098aec0db6f34815f72a1
                                                      • Opcode Fuzzy Hash: 023c5494cd5ef52b311a048f258437e2237a850e5681d76b7fc15c52302b8d71
                                                      • Instruction Fuzzy Hash: C031DA70A40248AFFB35ABA5CC05BFA7BA7AB44320F04431BF9C1566D1D3758985C766
                                                      APIs
                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 0069CE89
                                                      • GetLastError.KERNEL32(?,00000000), ref: 0069CEEA
                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 0069CEFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorEventFileInternetLastRead
                                                      • String ID:
                                                      • API String ID: 234945975-0
                                                      • Opcode ID: da342252f81fc9ae2d8b3c440dce335d0ff57acafc94eaa43d60d0c34f8433b1
                                                      • Instruction ID: 211754f59320ab3f0b805c8f66f6a104f0f54c10cd7698e329e46b2371444a0c
                                                      • Opcode Fuzzy Hash: da342252f81fc9ae2d8b3c440dce335d0ff57acafc94eaa43d60d0c34f8433b1
                                                      • Instruction Fuzzy Hash: E621BDB15007059BDF20DF65C948BA677FEEF40364F10442EE546D2651E770EE458B64
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,00665222), ref: 0068DBCE
                                                      • GetFileAttributesW.KERNEL32(?), ref: 0068DBDD
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0068DBEE
                                                      • FindClose.KERNEL32(00000000), ref: 0068DBFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                      • String ID:
                                                      • API String ID: 2695905019-0
                                                      • Opcode ID: 8de1490a2ae21a3c203c658219c6a9227c0784bbda78080ac6aca2385ba1d4a6
                                                      • Instruction ID: 480267e54887c9bb084dd863a859ae27af7ab188a12bf8aaee822ff5249e5cec
                                                      • Opcode Fuzzy Hash: 8de1490a2ae21a3c203c658219c6a9227c0784bbda78080ac6aca2385ba1d4a6
                                                      • Instruction Fuzzy Hash: 0AF0E5B081091057C320BB7CAC0D8AA376E9E01374B104702F836C22F0EBB05F95C7E5
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00695CC1
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00695D17
                                                      • FindClose.KERNEL32(?), ref: 00695D5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: e4a8dbc6f3047098719be1f7a3f422e59c26e2903a2fde9c4f6fb3e6a301b6b9
                                                      • Instruction ID: f35ea51a6e34e28052f1079c20e781f0d2b6476bbada54df641f92ac03d6f038
                                                      • Opcode Fuzzy Hash: e4a8dbc6f3047098719be1f7a3f422e59c26e2903a2fde9c4f6fb3e6a301b6b9
                                                      • Instruction Fuzzy Hash: 5151DC74600A018FCB04CF28C494E9AB7EAFF49324F14855EE95A8B3A1CB30ED48CF95
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 0065271A
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00652724
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00652731
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: c5283a2686609392ba4200f5e7eb1f29c07efb18f40e628656a1601214855f25
                                                      • Instruction ID: 3fef1246717c641180655593ed69a88d17a39fbea7155a837212e968fad1f31d
                                                      • Opcode Fuzzy Hash: c5283a2686609392ba4200f5e7eb1f29c07efb18f40e628656a1601214855f25
                                                      • Instruction Fuzzy Hash: DE31D67491122D9BCB61DF68DC88BDCB7B9AF08310F5042EAE80CA7261E7309F858F45
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 006951DA
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00695238
                                                      • SetErrorMode.KERNEL32(00000000), ref: 006952A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1682464887-0
                                                      • Opcode ID: 62a59ded9d76f1636a55a39bc7da15c3fee70a6a4444c35255dd8ad6ece35cd2
                                                      • Instruction ID: 3012725579678be74473118342c136d5a1af8d0519a3c7983f686b23a44b3ac8
                                                      • Opcode Fuzzy Hash: 62a59ded9d76f1636a55a39bc7da15c3fee70a6a4444c35255dd8ad6ece35cd2
                                                      • Instruction Fuzzy Hash: 5B314175A00518DFDB00DF54D884EEDBBB5FF49314F048099E805AB352DB35E955CBA1
                                                      APIs
                                                        • Part of subcall function 0063FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00640668
                                                        • Part of subcall function 0063FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00640685
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0068170D
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0068173A
                                                      • GetLastError.KERNEL32 ref: 0068174A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                      • String ID:
                                                      • API String ID: 577356006-0
                                                      • Opcode ID: 52dc8ff99e15f591f93ef55af069597ba3977654e92f6d5a7eceb97e88ff5447
                                                      • Instruction ID: 3bb9daccae8632a27c122e63eae39de41e3d2bc612d41c95631b9687dbcb21b4
                                                      • Opcode Fuzzy Hash: 52dc8ff99e15f591f93ef55af069597ba3977654e92f6d5a7eceb97e88ff5447
                                                      • Instruction Fuzzy Hash: 4B1194B1804304AFD718AF54DC86D6AB7BEEF45714F20862EF05657241EB70BC428B64
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0068D608
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0068D645
                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0068D650
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 33631002-0
                                                      • Opcode ID: 7316e6e20c3f77007de5d62fcb7172cff919bf1e5f1767ed02a8bcb48551d38b
                                                      • Instruction ID: 171d39b9a62a4fdab38e407aa4e42175ecb99fd509a05e1f16749db1e4a1d2e2
                                                      • Opcode Fuzzy Hash: 7316e6e20c3f77007de5d62fcb7172cff919bf1e5f1767ed02a8bcb48551d38b
                                                      • Instruction Fuzzy Hash: 1F1182B1E05228BFDB108F94EC44FAFBBBDEB45B60F104211F904E7290D2704A418BA1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0068168C
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006816A1
                                                      • FreeSid.ADVAPI32(?), ref: 006816B1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: 3d56efed51b542c3303dea386981b264e27eb89fa6865b1d19537b089ec1dac7
                                                      • Instruction ID: ccb12f3487661347edae625185aae87b2f9ffdaab3326bb13a92e02dfbb755c8
                                                      • Opcode Fuzzy Hash: 3d56efed51b542c3303dea386981b264e27eb89fa6865b1d19537b089ec1dac7
                                                      • Instruction Fuzzy Hash: 17F0F971950309FBDB00DFE49C89AAEBBBDFB04614F504565E501E2181E775AA848B50
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(006528E9,?,00644CBE,006528E9,006E88B8,0000000C,00644E15,006528E9,00000002,00000000,?,006528E9), ref: 00644D09
                                                      • TerminateProcess.KERNEL32(00000000,?,00644CBE,006528E9,006E88B8,0000000C,00644E15,006528E9,00000002,00000000,?,006528E9), ref: 00644D10
                                                      • ExitProcess.KERNEL32 ref: 00644D22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: db1da15d32945ef11bb4abe516c791b7e726faabcd7eb112e4c6c774d0eb253f
                                                      • Instruction ID: b1ff93bfe09e06c796b3a51afa5da15c324db5045ca0f66473831e45d4467da9
                                                      • Opcode Fuzzy Hash: db1da15d32945ef11bb4abe516c791b7e726faabcd7eb112e4c6c774d0eb253f
                                                      • Instruction Fuzzy Hash: 5FE0B671400548ABCF51AF54DD0AA983FABEF41791F505118FC059A222CF35DE82CA84
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: /
                                                      • API String ID: 0-2043925204
                                                      • Opcode ID: 7c5bbdd21bff1eb8d7ae1fc5c639e01fe098fdba59daf2ffb710c29a9aaa1350
                                                      • Instruction ID: 177cf191cb5ed93e2796c2af8d266122136f5712cfa96f4da869ecc6503f3835
                                                      • Opcode Fuzzy Hash: 7c5bbdd21bff1eb8d7ae1fc5c639e01fe098fdba59daf2ffb710c29a9aaa1350
                                                      • Instruction Fuzzy Hash: 6F412672500319AFCB209FB9CC49DEB77BAEB84325F5042ADFD05C7280E6719E858B54
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 0067D28C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID: X64
                                                      • API String ID: 2645101109-893830106
                                                      • Opcode ID: 1097ecdc14917bab24570f8dc6bf46df4baf5f035f8b3aa5e944b4ee0f501b4c
                                                      • Instruction ID: acfc2ac93ed7c9b95eb3a681a0fb4c018c6cda33b0ce656179be6431a4d9919d
                                                      • Opcode Fuzzy Hash: 1097ecdc14917bab24570f8dc6bf46df4baf5f035f8b3aa5e944b4ee0f501b4c
                                                      • Instruction Fuzzy Hash: 21D0CAB480112DEBCB94DBA0EC88DDEB3BDBB04305F104692F60AA2000DB30968A9F20
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                      • Instruction ID: 586b698509014d0d9fbfb318e9ed269f9a1f68456f76fd5901a0484a1fb7c09a
                                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                      • Instruction Fuzzy Hash: 86021C71E012199FDF54CFA9C8806EDBBF2EF48324F258169D919EB380D731AA45CB94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable is not of type 'Object'.$p#o
                                                      • API String ID: 0-2363411428
                                                      • Opcode ID: c75a20b887db97c3fe92ef5a2fbaed41b344715c884c80622c236ea61b384d3a
                                                      • Instruction ID: 28e56224bc3155a576cd51daf85a8d80b2a7a5d0b8cbbab82060fcf1fb72f209
                                                      • Opcode Fuzzy Hash: c75a20b887db97c3fe92ef5a2fbaed41b344715c884c80622c236ea61b384d3a
                                                      • Instruction Fuzzy Hash: 5F32AD70900628DBDF14DF90E991AEDB7B7BF05314F248059E80AAB382D775AE46CF61
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00696918
                                                      • FindClose.KERNEL32(00000000), ref: 00696961
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: d3819bc6f9c38726edfae4676fc6af8b34482e4fb06ed40eb8ff857866e110b9
                                                      • Instruction ID: 29204bf5cb6386889d198651ddad057fbdbc8627774a3764a5bfc93e01669865
                                                      • Opcode Fuzzy Hash: d3819bc6f9c38726edfae4676fc6af8b34482e4fb06ed40eb8ff857866e110b9
                                                      • Instruction Fuzzy Hash: A1118E716046119FCB10DF29D484A1ABBE6EF89328F14C69DF4698F7A2CB30ED45CB91
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,006A4891,?,?,00000035,?), ref: 006937E4
                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,006A4891,?,?,00000035,?), ref: 006937F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: 86aa9fce264019b0dd416fb401a77ee8f8d23ba72a61410a7db2b51c15b322b8
                                                      • Instruction ID: c49511ba5b17f2b2029c8d3330a0f0c3a68abf14a62f8eeee5726756ff6c19e3
                                                      • Opcode Fuzzy Hash: 86aa9fce264019b0dd416fb401a77ee8f8d23ba72a61410a7db2b51c15b322b8
                                                      • Instruction Fuzzy Hash: EEF0E5B07043282AEB6017A69C4DFEB3AAFEFC5771F000265F509D2291D9709A44C6B4
                                                      APIs
                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0068B25D
                                                      • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 0068B270
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: InputSendkeybd_event
                                                      • String ID:
                                                      • API String ID: 3536248340-0
                                                      • Opcode ID: dd5f9a2530fae51ddfcea1fe1ebbae8ba9bc193eaaccd13598f3851696a8b5ff
                                                      • Instruction ID: 76d1ace552980b9fc71662ce7631fecb8519b04ef24325056d8580dc63c71672
                                                      • Opcode Fuzzy Hash: dd5f9a2530fae51ddfcea1fe1ebbae8ba9bc193eaaccd13598f3851696a8b5ff
                                                      • Instruction Fuzzy Hash: A8F06D7180424DABDB059FA0C805BFE7BB1FF04315F009119F951A5191C37982119F94
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006811FC), ref: 006810D4
                                                      • CloseHandle.KERNEL32(?,?,006811FC), ref: 006810E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: fbcbafe706ad0a80bbc4fbb62b25d162cceaed8b2048c9b807aaf6784d62997d
                                                      • Instruction ID: 2a993c08a14538f39f790a7219bcb1a7c5e26620929084869ed556eb297187a7
                                                      • Opcode Fuzzy Hash: fbcbafe706ad0a80bbc4fbb62b25d162cceaed8b2048c9b807aaf6784d62997d
                                                      • Instruction Fuzzy Hash: 9BE04F72408600AFE7652B11FC09E7377EAEF04320F10892DF4A5804B1DB626CD0DB54
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00656766,?,?,00000008,?,?,0065FEFE,00000000), ref: 00656998
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: 4407177f9d697be13effcda8430f3f52b2b112bd657e1156ccd0ad0604cbcc86
                                                      • Instruction ID: 81a82bfade6873fc6097fc38b40a6c7c92f3bd0ff651930f4aaf1e3b557974d2
                                                      • Opcode Fuzzy Hash: 4407177f9d697be13effcda8430f3f52b2b112bd657e1156ccd0ad0604cbcc86
                                                      • Instruction Fuzzy Hash: 5EB15B316106099FD715CF28C486BA47BE1FF05366F658658FC9ACF2A2C735D98ACB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: f281425e46ece9a5295ef24163094234358a470a19b9abcb7986febc35c23277
                                                      • Instruction ID: ec82335562e32ca4eed69ef1e0a17f7bf133aed7eacb93628b7d34b800fd924b
                                                      • Opcode Fuzzy Hash: f281425e46ece9a5295ef24163094234358a470a19b9abcb7986febc35c23277
                                                      • Instruction Fuzzy Hash: 3D125E71D002299FDB54CF58C8816EEB7F6FF48710F14819AE949EB256EB309E81CB94
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 0069EABD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: 4d0425945f8c47ace4783ccc8b31531a4030f139a5eab5e690631cd2a419f2d9
                                                      • Instruction ID: b75a9f4aa69a7ff940c240cc952e7a62b479fb8d49ea1db4b66493593f66fd94
                                                      • Opcode Fuzzy Hash: 4d0425945f8c47ace4783ccc8b31531a4030f139a5eab5e690631cd2a419f2d9
                                                      • Instruction Fuzzy Hash: B6E01A312102159FD710EF59E804E9AB7EEAF98770F04842AFC49DB761DA71A8418BA1
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,006403EE), ref: 006409DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 762d6d6d881f29dbbd5aff585b7c9afc18368507f6dca561bf68d6a2a371e40b
                                                      • Instruction ID: 36c6d9bc3023b6c438fe88a1c3f68b67fd7007ddae55b583896d3bf1230b5eda
                                                      • Opcode Fuzzy Hash: 762d6d6d881f29dbbd5aff585b7c9afc18368507f6dca561bf68d6a2a371e40b
                                                      • Instruction Fuzzy Hash:
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                      • Instruction ID: 4f48e2ad4611384cae857fa7c1ccf449d54b60a65b5252ac740a2196fcb1e7b6
                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                      • Instruction Fuzzy Hash: CE517A7160C7499FDB389578885E7FE678B9B12300F18092EE882D7382CB15DE46D35A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0&o
                                                      • API String ID: 0-3321480047
                                                      • Opcode ID: 63efdab93bb7ca92dd92573fd1e2e389426a7676c3728c0787436e1d26fa4670
                                                      • Instruction ID: 2853acf925498ad1419808ca324d6c846fceabcfc78dc05b1d92c7d0e9f7dcd6
                                                      • Opcode Fuzzy Hash: 63efdab93bb7ca92dd92573fd1e2e389426a7676c3728c0787436e1d26fa4670
                                                      • Instruction Fuzzy Hash: A121BB326615158BDB28CF79C82367E73EAB754310F15862EE4A7C37D1DE35A904CB84
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13212ea043f4fa30c957942e84a52446e49c4665c8ae1ebe828604beb052fa0f
                                                      • Instruction ID: e08f0a000e1dbfc814947c8f61e0e2b23a981fb67dcbc96b935e879e32513cb2
                                                      • Opcode Fuzzy Hash: 13212ea043f4fa30c957942e84a52446e49c4665c8ae1ebe828604beb052fa0f
                                                      • Instruction Fuzzy Hash: 6132D221D29F424DD7239634DC22336A68AAFB73D6F15D737EC1AB5AA5EF29C4834100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4726a5a588afb384193c1ba46bdbf314e54b6c2533e8ad23d375dcc943410304
                                                      • Instruction ID: 1cff93074208de504a7bc0d15fe752d514c94220bf716109a63b547fa3ed9077
                                                      • Opcode Fuzzy Hash: 4726a5a588afb384193c1ba46bdbf314e54b6c2533e8ad23d375dcc943410304
                                                      • Instruction Fuzzy Hash: 2832D231A002558BDF28CA29C4D46FD77A3EB45334F28C56EE85EAB391D630DD82DB81
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 95eef5c62f51cc3a2f4be44aa11f2df7f6a1031281ed93a91e7085e0092f1749
                                                      • Instruction ID: 85e0618169937678e0f4e7f30853e14d16ee488bba9f52bc3bac6a34bebe787d
                                                      • Opcode Fuzzy Hash: 95eef5c62f51cc3a2f4be44aa11f2df7f6a1031281ed93a91e7085e0092f1749
                                                      • Instruction Fuzzy Hash: 9B22AE70A00A1A9FDF14CF64D882AEEB3B7FF44300F244569E816AB391EB35A955CF54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 86397e8fc99a4cfe3fdbe5ad42bfd7fae0dadbcc3fa55fbb2704a61f0f8ba9f2
                                                      • Instruction ID: 7bb4531b1dd22b389ddb6166ab4e3f9b1b3b0b4e9cc498f18ef0bfcd5f40cdb0
                                                      • Opcode Fuzzy Hash: 86397e8fc99a4cfe3fdbe5ad42bfd7fae0dadbcc3fa55fbb2704a61f0f8ba9f2
                                                      • Instruction Fuzzy Hash: C902B6B5E00616EBDB04DF54D981AAEB7B2FF44304F108169E8169B391EB31AE11CFD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e0022f59e485cd122f109b51d995b050de37949bb3d159ebfbf9985289d38b1d
                                                      • Instruction ID: ce91a73da3ef5c5beab057c1c853e99f3ae205b161c6b315ebd1bf4fcd946018
                                                      • Opcode Fuzzy Hash: e0022f59e485cd122f109b51d995b050de37949bb3d159ebfbf9985289d38b1d
                                                      • Instruction Fuzzy Hash: 876179712087499AEF749E288D95BFE239BDF51704F10091EF982DB381DB11AE82C359
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3fd53e963860b7de469f5e35e85e1ec2aeb8e5e25fc552e94ac2a749451d58a7
                                                      • Instruction ID: 00bd1f204fb2201c629b26a547c5e4f9bfa226bf20122d1a27c84f47f5449d4f
                                                      • Opcode Fuzzy Hash: 3fd53e963860b7de469f5e35e85e1ec2aeb8e5e25fc552e94ac2a749451d58a7
                                                      • Instruction Fuzzy Hash: 56618A31A2C74966DF389A288C95BFF238BDF42704F100A5DE943DB381DB52ED428359
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 006A2B30
                                                      • DeleteObject.GDI32(00000000), ref: 006A2B43
                                                      • DestroyWindow.USER32 ref: 006A2B52
                                                      • GetDesktopWindow.USER32 ref: 006A2B6D
                                                      • GetWindowRect.USER32(00000000), ref: 006A2B74
                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 006A2CA3
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 006A2CB1
                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2CF8
                                                      • GetClientRect.USER32(00000000,?), ref: 006A2D04
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 006A2D40
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2D62
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2D75
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2D80
                                                      • GlobalLock.KERNEL32(00000000), ref: 006A2D89
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2D98
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 006A2DA1
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2DA8
                                                      • GlobalFree.KERNEL32(00000000), ref: 006A2DB3
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2DC5
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,006BFC38,00000000), ref: 006A2DDB
                                                      • GlobalFree.KERNEL32(00000000), ref: 006A2DEB
                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 006A2E11
                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 006A2E30
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A2E52
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006A303F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: 7f66352c3debd78452b99e9d6df8e9bfe2b5969e2ec2fff3309184850570cd36
                                                      • Instruction ID: 690814145577f50a831c2edf0b44ed5ec45275f551825b0c3641abca8e273d86
                                                      • Opcode Fuzzy Hash: 7f66352c3debd78452b99e9d6df8e9bfe2b5969e2ec2fff3309184850570cd36
                                                      • Instruction Fuzzy Hash: ED025DB1500215EFDB14DF68CC89EAE7BBAEB49720F009158F915AB2A1DB709E41CF60
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 006B712F
                                                      • GetSysColorBrush.USER32(0000000F), ref: 006B7160
                                                      • GetSysColor.USER32(0000000F), ref: 006B716C
                                                      • SetBkColor.GDI32(?,000000FF), ref: 006B7186
                                                      • SelectObject.GDI32(?,?), ref: 006B7195
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 006B71C0
                                                      • GetSysColor.USER32(00000010), ref: 006B71C8
                                                      • CreateSolidBrush.GDI32(00000000), ref: 006B71CF
                                                      • FrameRect.USER32(?,?,00000000), ref: 006B71DE
                                                      • DeleteObject.GDI32(00000000), ref: 006B71E5
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 006B7230
                                                      • FillRect.USER32(?,?,?), ref: 006B7262
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B7284
                                                        • Part of subcall function 006B73E8: GetSysColor.USER32(00000012), ref: 006B7421
                                                        • Part of subcall function 006B73E8: SetTextColor.GDI32(?,?), ref: 006B7425
                                                        • Part of subcall function 006B73E8: GetSysColorBrush.USER32(0000000F), ref: 006B743B
                                                        • Part of subcall function 006B73E8: GetSysColor.USER32(0000000F), ref: 006B7446
                                                        • Part of subcall function 006B73E8: GetSysColor.USER32(00000011), ref: 006B7463
                                                        • Part of subcall function 006B73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 006B7471
                                                        • Part of subcall function 006B73E8: SelectObject.GDI32(?,00000000), ref: 006B7482
                                                        • Part of subcall function 006B73E8: SetBkColor.GDI32(?,00000000), ref: 006B748B
                                                        • Part of subcall function 006B73E8: SelectObject.GDI32(?,?), ref: 006B7498
                                                        • Part of subcall function 006B73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 006B74B7
                                                        • Part of subcall function 006B73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006B74CE
                                                        • Part of subcall function 006B73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 006B74DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                      • String ID:
                                                      • API String ID: 4124339563-0
                                                      • Opcode ID: 89c17e2ce376c2cc9f81418df6dbcf8ff9e81109619a5650b42ec10837349aed
                                                      • Instruction ID: a7247a475b3306b0c8da65189aa455cda92763741d20c962e1914dff697b4867
                                                      • Opcode Fuzzy Hash: 89c17e2ce376c2cc9f81418df6dbcf8ff9e81109619a5650b42ec10837349aed
                                                      • Instruction Fuzzy Hash: FEA194B2008301BFD7109F64DC48E9B77AAFB89330F101B19F9A2961E1D771EA85CB61
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 006A273E
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 006A286A
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 006A28A9
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 006A28B9
                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 006A2900
                                                      • GetClientRect.USER32(00000000,?), ref: 006A290C
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 006A2955
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 006A2964
                                                      • GetStockObject.GDI32(00000011), ref: 006A2974
                                                      • SelectObject.GDI32(00000000,00000000), ref: 006A2978
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 006A2988
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006A2991
                                                      • DeleteDC.GDI32(00000000), ref: 006A299A
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006A29C6
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 006A29DD
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 006A2A1D
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 006A2A31
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 006A2A42
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 006A2A77
                                                      • GetStockObject.GDI32(00000011), ref: 006A2A82
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 006A2A8D
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 006A2A97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: a069da6b4a38dfd99fb83a368796b4bba9bbf22b1ccbf4593688f8bad5825aea
                                                      • Instruction ID: 30f11a62fe8778aedfa8567a978cbd90972162fcdb7b85cafccd5966631249b3
                                                      • Opcode Fuzzy Hash: a069da6b4a38dfd99fb83a368796b4bba9bbf22b1ccbf4593688f8bad5825aea
                                                      • Instruction Fuzzy Hash: 11B16DB1A40215AFEB14DF68DC49FAE7BAAEB49710F004219F915EB290D774ED40CFA4
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00694AED
                                                      • GetDriveTypeW.KERNEL32(?,006BCB68,?,\\.\,006BCC08), ref: 00694BCA
                                                      • SetErrorMode.KERNEL32(00000000,006BCB68,?,\\.\,006BCC08), ref: 00694D36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: eab95133d4ac4b36b765408a086d28467be96b04d4188e904040091303b08b1f
                                                      • Instruction ID: 70acff01174cb90dc258e1bd7d0e047f743b510acbcc7e88d52295b9489953ac
                                                      • Opcode Fuzzy Hash: eab95133d4ac4b36b765408a086d28467be96b04d4188e904040091303b08b1f
                                                      • Instruction Fuzzy Hash: FE61D130606245DFCF04DF25CA81DAC77ABAF54384B244459F806ABA91DF35ED43EB51
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 006B7421
                                                      • SetTextColor.GDI32(?,?), ref: 006B7425
                                                      • GetSysColorBrush.USER32(0000000F), ref: 006B743B
                                                      • GetSysColor.USER32(0000000F), ref: 006B7446
                                                      • CreateSolidBrush.GDI32(?), ref: 006B744B
                                                      • GetSysColor.USER32(00000011), ref: 006B7463
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 006B7471
                                                      • SelectObject.GDI32(?,00000000), ref: 006B7482
                                                      • SetBkColor.GDI32(?,00000000), ref: 006B748B
                                                      • SelectObject.GDI32(?,?), ref: 006B7498
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 006B74B7
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006B74CE
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 006B74DB
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006B752A
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 006B7554
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 006B7572
                                                      • DrawFocusRect.USER32(?,?), ref: 006B757D
                                                      • GetSysColor.USER32(00000011), ref: 006B758E
                                                      • SetTextColor.GDI32(?,00000000), ref: 006B7596
                                                      • DrawTextW.USER32(?,006B70F5,000000FF,?,00000000), ref: 006B75A8
                                                      • SelectObject.GDI32(?,?), ref: 006B75BF
                                                      • DeleteObject.GDI32(?), ref: 006B75CA
                                                      • SelectObject.GDI32(?,?), ref: 006B75D0
                                                      • DeleteObject.GDI32(?), ref: 006B75D5
                                                      • SetTextColor.GDI32(?,?), ref: 006B75DB
                                                      • SetBkColor.GDI32(?,?), ref: 006B75E5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 6fda2709ca364fa3e5068bce33392281460020d144b911f4786279d190759457
                                                      • Instruction ID: 254512e570c69c196606bad90003520d8dcb496c316d0b7a43578983381b0648
                                                      • Opcode Fuzzy Hash: 6fda2709ca364fa3e5068bce33392281460020d144b911f4786279d190759457
                                                      • Instruction Fuzzy Hash: 766165B2904118AFDF119FA8DC49EDE7FBAEB49330F115215F915BB2A1D7709A80CB90
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 006B1128
                                                      • GetDesktopWindow.USER32 ref: 006B113D
                                                      • GetWindowRect.USER32(00000000), ref: 006B1144
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B1199
                                                      • DestroyWindow.USER32(?), ref: 006B11B9
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006B11ED
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006B120B
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 006B121D
                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 006B1232
                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 006B1245
                                                      • IsWindowVisible.USER32(00000000), ref: 006B12A1
                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 006B12BC
                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 006B12D0
                                                      • GetWindowRect.USER32(00000000,?), ref: 006B12E8
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 006B130E
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 006B1328
                                                      • CopyRect.USER32(?,?), ref: 006B133F
                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 006B13AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: 78f5b3d4d9edebd452f6324a4b71c0f488f47094089b6d16d9dfa34b8bdd2400
                                                      • Instruction ID: e5d80bc7fd46a13640f2ae5668850e8531abe076f304c982fb4a2b9c4ff5e50e
                                                      • Opcode Fuzzy Hash: 78f5b3d4d9edebd452f6324a4b71c0f488f47094089b6d16d9dfa34b8bdd2400
                                                      • Instruction Fuzzy Hash: 83B1ADB1604351AFD700DF24C894BAABBE6FF85350F40891CF9999B261DB31E984CFA5
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 006B02E5
                                                      • _wcslen.LIBCMT ref: 006B031F
                                                      • _wcslen.LIBCMT ref: 006B0389
                                                      • _wcslen.LIBCMT ref: 006B03F1
                                                      • _wcslen.LIBCMT ref: 006B0475
                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 006B04C5
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006B0504
                                                        • Part of subcall function 0063F9F2: _wcslen.LIBCMT ref: 0063F9FD
                                                        • Part of subcall function 0068223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00682258
                                                        • Part of subcall function 0068223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0068228A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                      • API String ID: 1103490817-719923060
                                                      • Opcode ID: 1b40382661f07421c6824d558985eaca258e4faf849f2d7b5b022d3d76d6df12
                                                      • Instruction ID: 75c1026c7576322400ed57164ebdbf19026fa197b36c745ca4dc85c513ae0458
                                                      • Opcode Fuzzy Hash: 1b40382661f07421c6824d558985eaca258e4faf849f2d7b5b022d3d76d6df12
                                                      • Instruction Fuzzy Hash: 54E19B712083118FD754DF24C5509ABBBE7BF88714F144A5CF896AB3A1DB30ED868B81
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00638968
                                                      • GetSystemMetrics.USER32(00000007), ref: 00638970
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0063899B
                                                      • GetSystemMetrics.USER32(00000008), ref: 006389A3
                                                      • GetSystemMetrics.USER32(00000004), ref: 006389C8
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 006389E5
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 006389F5
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00638A28
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00638A3C
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00638A5A
                                                      • GetStockObject.GDI32(00000011), ref: 00638A76
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00638A81
                                                        • Part of subcall function 0063912D: GetCursorPos.USER32(?), ref: 00639141
                                                        • Part of subcall function 0063912D: ScreenToClient.USER32(00000000,?), ref: 0063915E
                                                        • Part of subcall function 0063912D: GetAsyncKeyState.USER32(00000001), ref: 00639183
                                                        • Part of subcall function 0063912D: GetAsyncKeyState.USER32(00000002), ref: 0063919D
                                                      • SetTimer.USER32(00000000,00000000,00000028,006390FC), ref: 00638AA8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: 37f13dabfa4a3552278e5b107727d41cb1bfca4d93fd5efd3a419b8e1f54f711
                                                      • Instruction ID: e8ff3105e65b70ae8704e23f6bcabd067dec91392f026d0d5ee9a96b183f42f0
                                                      • Opcode Fuzzy Hash: 37f13dabfa4a3552278e5b107727d41cb1bfca4d93fd5efd3a419b8e1f54f711
                                                      • Instruction Fuzzy Hash: B1B17B71A00209EFDB14DFA8CC45BEE3BB6FB48354F104229FA15AB290DB70A941CF95
                                                      APIs
                                                        • Part of subcall function 006810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00681114
                                                        • Part of subcall function 006810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 00681120
                                                        • Part of subcall function 006810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 0068112F
                                                        • Part of subcall function 006810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 00681136
                                                        • Part of subcall function 006810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0068114D
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00680DF5
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00680E29
                                                      • GetLengthSid.ADVAPI32(?), ref: 00680E40
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00680E7A
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00680E96
                                                      • GetLengthSid.ADVAPI32(?), ref: 00680EAD
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00680EB5
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00680EBC
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00680EDD
                                                      • CopySid.ADVAPI32(00000000), ref: 00680EE4
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00680F13
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00680F35
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00680F47
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00680F6E
                                                      • HeapFree.KERNEL32(00000000), ref: 00680F75
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00680F7E
                                                      • HeapFree.KERNEL32(00000000), ref: 00680F85
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00680F8E
                                                      • HeapFree.KERNEL32(00000000), ref: 00680F95
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00680FA1
                                                      • HeapFree.KERNEL32(00000000), ref: 00680FA8
                                                        • Part of subcall function 00681193: GetProcessHeap.KERNEL32(00000008,00680BB1,?,00000000,?,00680BB1,?), ref: 006811A1
                                                        • Part of subcall function 00681193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00680BB1,?), ref: 006811A8
                                                        • Part of subcall function 00681193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00680BB1,?), ref: 006811B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 9ea8b68c355b705079204a5b5b716d5fc4e8fa2e1d6e308c22bfebd8bb3846a4
                                                      • Instruction ID: a50edf6a880dbeb01bba99de462a559478a4a90e08f86c6213e8bce88b3d61db
                                                      • Opcode Fuzzy Hash: 9ea8b68c355b705079204a5b5b716d5fc4e8fa2e1d6e308c22bfebd8bb3846a4
                                                      • Instruction Fuzzy Hash: 017173B1900209ABEF60AFA4DC44FEEBBBABF04310F148615F915F6251D7319A49CB60
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006AC4BD
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,006BCC08,00000000,?,00000000,?,?), ref: 006AC544
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 006AC5A4
                                                      • _wcslen.LIBCMT ref: 006AC5F4
                                                      • _wcslen.LIBCMT ref: 006AC66F
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 006AC6B2
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 006AC7C1
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 006AC84D
                                                      • RegCloseKey.ADVAPI32(?), ref: 006AC881
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 006AC88E
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 006AC960
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 9721498-966354055
                                                      • Opcode ID: 3c0771254a3b9db6015a4cd8f60dfde4daae6a7936c6c1142b81ae18f82df85a
                                                      • Instruction ID: de1ad05d9a488a801e08ff80db9dd73665cff7b48368530d654cd93da409de90
                                                      • Opcode Fuzzy Hash: 3c0771254a3b9db6015a4cd8f60dfde4daae6a7936c6c1142b81ae18f82df85a
                                                      • Instruction Fuzzy Hash: A91257356046119FC754EF14D881A6AB7E6FF89724F04885CF88AAB3A2DB31ED41CF85
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 006B09C6
                                                      • _wcslen.LIBCMT ref: 006B0A01
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006B0A54
                                                      • _wcslen.LIBCMT ref: 006B0A8A
                                                      • _wcslen.LIBCMT ref: 006B0B06
                                                      • _wcslen.LIBCMT ref: 006B0B81
                                                        • Part of subcall function 0063F9F2: _wcslen.LIBCMT ref: 0063F9FD
                                                        • Part of subcall function 00682BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00682BFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 1103490817-4258414348
                                                      • Opcode ID: 0c1915aa185bff9f50109fdb96e62df10cc4bb68e9fe14ea43d180b1f8e20b45
                                                      • Instruction ID: 8f497646fa0f298af2acf86358cf8bb0fb11548e9c65e6b5959ac6941228219a
                                                      • Opcode Fuzzy Hash: 0c1915aa185bff9f50109fdb96e62df10cc4bb68e9fe14ea43d180b1f8e20b45
                                                      • Instruction Fuzzy Hash: 67E1AE712087118FC754DF24C4509AABBE3BF98314F14495CF896AB3A2DB31ED86CB81
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 1256254125-909552448
                                                      • Opcode ID: 11131465e63d993261d94627b6e57afbd837414fa236e889ff2f1a19fc4f5b17
                                                      • Instruction ID: 2d372c4c951957975733a8ed63d6d0ae9a6bd6066d208fa518f0ad5c7542a054
                                                      • Opcode Fuzzy Hash: 11131465e63d993261d94627b6e57afbd837414fa236e889ff2f1a19fc4f5b17
                                                      • Instruction Fuzzy Hash: D471E53260056A8BCB20EF7DC9516FA3393AF62774F250528F8569B384EA31CD45DBA0
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 006B835A
                                                      • _wcslen.LIBCMT ref: 006B836E
                                                      • _wcslen.LIBCMT ref: 006B8391
                                                      • _wcslen.LIBCMT ref: 006B83B4
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006B83F2
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,006B5BF2), ref: 006B844E
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006B8487
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006B84CA
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006B8501
                                                      • FreeLibrary.KERNEL32(?), ref: 006B850D
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006B851D
                                                      • DestroyIcon.USER32(?,?,?,?,?,006B5BF2), ref: 006B852C
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 006B8549
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 006B8555
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 799131459-1154884017
                                                      • Opcode ID: 43689f5d5d808516ffcfbd9865bbe85a8f17cc0ed83b8ed82bec23d00d12a47d
                                                      • Instruction ID: 0ca1de9b5b52997ab6ffa58827968695c9220d4932a78195568d0dc973af1326
                                                      • Opcode Fuzzy Hash: 43689f5d5d808516ffcfbd9865bbe85a8f17cc0ed83b8ed82bec23d00d12a47d
                                                      • Instruction Fuzzy Hash: 4061AFB2540615BEEB249F64CC42BFE77AEBB04721F104609F815E71D1DF74AA90DBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 0-1645009161
                                                      • Opcode ID: dda34f6f7da7734bd761ee9e756bd6f0058220804975c4bf205889a317693b4a
                                                      • Instruction ID: 46e62293cee4e72c6fda2549ef26c106db39c4c379f2c4a445232648d29c0fa8
                                                      • Opcode Fuzzy Hash: dda34f6f7da7734bd761ee9e756bd6f0058220804975c4bf205889a317693b4a
                                                      • Instruction Fuzzy Hash: 8381F971604A15BBDB20AF61DC43FEE776BAF56300F044028F905AB292EF70DA51CBA5
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 00685A2E
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00685A40
                                                      • SetWindowTextW.USER32(?,?), ref: 00685A57
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00685A6C
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00685A72
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00685A82
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00685A88
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00685AA9
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00685AC3
                                                      • GetWindowRect.USER32(?,?), ref: 00685ACC
                                                      • _wcslen.LIBCMT ref: 00685B33
                                                      • SetWindowTextW.USER32(?,?), ref: 00685B6F
                                                      • GetDesktopWindow.USER32 ref: 00685B75
                                                      • GetWindowRect.USER32(00000000), ref: 00685B7C
                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00685BD3
                                                      • GetClientRect.USER32(?,?), ref: 00685BE0
                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00685C05
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00685C2F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                      • String ID:
                                                      • API String ID: 895679908-0
                                                      • Opcode ID: 1da23294b6aa14db8726c310d253d908467b3aa13f0f07d4ee3c1afbd23d0697
                                                      • Instruction ID: 73cf1eff6dfb6f9b88bc91d5d717cce3244c7c3e358cd5357b67311c2b74aa9a
                                                      • Opcode Fuzzy Hash: 1da23294b6aa14db8726c310d253d908467b3aa13f0f07d4ee3c1afbd23d0697
                                                      • Instruction Fuzzy Hash: 14718071900B05AFDB20EFA8CE95EAEBBF6FF48714F104618E143A66A0D775E944CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[n
                                                      • API String ID: 176396367-1244928801
                                                      • Opcode ID: 5302dd44be6205196b127f2676cb41cfc3da9951577570d1bb54ac1faed22243
                                                      • Instruction ID: 739aace205e48d7382f3d82fd086a01c8901b55eff5e30cf075f934cb0df0f23
                                                      • Opcode Fuzzy Hash: 5302dd44be6205196b127f2676cb41cfc3da9951577570d1bb54ac1faed22243
                                                      • Instruction Fuzzy Hash: 10E1A531A00636ABCB14AF68C4516EEBBB7BF54B10F548229E456B7340DF70AF858B90
                                                      APIs
                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 006400C6
                                                        • Part of subcall function 006400ED: InitializeCriticalSectionAndSpinCount.KERNEL32(006F070C,00000FA0,AFC626DD,?,?,?,?,006623B3,000000FF), ref: 0064011C
                                                        • Part of subcall function 006400ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,006623B3,000000FF), ref: 00640127
                                                        • Part of subcall function 006400ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,006623B3,000000FF), ref: 00640138
                                                        • Part of subcall function 006400ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0064014E
                                                        • Part of subcall function 006400ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0064015C
                                                        • Part of subcall function 006400ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0064016A
                                                        • Part of subcall function 006400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00640195
                                                        • Part of subcall function 006400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006401A0
                                                      • ___scrt_fastfail.LIBCMT ref: 006400E7
                                                        • Part of subcall function 006400A3: __onexit.LIBCMT ref: 006400A9
                                                      Strings
                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00640122
                                                      • SleepConditionVariableCS, xrefs: 00640154
                                                      • InitializeConditionVariable, xrefs: 00640148
                                                      • kernel32.dll, xrefs: 00640133
                                                      • WakeAllConditionVariable, xrefs: 00640162
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                      • API String ID: 66158676-1714406822
                                                      • Opcode ID: 35925c92faec914b0f099b393b6ba172d0f1736c455f47770c125175cd2be5e1
                                                      • Instruction ID: 9d3e9a863f8e1bf5bd75869273f2f3519d63a6d3a7a9eb187a20a778f0835e83
                                                      • Opcode Fuzzy Hash: 35925c92faec914b0f099b393b6ba172d0f1736c455f47770c125175cd2be5e1
                                                      • Instruction Fuzzy Hash: A1210B72A447206BF7106BA8AC45BA93397DF44F61F110239FA01A3392DB749C408F94
                                                      APIs
                                                      • CharLowerBuffW.USER32(00000000,00000000,006BCC08), ref: 00694527
                                                      • _wcslen.LIBCMT ref: 0069453B
                                                      • _wcslen.LIBCMT ref: 00694599
                                                      • _wcslen.LIBCMT ref: 006945F4
                                                      • _wcslen.LIBCMT ref: 0069463F
                                                      • _wcslen.LIBCMT ref: 006946A7
                                                        • Part of subcall function 0063F9F2: _wcslen.LIBCMT ref: 0063F9FD
                                                      • GetDriveTypeW.KERNEL32(?,006E6BF0,00000061), ref: 00694743
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2055661098-1000479233
                                                      • Opcode ID: daa0ec9a8b3070e33e066183a24a9f285adcf20acf1f15b478c6f50e2cf33234
                                                      • Instruction ID: 8cee983abead460e58e26bb66d790ac105aa81770c184fde95de1bec01a96564
                                                      • Opcode Fuzzy Hash: daa0ec9a8b3070e33e066183a24a9f285adcf20acf1f15b478c6f50e2cf33234
                                                      • Instruction Fuzzy Hash: F8B102716083129BCB10DF28C890EAAB7EBAFA5760F10491DF096C7791DF30D946CB92
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      • DragQueryPoint.SHELL32(?,?), ref: 006B9147
                                                        • Part of subcall function 006B7674: ClientToScreen.USER32(?,?), ref: 006B769A
                                                        • Part of subcall function 006B7674: GetWindowRect.USER32(?,?), ref: 006B7710
                                                        • Part of subcall function 006B7674: PtInRect.USER32(?,?,006B8B89), ref: 006B7720
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 006B91B0
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006B91BB
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006B91DE
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 006B9225
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 006B923E
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 006B9255
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 006B9277
                                                      • DragFinish.SHELL32(?), ref: 006B927E
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 006B9371
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#o
                                                      • API String ID: 221274066-2906935444
                                                      • Opcode ID: bf89b95c0e24da12f48283765b8bbc4192699c0a79c97e5b717d8a06b27c4921
                                                      • Instruction ID: 8d69d233da14931170c4b5ae76969005435250c90b037266b1722ec784ab05c4
                                                      • Opcode Fuzzy Hash: bf89b95c0e24da12f48283765b8bbc4192699c0a79c97e5b717d8a06b27c4921
                                                      • Instruction Fuzzy Hash: 75616CB1108301AFC701DF54DC85DAFBBEAEFC9750F000A2DF595921A1DB709A89CBA6
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 006AB198
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006AB1B0
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006AB1D4
                                                      • _wcslen.LIBCMT ref: 006AB200
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006AB214
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006AB236
                                                      • _wcslen.LIBCMT ref: 006AB332
                                                        • Part of subcall function 006905A7: GetStdHandle.KERNEL32(000000F6), ref: 006905C6
                                                      • _wcslen.LIBCMT ref: 006AB34B
                                                      • _wcslen.LIBCMT ref: 006AB366
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006AB3B6
                                                      • GetLastError.KERNEL32(00000000), ref: 006AB407
                                                      • CloseHandle.KERNEL32(?), ref: 006AB439
                                                      • CloseHandle.KERNEL32(00000000), ref: 006AB44A
                                                      • CloseHandle.KERNEL32(00000000), ref: 006AB45C
                                                      • CloseHandle.KERNEL32(00000000), ref: 006AB46E
                                                      • CloseHandle.KERNEL32(?), ref: 006AB4E3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 2178637699-0
                                                      • Opcode ID: 06ed1719819274a699c6d3afe87a9cee756493f92fc6dfabc13c28700d4e6436
                                                      • Instruction ID: 21c0d3bcbe7a3f15e3f9f7f33d32e17e193b151f551073aec2632371fff44367
                                                      • Opcode Fuzzy Hash: 06ed1719819274a699c6d3afe87a9cee756493f92fc6dfabc13c28700d4e6436
                                                      • Instruction Fuzzy Hash: 01F19A316083109FCB54EF24D891B6EBBE6AF86310F14955DF8859B2A2CB31EC45CF96
                                                      APIs
                                                      • GetMenuItemCount.USER32(006F1990), ref: 00662F8D
                                                      • GetMenuItemCount.USER32(006F1990), ref: 0066303D
                                                      • GetCursorPos.USER32(?), ref: 00663081
                                                      • SetForegroundWindow.USER32(00000000), ref: 0066308A
                                                      • TrackPopupMenuEx.USER32(006F1990,00000000,?,00000000,00000000,00000000), ref: 0066309D
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006630A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                      • String ID: 0
                                                      • API String ID: 36266755-4108050209
                                                      • Opcode ID: 2258eaf219582111724f1e1ed1fdb65e74ff29297b8ae7528335e5a5cca5d5a8
                                                      • Instruction ID: 6fdd6e127fd0ad783b18ed29fb6b6478ede2328295c7ca56d57c6c9b6a3d251b
                                                      • Opcode Fuzzy Hash: 2258eaf219582111724f1e1ed1fdb65e74ff29297b8ae7528335e5a5cca5d5a8
                                                      • Instruction Fuzzy Hash: 10712971640626BEEB218F24DC59FEABF6BFF05324F204216F5146A2E0C7B1AE50CB50
                                                      APIs
                                                      • DestroyWindow.USER32(?,?), ref: 006B6DEB
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 006B6E5F
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 006B6E81
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006B6E94
                                                      • DestroyWindow.USER32(?), ref: 006B6EB5
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00620000,00000000), ref: 006B6EE4
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006B6EFD
                                                      • GetDesktopWindow.USER32 ref: 006B6F16
                                                      • GetWindowRect.USER32(00000000), ref: 006B6F1D
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 006B6F35
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 006B6F4D
                                                        • Part of subcall function 00639944: GetWindowLongW.USER32(?,000000EB), ref: 00639952
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                      • String ID: 0$tooltips_class32
                                                      • API String ID: 2429346358-3619404913
                                                      • Opcode ID: 32044d311ff82d1617e38e02e48853d59c549b8c3b42a9ad2c576128684d0d46
                                                      • Instruction ID: 53c9684bc57978b476a35b3fde5602572a22ba97312003b6c7d98baa8e14b0a3
                                                      • Opcode Fuzzy Hash: 32044d311ff82d1617e38e02e48853d59c549b8c3b42a9ad2c576128684d0d46
                                                      • Instruction Fuzzy Hash: BD7166B1504244AFDB21CF28DC48EBABBEAFB89314F04451DFA8987261D774E986CB11
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0069C4B0
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0069C4C3
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0069C4D7
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0069C4F0
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0069C533
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0069C549
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0069C554
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0069C584
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0069C5DC
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0069C5F0
                                                      • InternetCloseHandle.WININET(00000000), ref: 0069C5FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                      • String ID:
                                                      • API String ID: 3800310941-3916222277
                                                      • Opcode ID: 0b399362cfb2c51a7b974fb1034eab8afa5105593d6a0b29d602f0b0109c3f3e
                                                      • Instruction ID: 36397830de798ab34d77b71187370c1b4f4e591d28d7f4b4dd3aa84edf3fc2e1
                                                      • Opcode Fuzzy Hash: 0b399362cfb2c51a7b974fb1034eab8afa5105593d6a0b29d602f0b0109c3f3e
                                                      • Instruction Fuzzy Hash: BB514DB1500204BFDF218F65C948AAB7BFEFF48764F00452AF94596650DB34EA54DB60
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 006B8592
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006B85A2
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006B85AD
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006B85BA
                                                      • GlobalLock.KERNEL32(00000000), ref: 006B85C8
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006B85D7
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 006B85E0
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006B85E7
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006B85F8
                                                      • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,006BFC38,?), ref: 006B8611
                                                      • GlobalFree.KERNEL32(00000000), ref: 006B8621
                                                      • GetObjectW.GDI32(?,00000018,?), ref: 006B8641
                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 006B8671
                                                      • DeleteObject.GDI32(?), ref: 006B8699
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 006B86AF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID:
                                                      • API String ID: 3840717409-0
                                                      • Opcode ID: 6f568b22b6145aa72f9e0b7c2a279ecd1959fcaf89afa6dcd7520be25fcf518f
                                                      • Instruction ID: f855cea588ccbc8ab098efcdddeb3de773478820e56c118936184bea275c1afb
                                                      • Opcode Fuzzy Hash: 6f568b22b6145aa72f9e0b7c2a279ecd1959fcaf89afa6dcd7520be25fcf518f
                                                      • Instruction Fuzzy Hash: 0E410AB5600205AFDB119FA5DC48EAB7BBEFF89721F104159F905E7260DB709E81CB60
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000000), ref: 00691502
                                                      • VariantCopy.OLEAUT32(?,?), ref: 0069150B
                                                      • VariantClear.OLEAUT32(?), ref: 00691517
                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 006915FB
                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00691657
                                                      • VariantInit.OLEAUT32(?), ref: 00691708
                                                      • SysFreeString.OLEAUT32(?), ref: 0069178C
                                                      • VariantClear.OLEAUT32(?), ref: 006917D8
                                                      • VariantClear.OLEAUT32(?), ref: 006917E7
                                                      • VariantInit.OLEAUT32(00000000), ref: 00691823
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                      • API String ID: 1234038744-3931177956
                                                      • Opcode ID: 398989c2963b096925d96220497a8fcfeb54cda996c52a49f923bb0f320b897d
                                                      • Instruction ID: 30b737ce4f4afea94569179a7149647176865dd4db12038f0d478d5b5e237596
                                                      • Opcode Fuzzy Hash: 398989c2963b096925d96220497a8fcfeb54cda996c52a49f923bb0f320b897d
                                                      • Instruction Fuzzy Hash: 99D1F4B1A00516DBDF009F65D845BB9B7BBBF46700F22805AF4469FA90DB30DD42DBA1
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 006AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006AB6AE,?,?), ref: 006AC9B5
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006AC9F1
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006ACA68
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006ACA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006AB6F4
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006AB772
                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 006AB80A
                                                      • RegCloseKey.ADVAPI32(?), ref: 006AB87E
                                                      • RegCloseKey.ADVAPI32(?), ref: 006AB89C
                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 006AB8F2
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 006AB904
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 006AB922
                                                      • FreeLibrary.KERNEL32(00000000), ref: 006AB983
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 006AB994
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 146587525-4033151799
                                                      • Opcode ID: c1c11683459df36064a902e2e9d6e63f8f182ff121ea0ef450a00ff81f360387
                                                      • Instruction ID: debf73aafb2c01c32cda66715ce04c57555a665ce6c8bc5f06ee988ed1ea26d8
                                                      • Opcode Fuzzy Hash: c1c11683459df36064a902e2e9d6e63f8f182ff121ea0ef450a00ff81f360387
                                                      • Instruction Fuzzy Hash: 62C16A30208601AFD714EF14C494B6ABBE6BF86318F14959CF49A4B3A2CB75ED46CF91
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 006A25D8
                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 006A25E8
                                                      • CreateCompatibleDC.GDI32(?), ref: 006A25F4
                                                      • SelectObject.GDI32(00000000,?), ref: 006A2601
                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 006A266D
                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 006A26AC
                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 006A26D0
                                                      • SelectObject.GDI32(?,?), ref: 006A26D8
                                                      • DeleteObject.GDI32(?), ref: 006A26E1
                                                      • DeleteDC.GDI32(?), ref: 006A26E8
                                                      • ReleaseDC.USER32(00000000,?), ref: 006A26F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: 334e7fddf11c4f9adf365480ec6cff6a1d84cb8045703a3ea6bf88cd7d19972b
                                                      • Instruction ID: 74c62e1304d8fe2d0d0138da2a289f21a82d9710b7e06a245854defd2b6e3e9f
                                                      • Opcode Fuzzy Hash: 334e7fddf11c4f9adf365480ec6cff6a1d84cb8045703a3ea6bf88cd7d19972b
                                                      • Instruction Fuzzy Hash: 2261F3B5D00219EFCF04DFA8D894AAEBBB6FF48310F208529E555A7250D771AE41CF64
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 0065DAA1
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D659
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D66B
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D67D
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D68F
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D6A1
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D6B3
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D6C5
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D6D7
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D6E9
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D6FB
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D70D
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D71F
                                                        • Part of subcall function 0065D63C: _free.LIBCMT ref: 0065D731
                                                      • _free.LIBCMT ref: 0065DA96
                                                        • Part of subcall function 006529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000), ref: 006529DE
                                                        • Part of subcall function 006529C8: GetLastError.KERNEL32(00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000,00000000), ref: 006529F0
                                                      • _free.LIBCMT ref: 0065DAB8
                                                      • _free.LIBCMT ref: 0065DACD
                                                      • _free.LIBCMT ref: 0065DAD8
                                                      • _free.LIBCMT ref: 0065DAFA
                                                      • _free.LIBCMT ref: 0065DB0D
                                                      • _free.LIBCMT ref: 0065DB1B
                                                      • _free.LIBCMT ref: 0065DB26
                                                      • _free.LIBCMT ref: 0065DB5E
                                                      • _free.LIBCMT ref: 0065DB65
                                                      • _free.LIBCMT ref: 0065DB82
                                                      • _free.LIBCMT ref: 0065DB9A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 56073c77d5e5dedc06c59640b27beab6d95e19a5d4c1439a692bbd2a20ab543e
                                                      • Instruction ID: ae92d7381eb84cb270e965c79aac7470944bb455ff026549362c8bd25a7d0a70
                                                      • Opcode Fuzzy Hash: 56073c77d5e5dedc06c59640b27beab6d95e19a5d4c1439a692bbd2a20ab543e
                                                      • Instruction Fuzzy Hash: 6B3159716043069FEB71AA3AE845B9A77EBFF01712F11441DE848E7391DA31AC88CB24
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0068369C
                                                      • _wcslen.LIBCMT ref: 006836A7
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00683797
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 0068380C
                                                      • GetDlgCtrlID.USER32(?), ref: 0068385D
                                                      • GetWindowRect.USER32(?,?), ref: 00683882
                                                      • GetParent.USER32(?), ref: 006838A0
                                                      • ScreenToClient.USER32(00000000), ref: 006838A7
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00683921
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0068395D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                      • String ID: %s%u
                                                      • API String ID: 4010501982-679674701
                                                      • Opcode ID: 94f1e2863486db16bf541a47a403aec6a4bac4dec22969462e7f1a51f0737859
                                                      • Instruction ID: 529f5bd510273d3170c63bdb521f3158d3e5f103233d490df9f390e6989ecdf3
                                                      • Opcode Fuzzy Hash: 94f1e2863486db16bf541a47a403aec6a4bac4dec22969462e7f1a51f0737859
                                                      • Instruction Fuzzy Hash: B491C471204626AFDB15EF24C885FEAF7AAFF44750F004719F999D2290EB30EA45CB91
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00684994
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 006849DA
                                                      • _wcslen.LIBCMT ref: 006849EB
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 006849F7
                                                      • _wcsstr.LIBVCRUNTIME ref: 00684A2C
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00684A64
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00684A9D
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00684AE6
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00684B20
                                                      • GetWindowRect.USER32(?,?), ref: 00684B8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                      • String ID: ThumbnailClass
                                                      • API String ID: 1311036022-1241985126
                                                      • Opcode ID: 4cb10e6e1224f82a1db241a7cd4e2275157c3ba5033e2d85318ea356a2cab4cb
                                                      • Instruction ID: ea3b727da3084e353c8487eaf238b836644b9e2b9247801ad36f05c9f7ae7956
                                                      • Opcode Fuzzy Hash: 4cb10e6e1224f82a1db241a7cd4e2275157c3ba5033e2d85318ea356a2cab4cb
                                                      • Instruction Fuzzy Hash: DD91BF710042069FDB04EF14C985FAA77EAFF84314F04466AFD859A296EF30ED45CBA1
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006B8D5A
                                                      • GetFocus.USER32 ref: 006B8D6A
                                                      • GetDlgCtrlID.USER32(00000000), ref: 006B8D75
                                                      • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 006B8E1D
                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 006B8ECF
                                                      • GetMenuItemCount.USER32(?), ref: 006B8EEC
                                                      • GetMenuItemID.USER32(?,00000000), ref: 006B8EFC
                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 006B8F2E
                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 006B8F70
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006B8FA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                      • String ID: 0
                                                      • API String ID: 1026556194-4108050209
                                                      • Opcode ID: fa63d7154ce22c9dc143d6df55fac92aa7c5c3e1e890a1ad34e1bf691dde27e1
                                                      • Instruction ID: f11a0721f3614344b634a9557e34268b7d382a88b08a6d9cdbe789970f016f42
                                                      • Opcode Fuzzy Hash: fa63d7154ce22c9dc143d6df55fac92aa7c5c3e1e890a1ad34e1bf691dde27e1
                                                      • Instruction Fuzzy Hash: B2815CB1504301AFDB10CF14D884AEBBBEEFB88754F140A1DF99597291DB71D981CBA1
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0068DC20
                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0068DC46
                                                      • _wcslen.LIBCMT ref: 0068DC50
                                                      • _wcsstr.LIBVCRUNTIME ref: 0068DCA0
                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0068DCBC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                      • API String ID: 1939486746-1459072770
                                                      • Opcode ID: e9d02562988b6dc9bbe9958e84570b67bf3cf3e5cd847baf1d469da34e07e4a5
                                                      • Instruction ID: 211935ba5339102b2a0025c1fc3613f7a221684147e4c4823bbcf16495f29b45
                                                      • Opcode Fuzzy Hash: e9d02562988b6dc9bbe9958e84570b67bf3cf3e5cd847baf1d469da34e07e4a5
                                                      • Instruction Fuzzy Hash: 1F41FF729402007ADB50B775DC07EFF77AEEF52760F10016EF900A6282EA709A0197B9
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 006ACC64
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 006ACC8D
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 006ACD48
                                                        • Part of subcall function 006ACC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 006ACCAA
                                                        • Part of subcall function 006ACC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 006ACCBD
                                                        • Part of subcall function 006ACC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 006ACCCF
                                                        • Part of subcall function 006ACC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 006ACD05
                                                        • Part of subcall function 006ACC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 006ACD28
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 006ACCF3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2734957052-4033151799
                                                      • Opcode ID: 42f92c21376d3302e297e2f79d1dead6834cb25ed00509801007de0142dba27b
                                                      • Instruction ID: 2644086d41283e6757d26b2ea6e3dd72a2a5fafa0c5a997d5079c109d89776cf
                                                      • Opcode Fuzzy Hash: 42f92c21376d3302e297e2f79d1dead6834cb25ed00509801007de0142dba27b
                                                      • Instruction Fuzzy Hash: 663180B1901128BBD720AB55DC88EFFBB7EEF56760F000165B906E2241DB709F45DAB0
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00693D40
                                                      • _wcslen.LIBCMT ref: 00693D6D
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00693D9D
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00693DBE
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00693DCE
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00693E55
                                                      • CloseHandle.KERNEL32(00000000), ref: 00693E60
                                                      • CloseHandle.KERNEL32(00000000), ref: 00693E6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 1149970189-3457252023
                                                      • Opcode ID: 74c2916871dda9b8f500920ed9edb2bcf39da049874e64a36cd95e0bbd3e11a3
                                                      • Instruction ID: 8607feb721aa4f7ff3284ee0b8b75fc740da57de7f3ba8e8bf4ab4012733a431
                                                      • Opcode Fuzzy Hash: 74c2916871dda9b8f500920ed9edb2bcf39da049874e64a36cd95e0bbd3e11a3
                                                      • Instruction Fuzzy Hash: 1A31C3B1904219ABDF209FA0DC59FEB37BEEF88710F1041B6F605D6260EB7097848B24
                                                      APIs
                                                      • timeGetTime.WINMM ref: 0068E6B4
                                                        • Part of subcall function 0063E551: timeGetTime.WINMM(?,?,0068E6D4), ref: 0063E555
                                                      • Sleep.KERNEL32(0000000A), ref: 0068E6E1
                                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0068E705
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0068E727
                                                      • SetActiveWindow.USER32 ref: 0068E746
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0068E754
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0068E773
                                                      • Sleep.KERNEL32(000000FA), ref: 0068E77E
                                                      • IsWindow.USER32 ref: 0068E78A
                                                      • EndDialog.USER32(00000000), ref: 0068E79B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: 420f106f39cb7fff87be904588385c140ad58510de7e727faa55d82f744e3cf6
                                                      • Instruction ID: 81e2a78c1cdda7e873b598a82f39a2c45fef3177c74a30db3a4dba067e82853a
                                                      • Opcode Fuzzy Hash: 420f106f39cb7fff87be904588385c140ad58510de7e727faa55d82f744e3cf6
                                                      • Instruction Fuzzy Hash: 73218EB1240205AFEB106F20ECD9E363B6BF755B58F102625F501D22B1EBB2AD80DB24
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0068EA5D
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0068EA73
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068EA84
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0068EA96
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0068EAA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: SendString$_wcslen
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2420728520-1007645807
                                                      • Opcode ID: 4b5820caff7bfeac57294386925ca985e027280d9ec4dba917b0686c61b21676
                                                      • Instruction ID: 986582c301e7d31753c7b3dca592b0a72807c1a00753bad2b650d92a2bf917bd
                                                      • Opcode Fuzzy Hash: 4b5820caff7bfeac57294386925ca985e027280d9ec4dba917b0686c61b21676
                                                      • Instruction Fuzzy Hash: 6D115431A9126979D724F766DC4ADFF6A7EEBD1F40F010529B411A20D1EFB10A45CAB0
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 00685CE2
                                                      • GetWindowRect.USER32(00000000,?), ref: 00685CFB
                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00685D59
                                                      • GetDlgItem.USER32(?,00000002), ref: 00685D69
                                                      • GetWindowRect.USER32(00000000,?), ref: 00685D7B
                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00685DCF
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00685DDD
                                                      • GetWindowRect.USER32(00000000,?), ref: 00685DEF
                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00685E31
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00685E44
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00685E5A
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00685E67
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: 3d2d768a096e1e33feb1907fe33c5fc8547d88fd245211c12188bbd89468eb52
                                                      • Instruction ID: 0d044f93ca63a65af7c9717e28c76752a0ff5b00707ffc1ab0c249fdc03c3fe9
                                                      • Opcode Fuzzy Hash: 3d2d768a096e1e33feb1907fe33c5fc8547d88fd245211c12188bbd89468eb52
                                                      • Instruction Fuzzy Hash: BE5120B0A00615AFDF18DF68CD99AAE7BB6FF48310F108229F916E6290D7709E44CB50
                                                      APIs
                                                        • Part of subcall function 00638F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00638BE8,?,00000000,?,?,?,?,00638BBA,00000000,?), ref: 00638FC5
                                                      • DestroyWindow.USER32(?), ref: 00638C81
                                                      • KillTimer.USER32(00000000,?,?,?,?,00638BBA,00000000,?), ref: 00638D1B
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00676973
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00638BBA,00000000,?), ref: 006769A1
                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00638BBA,00000000,?), ref: 006769B8
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00638BBA,00000000), ref: 006769D4
                                                      • DeleteObject.GDI32(00000000), ref: 006769E6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: 23bdf84ef3521bc8e4f3de5ba0d2b379794a9ed7a089f3c3e48b6d050b85a11f
                                                      • Instruction ID: 2b7359fdcc3a6f741169a4e8f8084e0586d7130aba28617c5415b491ee5b80e5
                                                      • Opcode Fuzzy Hash: 23bdf84ef3521bc8e4f3de5ba0d2b379794a9ed7a089f3c3e48b6d050b85a11f
                                                      • Instruction Fuzzy Hash: C3618A71502B01DFCB259F25CA48BA5B7F3FB51352F14A52DF0469B660CB71A981CBE0
                                                      APIs
                                                        • Part of subcall function 00639944: GetWindowLongW.USER32(?,000000EB), ref: 00639952
                                                      • GetSysColor.USER32(0000000F), ref: 00639862
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: af9baa70db9b923493dbf43c43188b2654a71817be822bf1e9e4ca65cfd54153
                                                      • Instruction ID: 2cf15e997d7b8e5d13c58711241852187c166e8e4f2de9509a7de8165c0588c4
                                                      • Opcode Fuzzy Hash: af9baa70db9b923493dbf43c43188b2654a71817be822bf1e9e4ca65cfd54153
                                                      • Instruction Fuzzy Hash: 6041BF71504640AFDB205F3C9C84BBA3BA7AB56330F144B05F9A29B2E1C7B19D82DF60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .d
                                                      • API String ID: 0-3816422287
                                                      • Opcode ID: ae31b71ff728ab7744f1e96581deacef8830276df75dc943f7d645f6a09c0de0
                                                      • Instruction ID: 9755540b8f9fe467559c097dab7d30e02f132491a7e560d591f3df6264041b2e
                                                      • Opcode Fuzzy Hash: ae31b71ff728ab7744f1e96581deacef8830276df75dc943f7d645f6a09c0de0
                                                      • Instruction Fuzzy Hash: DEC1CE74A04249EFDF11DFA8C845BEEBBB2AF09311F04419DEC15A7392C7709A4ACB65
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0066F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00689717
                                                      • LoadStringW.USER32(00000000,?,0066F7F8,00000001), ref: 00689720
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0066F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00689742
                                                      • LoadStringW.USER32(00000000,?,0066F7F8,00000001), ref: 00689745
                                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00689866
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 747408836-2268648507
                                                      • Opcode ID: ad6505f659a7a6030b5805e4c9b6e4f60ff20578d4fbf29eff9e040dbd3ec6eb
                                                      • Instruction ID: 3fb04f150f1315c8b1713a3926a7d78bd3d3927a8b7487c6cea6e0ecda0befd3
                                                      • Opcode Fuzzy Hash: ad6505f659a7a6030b5805e4c9b6e4f60ff20578d4fbf29eff9e040dbd3ec6eb
                                                      • Instruction Fuzzy Hash: 87415C72800629AACB44FBE0ED86DEEB77AAF54340F140529F20172192EB356F48CF75
                                                      APIs
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006807A2
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006807BE
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006807DA
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00680804
                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0068082C
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00680837
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0068083C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 323675364-22481851
                                                      • Opcode ID: 5766447cb0268797c9351438aacae69b1b7c631acc9b88f35785e49fca4dbf24
                                                      • Instruction ID: 4572a38484a953e218a53df719b7f440dcb1132aa0bd8367cf2f29640e159857
                                                      • Opcode Fuzzy Hash: 5766447cb0268797c9351438aacae69b1b7c631acc9b88f35785e49fca4dbf24
                                                      • Instruction Fuzzy Hash: 04411972C10629ABDF15EBA4DC958EDB77ABF04350F054629F901A32A1EB705E48CFA0
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 006A3C5C
                                                      • CoInitialize.OLE32(00000000), ref: 006A3C8A
                                                      • CoUninitialize.OLE32 ref: 006A3C94
                                                      • _wcslen.LIBCMT ref: 006A3D2D
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 006A3DB1
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 006A3ED5
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 006A3F0E
                                                      • CoGetObject.OLE32(?,00000000,006BFB98,?), ref: 006A3F2D
                                                      • SetErrorMode.KERNEL32(00000000), ref: 006A3F40
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 006A3FC4
                                                      • VariantClear.OLEAUT32(?), ref: 006A3FD8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                      • String ID:
                                                      • API String ID: 429561992-0
                                                      • Opcode ID: 3b55db36699f0eec6aeec6d73fc278443f9c3be56399ba4386ad19ed8a5c0f9f
                                                      • Instruction ID: f6e1bbbc5064de4513312f44e9461c5c479ad13d62090666414372e4e31ae84d
                                                      • Opcode Fuzzy Hash: 3b55db36699f0eec6aeec6d73fc278443f9c3be56399ba4386ad19ed8a5c0f9f
                                                      • Instruction Fuzzy Hash: C6C115B16042119FD740EF68C88496BBBEAFF8A754F10491DF98A9B311DB30EE45CB52
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00697AF3
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00697B8F
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00697BA3
                                                      • CoCreateInstance.OLE32(006BFD08,00000000,00000001,006E6E6C,?), ref: 00697BEF
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00697C74
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00697CCC
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00697D57
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00697D7A
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00697D81
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00697DD6
                                                      • CoUninitialize.OLE32 ref: 00697DDC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                      • String ID:
                                                      • API String ID: 2762341140-0
                                                      • Opcode ID: 2d974582f35a75ad08a2f72b6dfb6afc4fd8f168e13d4813ccdd4c50c861232b
                                                      • Instruction ID: 9795e55b448fdaf1951884e7bdb6d6056150688d2debaa89aba375e9a5f9f20b
                                                      • Opcode Fuzzy Hash: 2d974582f35a75ad08a2f72b6dfb6afc4fd8f168e13d4813ccdd4c50c861232b
                                                      • Instruction Fuzzy Hash: 0BC13975A04119AFCB14DFA4C884DAEBBFAFF48314B148599E8199B761C730EE45CB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 006B5504
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006B5515
                                                      • CharNextW.USER32(00000158), ref: 006B5544
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 006B5585
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 006B559B
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006B55AC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CharNext
                                                      • String ID:
                                                      • API String ID: 1350042424-0
                                                      • Opcode ID: 75122c53b3fd9a4730c72ad6a3bc437aa3c582ece4d0d97580fcd8a07fbe3e70
                                                      • Instruction ID: 52e753db3cdb19f720cadce48df9f4782d2fb5f16734e4dcaa013856a3a17195
                                                      • Opcode Fuzzy Hash: 75122c53b3fd9a4730c72ad6a3bc437aa3c582ece4d0d97580fcd8a07fbe3e70
                                                      • Instruction Fuzzy Hash: B4618CB1900618EFDF209F54CC84EFE7BBAEB09761F104149F926AA291D7708AC1DB60
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0067FAAF
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 0067FB08
                                                      • VariantInit.OLEAUT32(?), ref: 0067FB1A
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 0067FB3A
                                                      • VariantCopy.OLEAUT32(?,?), ref: 0067FB8D
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 0067FBA1
                                                      • VariantClear.OLEAUT32(?), ref: 0067FBB6
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 0067FBC3
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0067FBCC
                                                      • VariantClear.OLEAUT32(?), ref: 0067FBDE
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0067FBE9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 2c1ccca453ca90e86fbfdaa688af23c9048182c250acb8442bdf209babe4006a
                                                      • Instruction ID: f5d5b5acc32cdb20532379d3aab0641c1e0ea00be1d072486354c07d030a0323
                                                      • Opcode Fuzzy Hash: 2c1ccca453ca90e86fbfdaa688af23c9048182c250acb8442bdf209babe4006a
                                                      • Instruction Fuzzy Hash: B4414175A00219DFCB00DF64D854DEEBBBAEF48754F008569E959A7261CB30AA45CFA0
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00689CA1
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00689D22
                                                      • GetKeyState.USER32(000000A0), ref: 00689D3D
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00689D57
                                                      • GetKeyState.USER32(000000A1), ref: 00689D6C
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00689D84
                                                      • GetKeyState.USER32(00000011), ref: 00689D96
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00689DAE
                                                      • GetKeyState.USER32(00000012), ref: 00689DC0
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00689DD8
                                                      • GetKeyState.USER32(0000005B), ref: 00689DEA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 58de33e19d22f43df6002da802f6f7e8e7126914576bfaa5d017785daacc5f36
                                                      • Instruction ID: 10125599ab7f8db4d8fac5f9528cfa08ca887eb08f36dc5ed5c67f1f3db4a5f4
                                                      • Opcode Fuzzy Hash: 58de33e19d22f43df6002da802f6f7e8e7126914576bfaa5d017785daacc5f36
                                                      • Instruction Fuzzy Hash: C541B874504BC96DFF31A660C8043F5BEA26F11344F0C825AD6C6567C2DBA59AC4C7B6
                                                      APIs
                                                      • WSAStartup.WSOCK32(00000101,?), ref: 006A05BC
                                                      • inet_addr.WSOCK32(?), ref: 006A061C
                                                      • gethostbyname.WSOCK32(?), ref: 006A0628
                                                      • IcmpCreateFile.IPHLPAPI ref: 006A0636
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 006A06C6
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 006A06E5
                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 006A07B9
                                                      • WSACleanup.WSOCK32 ref: 006A07BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: dacd384e2829173a213d7a2e353654d5455aad0904cda4aa8c2c8bc023153f1f
                                                      • Instruction ID: f1e8b4ca324f62d4f61f40a00b7c0714911b7cdccf05a9cc52e975aa3e7a7ace
                                                      • Opcode Fuzzy Hash: dacd384e2829173a213d7a2e353654d5455aad0904cda4aa8c2c8bc023153f1f
                                                      • Instruction Fuzzy Hash: F591AF755042019FE320EF15C588F5ABBE2AF4A318F1485A9F46A9B7A2C730FD85CF91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharLower
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 707087890-567219261
                                                      • Opcode ID: ffb166db3a8a70a9d4751ed0ad89f0d0961afabaaeb29c11552795247dcaa763
                                                      • Instruction ID: 03dac29321e8902d9e4d77ad00f045517e3668573ec15ad44c30d7c41cddc48e
                                                      • Opcode Fuzzy Hash: ffb166db3a8a70a9d4751ed0ad89f0d0961afabaaeb29c11552795247dcaa763
                                                      • Instruction Fuzzy Hash: 9D518F31A005269FCB14FF68C9519FEB7A7BF66724B204229E426A7385DF30DD41CB90
                                                      APIs
                                                      • CoInitialize.OLE32 ref: 006A3774
                                                      • CoUninitialize.OLE32 ref: 006A377F
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,006BFB78,?), ref: 006A37D9
                                                      • IIDFromString.OLE32(?,?), ref: 006A384C
                                                      • VariantInit.OLEAUT32(?), ref: 006A38E4
                                                      • VariantClear.OLEAUT32(?), ref: 006A3936
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 636576611-1287834457
                                                      • Opcode ID: e6ccc7c496e3a62c15c1ac21634450656500cdbb1926a68f1228cc36bf7d08a7
                                                      • Instruction ID: 950caa6d573806cf4def12d1af7136e7bf046adcd996ed7bc22551298a564488
                                                      • Opcode Fuzzy Hash: e6ccc7c496e3a62c15c1ac21634450656500cdbb1926a68f1228cc36bf7d08a7
                                                      • Instruction Fuzzy Hash: 24619FB0608321AFD310EF54D848B9ABBE6AF46710F10091DF5859B391D774EE49CF96
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                        • Part of subcall function 0063912D: GetCursorPos.USER32(?), ref: 00639141
                                                        • Part of subcall function 0063912D: ScreenToClient.USER32(00000000,?), ref: 0063915E
                                                        • Part of subcall function 0063912D: GetAsyncKeyState.USER32(00000001), ref: 00639183
                                                        • Part of subcall function 0063912D: GetAsyncKeyState.USER32(00000002), ref: 0063919D
                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 006B8B6B
                                                      • ImageList_EndDrag.COMCTL32 ref: 006B8B71
                                                      • ReleaseCapture.USER32 ref: 006B8B77
                                                      • SetWindowTextW.USER32(?,00000000), ref: 006B8C12
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 006B8C25
                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 006B8CFF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#o
                                                      • API String ID: 1924731296-2710196452
                                                      • Opcode ID: 3c183c7a53afcac68bf8aab47bdc4351c0ef41613fed3952d701886db2c937d9
                                                      • Instruction ID: 891c50311f7cc13f1590834492e259c7312dfd6b9353a5b74e27944ccd214696
                                                      • Opcode Fuzzy Hash: 3c183c7a53afcac68bf8aab47bdc4351c0ef41613fed3952d701886db2c937d9
                                                      • Instruction Fuzzy Hash: 3951AFB1204304AFD704DF14DC56FAA7BE6FB89750F00062DF952972E1DB71A944CBA6
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 006933CF
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 006933F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LoadString$_wcslen
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 4099089115-3080491070
                                                      • Opcode ID: c4654700a0e78b73fd1c0232d9bcc08a92fe315315c072cda4f7c006f4a3dd83
                                                      • Instruction ID: ee8533b387fa4a010b80367729cca7e353a424656aef4aeb33961f3868a1124b
                                                      • Opcode Fuzzy Hash: c4654700a0e78b73fd1c0232d9bcc08a92fe315315c072cda4f7c006f4a3dd83
                                                      • Instruction Fuzzy Hash: 4851BF72D00629AACF54EBA0DD42EEEB37AAF14380F144569F00572291EB352F58CF64
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                      • API String ID: 1256254125-769500911
                                                      • Opcode ID: 3ae6a74fcd0864c49c46851d2c3444efb6412a106e82fe90e097808d6fb1439c
                                                      • Instruction ID: f5d993d40e5b54764d4e478fc1f62eac9503b6663c94d2b3ebae053afe7b8d4e
                                                      • Opcode Fuzzy Hash: 3ae6a74fcd0864c49c46851d2c3444efb6412a106e82fe90e097808d6fb1439c
                                                      • Instruction Fuzzy Hash: 85419532A011269ACB207E7DC8915FE7BA7AF61794B256329E461D7384F731CDC2C790
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 006953A0
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00695416
                                                      • GetLastError.KERNEL32 ref: 00695420
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 006954A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: 014f408c0d3f99e38106753b52b0d4b5b9b0860e58ead1eb94148abff2db85ae
                                                      • Instruction ID: bf64742b9875103fb6635600c19c4c788a9530c6b8cf70077ee73ff2a5b2ee33
                                                      • Opcode Fuzzy Hash: 014f408c0d3f99e38106753b52b0d4b5b9b0860e58ead1eb94148abff2db85ae
                                                      • Instruction Fuzzy Hash: 5131C375A006059FCB52DF68C884AEABBFAEF44705F148069F406DB792DB30DD86CB90
                                                      APIs
                                                      • CreateMenu.USER32 ref: 006B3C79
                                                      • SetMenu.USER32(?,00000000), ref: 006B3C88
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006B3D10
                                                      • IsMenu.USER32(?), ref: 006B3D24
                                                      • CreatePopupMenu.USER32 ref: 006B3D2E
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006B3D5B
                                                      • DrawMenuBar.USER32 ref: 006B3D63
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                      • String ID: 0$F
                                                      • API String ID: 161812096-3044882817
                                                      • Opcode ID: 515a3e4c6c1a75268f0f1a59902e7a7da73d5b57cba7ead6ca67e57c9bc30db0
                                                      • Instruction ID: a3ef4d31fc0551bef0d125d594fa4e72e6b79ddd8bbe5ed2e145489e6fdb1b44
                                                      • Opcode Fuzzy Hash: 515a3e4c6c1a75268f0f1a59902e7a7da73d5b57cba7ead6ca67e57c9bc30db0
                                                      • Instruction Fuzzy Hash: 77417AB9B01219EFDB24CFA4D844AEA7BB6FF49350F140129F946A7360D770AA50CF94
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006B3A9D
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 006B3AA0
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B3AC7
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006B3AEA
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 006B3B62
                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 006B3BAC
                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 006B3BC7
                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 006B3BE2
                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 006B3BF6
                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 006B3C13
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow
                                                      • String ID:
                                                      • API String ID: 312131281-0
                                                      • Opcode ID: b920bc5aa5fe02762f6f329b5ee5d7979e1f08264acc9c690f01708d8edede23
                                                      • Instruction ID: 6b32e2073e1380313d7cd25770a2c32793299434ab1eddf944e5bb4e717fd489
                                                      • Opcode Fuzzy Hash: b920bc5aa5fe02762f6f329b5ee5d7979e1f08264acc9c690f01708d8edede23
                                                      • Instruction Fuzzy Hash: 69618CB5A00258AFDB10DFA8CC81EEE77B9EB09700F100199FA15AB391D770AE85DB50
                                                      APIs
                                                      • _free.LIBCMT ref: 00652C94
                                                        • Part of subcall function 006529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000), ref: 006529DE
                                                        • Part of subcall function 006529C8: GetLastError.KERNEL32(00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000,00000000), ref: 006529F0
                                                      • _free.LIBCMT ref: 00652CA0
                                                      • _free.LIBCMT ref: 00652CAB
                                                      • _free.LIBCMT ref: 00652CB6
                                                      • _free.LIBCMT ref: 00652CC1
                                                      • _free.LIBCMT ref: 00652CCC
                                                      • _free.LIBCMT ref: 00652CD7
                                                      • _free.LIBCMT ref: 00652CE2
                                                      • _free.LIBCMT ref: 00652CED
                                                      • _free.LIBCMT ref: 00652CFB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 664c55bfebd1286bb85ffbbd4171cae00091c0cc47affaf4d512de1cea895737
                                                      • Instruction ID: da4709ff3d57f353b205b96a2bed5e40bdbd225e44b8b799567e18b0cce142ce
                                                      • Opcode Fuzzy Hash: 664c55bfebd1286bb85ffbbd4171cae00091c0cc47affaf4d512de1cea895737
                                                      • Instruction Fuzzy Hash: 9F11D476100109AFCB82EF55D892CDD3BA6FF06751F4144A8FE48AF322DA31EE549B94
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00621459
                                                      • OleUninitialize.OLE32(?,00000000), ref: 006214F8
                                                      • UnregisterHotKey.USER32(?), ref: 006216DD
                                                      • DestroyWindow.USER32(?), ref: 006624B9
                                                      • FreeLibrary.KERNEL32(?), ref: 0066251E
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0066254B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: 922e0fb4b07906d04b64dbc4fad6c40a4c56b76412c6f152e7470f2cb7c1ba95
                                                      • Instruction ID: dbacda7fe6944e67474c6f660fcff92d557602a36d2008ff54433314cf27f526
                                                      • Opcode Fuzzy Hash: 922e0fb4b07906d04b64dbc4fad6c40a4c56b76412c6f152e7470f2cb7c1ba95
                                                      • Instruction Fuzzy Hash: 87D1AF71705A22CFDB29EF14D4A5A68F7A2BF15710F1442ADE44AAB351CB30ED12CF94
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00625C7A
                                                        • Part of subcall function 00625D0A: GetClientRect.USER32(?,?), ref: 00625D30
                                                        • Part of subcall function 00625D0A: GetWindowRect.USER32(?,?), ref: 00625D71
                                                        • Part of subcall function 00625D0A: ScreenToClient.USER32(?,?), ref: 00625D99
                                                      • GetDC.USER32 ref: 006646F5
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00664708
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00664716
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0066472B
                                                      • ReleaseDC.USER32(?,00000000), ref: 00664733
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006647C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: 4c4ea5ca639cf13d2962b33766cf5d2c8a0fddbdcff0c783e1beb4d10d8d618b
                                                      • Instruction ID: a574f5c60f048f3e99b451f410933b8130d2dd21806182b9beb8c2150b156d06
                                                      • Opcode Fuzzy Hash: 4c4ea5ca639cf13d2962b33766cf5d2c8a0fddbdcff0c783e1beb4d10d8d618b
                                                      • Instruction Fuzzy Hash: 0471DF31500605DFCF218F64C984AFA7BB7FF4A360F144269ED569A2A6DB319882DF60
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006935E4
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • LoadStringW.USER32(006F2390,?,00000FFF,?), ref: 0069360A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LoadString$_wcslen
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 4099089115-2391861430
                                                      • Opcode ID: 64056f6e9c0c00067a61d4aa1a77a6833e3d709d333ae01d682ee38339f4d096
                                                      • Instruction ID: d979c3a49e8677df404a440dd732163f59d0b9488e417b077a07aaea360d0ed8
                                                      • Opcode Fuzzy Hash: 64056f6e9c0c00067a61d4aa1a77a6833e3d709d333ae01d682ee38339f4d096
                                                      • Instruction Fuzzy Hash: 8D517072C00669ABCF54EBE0DC42EEDBB7AAF14340F144129F10576291DB315B99DF68
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0069C272
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0069C29A
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0069C2CA
                                                      • GetLastError.KERNEL32 ref: 0069C322
                                                      • SetEvent.KERNEL32(?), ref: 0069C336
                                                      • InternetCloseHandle.WININET(00000000), ref: 0069C341
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: 47e2d9a8709f06eadca5c68abc7eb5744c6321fd34631b58c4ba653b04d5d0b3
                                                      • Instruction ID: 073356df1c2cd965dcdcd7044095df34c420dcb94856fa0b6959dbead9193add
                                                      • Opcode Fuzzy Hash: 47e2d9a8709f06eadca5c68abc7eb5744c6321fd34631b58c4ba653b04d5d0b3
                                                      • Instruction Fuzzy Hash: 17318FB1600208AFDB219F64CC88AAB7BFEEF49764F10852EF446D3601DB30DE459B61
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00663AAF,?,?,Bad directive syntax error,006BCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 006898BC
                                                      • LoadStringW.USER32(00000000,?,00663AAF,?), ref: 006898C3
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00689987
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 858772685-4153970271
                                                      • Opcode ID: 6f63a76934e7e7a0faa0dc1a54e5281a8fa97b7af5059a7ccaa7e2d62a3b4b9b
                                                      • Instruction ID: f1d86223bd2b0c6b153566a624c2000d9d9ffbb0f4bd0024383e90067fa4dae7
                                                      • Opcode Fuzzy Hash: 6f63a76934e7e7a0faa0dc1a54e5281a8fa97b7af5059a7ccaa7e2d62a3b4b9b
                                                      • Instruction Fuzzy Hash: 90219C31C0026AABCF15EF90DC06EEE7777BF28340F084829F515660A2EB759A58CF64
                                                      APIs
                                                      • GetParent.USER32 ref: 006820AB
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 006820C0
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0068214D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1290815626-3381328864
                                                      • Opcode ID: ce3858b9162ec69e3a56274faf3364f11391df503a89bf18e4240a12162e1025
                                                      • Instruction ID: cf6f1ef70f4d24e5ea6e63a48b6d1377c6ba8980485e5a878dc9211103a8af85
                                                      • Opcode Fuzzy Hash: ce3858b9162ec69e3a56274faf3364f11391df503a89bf18e4240a12162e1025
                                                      • Instruction Fuzzy Hash: 3A1159B6688707BAF7113221DC2FDE7339FDB05328B30021AFB45A41D2FEA168825718
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                      • String ID:
                                                      • API String ID: 1282221369-0
                                                      • Opcode ID: c55f8c1160da25cefe85b4de3f6a8e9d312df2572b004a1ae52114709bfeb350
                                                      • Instruction ID: 7d3fa9c80da302a3594e84d29a1ebc6887a07eb2fd4f808debab4e17048967e1
                                                      • Opcode Fuzzy Hash: c55f8c1160da25cefe85b4de3f6a8e9d312df2572b004a1ae52114709bfeb350
                                                      • Instruction Fuzzy Hash: 606116B1908301AFDB21AFB4DC91ABE7BA7AF05722F04416DFD44A7382D6319D09C794
                                                      APIs
                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 006B5186
                                                      • ShowWindow.USER32(?,00000000), ref: 006B51C7
                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 006B51CD
                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 006B51D1
                                                        • Part of subcall function 006B6FBA: DeleteObject.GDI32(00000000), ref: 006B6FE6
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B520D
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006B521A
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006B524D
                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 006B5287
                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 006B5296
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                      • String ID:
                                                      • API String ID: 3210457359-0
                                                      • Opcode ID: bfbed70edcafba1eddb709f80dd9c9c547c78ee89c7b02f5d2bfb6469b6ff766
                                                      • Instruction ID: eb0351fd767dbdebb0c9190cce36ac002a3cc5d0e026456d61d41f4346af25be
                                                      • Opcode Fuzzy Hash: bfbed70edcafba1eddb709f80dd9c9c547c78ee89c7b02f5d2bfb6469b6ff766
                                                      • Instruction Fuzzy Hash: 2B51C3B0A52A08BFEF249F28DC46BD83B67EB05321F144116F616963E1C7B5AAC0DB50
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00676890
                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 006768A9
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006768B9
                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 006768D1
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006768F2
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00638874,00000000,00000000,00000000,000000FF,00000000), ref: 00676901
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0067691E
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00638874,00000000,00000000,00000000,000000FF,00000000), ref: 0067692D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                      • String ID:
                                                      • API String ID: 1268354404-0
                                                      • Opcode ID: 243105fdfe9985a6f8a883873ce86ba7a0d111456bcd5a75074e4b726da09869
                                                      • Instruction ID: c3b3c28a7d07e12ad7cdf06ed9234380e8b3fd3d7e44c0dc8c3589689e1ba070
                                                      • Opcode Fuzzy Hash: 243105fdfe9985a6f8a883873ce86ba7a0d111456bcd5a75074e4b726da09869
                                                      • Instruction Fuzzy Hash: 1E515CB0600706EFDB20CF24CC55FAA7BB7EB58760F104518F956972A0DB71EA91DB90
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0069C182
                                                      • GetLastError.KERNEL32 ref: 0069C195
                                                      • SetEvent.KERNEL32(?), ref: 0069C1A9
                                                        • Part of subcall function 0069C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0069C272
                                                        • Part of subcall function 0069C253: GetLastError.KERNEL32 ref: 0069C322
                                                        • Part of subcall function 0069C253: SetEvent.KERNEL32(?), ref: 0069C336
                                                        • Part of subcall function 0069C253: InternetCloseHandle.WININET(00000000), ref: 0069C341
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 337547030-0
                                                      • Opcode ID: 8dc5752a611284ae89136318f8a31fed8b70e5577d88efe378edba8993945019
                                                      • Instruction ID: 1882ae4e3951f478f83fcc782570bdb70e4f0761e626f9b9b1c03e5bec6bcbf6
                                                      • Opcode Fuzzy Hash: 8dc5752a611284ae89136318f8a31fed8b70e5577d88efe378edba8993945019
                                                      • Instruction Fuzzy Hash: 8A319EB1200701AFDF219FA5DC44AA6BBFEFF58320B10452DF95683A10DB30EA55DBA0
                                                      APIs
                                                        • Part of subcall function 00683A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00683A57
                                                        • Part of subcall function 00683A3D: GetCurrentThreadId.KERNEL32 ref: 00683A5E
                                                        • Part of subcall function 00683A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006825B3), ref: 00683A65
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 006825BD
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006825DB
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 006825DF
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 006825E9
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00682601
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00682605
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 0068260F
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00682623
                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00682627
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: b4a53d2f39e481e7b5d220f88ef01bb2711d3715288756d0920cc32bd5970d01
                                                      • Instruction ID: 65b4a40ff35d39a05e8f1b6d11ffdbf260cb7b3c2420aab7df02db3a0e1c1338
                                                      • Opcode Fuzzy Hash: b4a53d2f39e481e7b5d220f88ef01bb2711d3715288756d0920cc32bd5970d01
                                                      • Instruction Fuzzy Hash: 0401D870390210BBFB107768DC8AF593F5ADB4EB21F101106F354AE1D1C9F115849A69
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00681449,?,?,00000000), ref: 0068180C
                                                      • HeapAlloc.KERNEL32(00000000,?,00681449,?,?,00000000), ref: 00681813
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00681449,?,?,00000000), ref: 00681828
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00681449,?,?,00000000), ref: 00681830
                                                      • DuplicateHandle.KERNEL32(00000000,?,00681449,?,?,00000000), ref: 00681833
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00681449,?,?,00000000), ref: 00681843
                                                      • GetCurrentProcess.KERNEL32(00681449,00000000,?,00681449,?,?,00000000), ref: 0068184B
                                                      • DuplicateHandle.KERNEL32(00000000,?,00681449,?,?,00000000), ref: 0068184E
                                                      • CreateThread.KERNEL32(00000000,00000000,00681874,00000000,00000000,00000000), ref: 00681868
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: 9fd4b2ea4fc9bccffe54f1015ff59dc4e070f86d1a9957b40647b31aeebc1f4d
                                                      • Instruction ID: 33b2b1b2ac3fb9dcf73e15b496253a75b88f9c8c8462db8d220e64b5c6565afa
                                                      • Opcode Fuzzy Hash: 9fd4b2ea4fc9bccffe54f1015ff59dc4e070f86d1a9957b40647b31aeebc1f4d
                                                      • Instruction Fuzzy Hash: B801BFF5240304BFE710AFA5DC4DF573BADEB89B11F415511FA05EB191C6709940CB20
                                                      APIs
                                                        • Part of subcall function 0068D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0068D501
                                                        • Part of subcall function 0068D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0068D50F
                                                        • Part of subcall function 0068D4DC: CloseHandle.KERNEL32(00000000), ref: 0068D5DC
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006AA16D
                                                      • GetLastError.KERNEL32 ref: 006AA180
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006AA1B3
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 006AA268
                                                      • GetLastError.KERNEL32(00000000), ref: 006AA273
                                                      • CloseHandle.KERNEL32(00000000), ref: 006AA2C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: cebcce5adf013d2ef36f75b706f64b0f07d41c2d24e2df3b077a9708a1531b71
                                                      • Instruction ID: 293cfac64ba45399571c9598fdbefb928c8fd5a690f25d95a26fa62654800bac
                                                      • Opcode Fuzzy Hash: cebcce5adf013d2ef36f75b706f64b0f07d41c2d24e2df3b077a9708a1531b71
                                                      • Instruction Fuzzy Hash: 3D619F70204642AFD720EF58C494F5ABBE2AF45318F18849DE4564BBA3C772ED45CF92
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 006B3925
                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 006B393A
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 006B3954
                                                      • _wcslen.LIBCMT ref: 006B3999
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 006B39C6
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006B39F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcslen
                                                      • String ID: SysListView32
                                                      • API String ID: 2147712094-78025650
                                                      • Opcode ID: a553baff36878f54c89e4b3f715f341da70a3069a6be798060e12235d6530808
                                                      • Instruction ID: 29b8053ab95bd7eca1b167bb00de4ad35772c163feed2c2961082d096939d422
                                                      • Opcode Fuzzy Hash: a553baff36878f54c89e4b3f715f341da70a3069a6be798060e12235d6530808
                                                      • Instruction Fuzzy Hash: 2B4176B1A00329ABDF219F64CC45FEA77AAEF18354F10052AF554E7391D7719AC0CB94
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0068BCFD
                                                      • IsMenu.USER32(00000000), ref: 0068BD1D
                                                      • CreatePopupMenu.USER32 ref: 0068BD53
                                                      • GetMenuItemCount.USER32(01174D88), ref: 0068BDA4
                                                      • InsertMenuItemW.USER32(01174D88,?,00000001,00000030), ref: 0068BDCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                      • String ID: 0$2
                                                      • API String ID: 93392585-3793063076
                                                      • Opcode ID: 2231f20c611e18469081ed41707b669780f55adeaba16d8a9d0b2253932373c6
                                                      • Instruction ID: 36e5e23ffeb79257f7786f490cc3340375f7141b9d03cdee566eb6ea1ecc7f49
                                                      • Opcode Fuzzy Hash: 2231f20c611e18469081ed41707b669780f55adeaba16d8a9d0b2253932373c6
                                                      • Instruction Fuzzy Hash: EC51AF70A00205EBDF20EFA8D884BEEBBF6AF45324F146319E451A7391D7709945CB61
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 00642D4B
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00642D53
                                                      • _ValidateLocalCookies.LIBCMT ref: 00642DE1
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00642E0C
                                                      • _ValidateLocalCookies.LIBCMT ref: 00642E61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: &Hd$csm
                                                      • API String ID: 1170836740-649931742
                                                      • Opcode ID: e8d72b14586cdb0f17565f6d78bd436951174011bd698f0f258061596362dd9d
                                                      • Instruction ID: 7f85dbf8cb7fd27f3a571c5a200ae7c6e24a0673c01ed567b814828840823840
                                                      • Opcode Fuzzy Hash: e8d72b14586cdb0f17565f6d78bd436951174011bd698f0f258061596362dd9d
                                                      • Instruction Fuzzy Hash: 75419334E0021AEBCF10DF68C895ADEBBB7BF45324F648159F815AB392D7319A05CB90
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 0068C913
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: 321efdec9fa35dbc643e60bced989764466d7483bd12a0338924068834a39260
                                                      • Instruction ID: dfd79723d03bebe9820f64b6f1443d1e981dbada485997f41b1cb4a7505334fc
                                                      • Opcode Fuzzy Hash: 321efdec9fa35dbc643e60bced989764466d7483bd12a0338924068834a39260
                                                      • Instruction Fuzzy Hash: C3113D31689706BAEF007B15DC83DEA279EDF15374B21016FF504A6382EBB45E415379
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$LocalTime
                                                      • String ID:
                                                      • API String ID: 952045576-0
                                                      • Opcode ID: 147ac999e5b2cd9af76a94c883d8e5a675f37ffa010a1c2c9dc7920e74d8986b
                                                      • Instruction ID: bd0482aaee50859a2a6142ef292a4150a905002435d72c3517388f1d31961b6f
                                                      • Opcode Fuzzy Hash: 147ac999e5b2cd9af76a94c883d8e5a675f37ffa010a1c2c9dc7920e74d8986b
                                                      • Instruction Fuzzy Hash: 7C418F65C1021876CB51FBB4C88AACFB7AAAF45710F50856AF518E3121EB34E355C3EA
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0067682C,00000004,00000000,00000000), ref: 0063F953
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0067682C,00000004,00000000,00000000), ref: 0067F3D1
                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0067682C,00000004,00000000,00000000), ref: 0067F454
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 6fc13b268514bdedbe45f75dc51556917d89f929455fb3e228c6e9a00d8feb5d
                                                      • Instruction ID: d27c947d6b36d50e05189c27d0532258d1199c4bee4d553264e5d5d0a90a2703
                                                      • Opcode Fuzzy Hash: 6fc13b268514bdedbe45f75dc51556917d89f929455fb3e228c6e9a00d8feb5d
                                                      • Instruction Fuzzy Hash: ED411C31904640BFC7358B398888BBA7B97AB56334F14953CF04B567E1D672A981C7D1
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 006B2D1B
                                                      • GetDC.USER32(00000000), ref: 006B2D23
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006B2D2E
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 006B2D3A
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 006B2D76
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 006B2D87
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,006B5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 006B2DC2
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006B2DE1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: d8e25d6b3fc6bedba5c4672fa7f9f9f70660727992a057ef4e846e836994b709
                                                      • Instruction ID: 100d7a58c9c8a3858126896d268f046ef17bcce1cb6fc1ca66fc1b1efa5e68be
                                                      • Opcode Fuzzy Hash: d8e25d6b3fc6bedba5c4672fa7f9f9f70660727992a057ef4e846e836994b709
                                                      • Instruction Fuzzy Hash: 7B319FB2201214BFEB214F54CC89FEB3BAEEF49721F044155FE089A291D6759D91C7B4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 1cd1e03b97333d98c2cfd4465f70812949e567d09665d291889eccb336d3ec8d
                                                      • Instruction ID: 5b2fef5481fdc34e9009cd21ed051a6a6624107eff303eb965d38ec97462215c
                                                      • Opcode Fuzzy Hash: 1cd1e03b97333d98c2cfd4465f70812949e567d09665d291889eccb336d3ec8d
                                                      • Instruction Fuzzy Hash: 2A21D7A1650A09B7D7157A208DA2FFB335FAF21384F444124FD069E691FB21EDD183A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                      • API String ID: 0-572801152
                                                      • Opcode ID: b05431c7137101fe8f3746a83514e8cf9e92e5c841ac28339f2626f0f730dcd8
                                                      • Instruction ID: c64567974b9b5b4386f54cf990e040d9fb14772f9f415ddd900ff837ce74445d
                                                      • Opcode Fuzzy Hash: b05431c7137101fe8f3746a83514e8cf9e92e5c841ac28339f2626f0f730dcd8
                                                      • Instruction Fuzzy Hash: 51D19F71A0060AAFDF10EF98C880BEEB7B6BF49354F148469E916AB281E771DD45CF50
                                                      APIs
                                                      • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,006617FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 006615CE
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00661651
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,006617FB,?,006617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006616E4
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006616FB
                                                        • Part of subcall function 00653820: RtlAllocateHeap.NTDLL(00000000,?,006F1444,?,0063FDF5,?,?,0062A976,00000010,006F1440,006213FC,?,006213C6,?,00621129), ref: 00653852
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,006617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00661777
                                                      • __freea.LIBCMT ref: 006617A2
                                                      • __freea.LIBCMT ref: 006617AE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                      • String ID:
                                                      • API String ID: 2829977744-0
                                                      • Opcode ID: d17f4c0f083a9264f061d80c53ed41ab775f1da5c3dfee75b071fadb2143729c
                                                      • Instruction ID: 5b8dc8caf989c60b187ece10e8032dc939dee15d153d84c3135b719d578e5282
                                                      • Opcode Fuzzy Hash: d17f4c0f083a9264f061d80c53ed41ab775f1da5c3dfee75b071fadb2143729c
                                                      • Instruction Fuzzy Hash: 609192B1E002169BDB208E74CC91AEEBBB7AF4A710F1C4659E802EF251D735DD45CBA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2610073882-625585964
                                                      • Opcode ID: 402aac5a0abe4ace00bee4112662a707336eefdf04dcca32f53d3ec1d0944cad
                                                      • Instruction ID: d9978e3cf3f878a06773024d57a89780744a25c590b32e81e331359abc8e34bc
                                                      • Opcode Fuzzy Hash: 402aac5a0abe4ace00bee4112662a707336eefdf04dcca32f53d3ec1d0944cad
                                                      • Instruction Fuzzy Hash: 44917E71A00215ABDF20DFA5DC44FEEBBBAAF86710F108559E505AB281DBB09D41CFA0
                                                      APIs
                                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0069125C
                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00691284
                                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 006912A8
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006912D8
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0069135F
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006913C4
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00691430
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                      • String ID:
                                                      • API String ID: 2550207440-0
                                                      • Opcode ID: 8b7432cc9abc7f094d1957a3acaf90323d44230f454f18109e73b90cb348a798
                                                      • Instruction ID: daa00d380ec3c9824dcedb5c5b7a84abf455ee4bf31f8ef1cd20df004dff2b84
                                                      • Opcode Fuzzy Hash: 8b7432cc9abc7f094d1957a3acaf90323d44230f454f18109e73b90cb348a798
                                                      • Instruction Fuzzy Hash: 3091C275A0021A9FEF00DF94C885BBEB7BAFF46725F244029E500EB691D774AA41CB94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 04da3d7443ecb92a3ec7fd622c140530c94590923df9ae09a2bbbdcf69f3d900
                                                      • Instruction ID: 43a0cbd183ff0d052860c568f25d5a7dd8032df88718e8ec8563468d55e94bbc
                                                      • Opcode Fuzzy Hash: 04da3d7443ecb92a3ec7fd622c140530c94590923df9ae09a2bbbdcf69f3d900
                                                      • Instruction Fuzzy Hash: 25911971D00219AFCB10CFA9CC84AEEBBBAFF49320F148559E515B7251D3759A82CFA0
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 006A396B
                                                      • CharUpperBuffW.USER32(?,?), ref: 006A3A7A
                                                      • _wcslen.LIBCMT ref: 006A3A8A
                                                      • VariantClear.OLEAUT32(?), ref: 006A3C1F
                                                        • Part of subcall function 00690CDF: VariantInit.OLEAUT32(00000000), ref: 00690D1F
                                                        • Part of subcall function 00690CDF: VariantCopy.OLEAUT32(?,?), ref: 00690D28
                                                        • Part of subcall function 00690CDF: VariantClear.OLEAUT32(?), ref: 00690D34
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4137639002-1221869570
                                                      • Opcode ID: c7da023b9cf7ea57c4cf54b9770b69f19d647c0173ceadab2f490bc7cc21a87c
                                                      • Instruction ID: 8addbae79c8ab7a67e8dafc821863ca96099c3309b110c13a6c10fc121f8942e
                                                      • Opcode Fuzzy Hash: c7da023b9cf7ea57c4cf54b9770b69f19d647c0173ceadab2f490bc7cc21a87c
                                                      • Instruction Fuzzy Hash: DA9146746083159FC744EF24C48096AB7E6BF8A314F14892DF88A9B351DB31EE46CF96
                                                      APIs
                                                        • Part of subcall function 0068000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?,?,0068035E), ref: 0068002B
                                                        • Part of subcall function 0068000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?), ref: 00680046
                                                        • Part of subcall function 0068000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?), ref: 00680054
                                                        • Part of subcall function 0068000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?), ref: 00680064
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 006A4C51
                                                      • _wcslen.LIBCMT ref: 006A4D59
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 006A4DCF
                                                      • CoTaskMemFree.OLE32(?), ref: 006A4DDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 614568839-2785691316
                                                      • Opcode ID: ba2ed038532db55da24ff0e8b273acf8d089d78f13910bc90f5fac13cf4a8f83
                                                      • Instruction ID: 2daf734679fdc80f7634a58915f36af8a3143721d8c156d083d0551d37e4410e
                                                      • Opcode Fuzzy Hash: ba2ed038532db55da24ff0e8b273acf8d089d78f13910bc90f5fac13cf4a8f83
                                                      • Instruction Fuzzy Hash: 46913671D0022D9FDF14EFA4DC90AEEBBBABF49310F104569E815A7241DB709E458FA0
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 006B2183
                                                      • GetMenuItemCount.USER32(00000000), ref: 006B21B5
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006B21DD
                                                      • _wcslen.LIBCMT ref: 006B2213
                                                      • GetMenuItemID.USER32(?,?), ref: 006B224D
                                                      • GetSubMenu.USER32(?,?), ref: 006B225B
                                                        • Part of subcall function 00683A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00683A57
                                                        • Part of subcall function 00683A3D: GetCurrentThreadId.KERNEL32 ref: 00683A5E
                                                        • Part of subcall function 00683A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006825B3), ref: 00683A65
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006B22E3
                                                        • Part of subcall function 0068E97B: Sleep.KERNEL32 ref: 0068E9F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                      • String ID:
                                                      • API String ID: 4196846111-0
                                                      • Opcode ID: 9de90bbdabc7b863ddf906a3dcce2513d33c0f5b23851ecb4dd722dec3278232
                                                      • Instruction ID: 502a2638dc2d0f0e466dadae074803a42aa285ac5474babf3e0a63542cb308cb
                                                      • Opcode Fuzzy Hash: 9de90bbdabc7b863ddf906a3dcce2513d33c0f5b23851ecb4dd722dec3278232
                                                      • Instruction Fuzzy Hash: 507163B5A00215AFCB50DF64C855AEEB7F6EF48310F148459E916EB351D734EE818F90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 0068AEF9
                                                      • GetKeyboardState.USER32(?), ref: 0068AF0E
                                                      • SetKeyboardState.USER32(?), ref: 0068AF6F
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 0068AF9D
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0068AFBC
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 0068AFFD
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0068B020
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: a70b1c48ad77b854b62deb95412e5cfc7dfddaa66a4383e0967de69141e5f7fd
                                                      • Instruction ID: 7ee7ab8faab834ccadce4e9ecfa1135b6e0938027048ada35030c00ddca29e96
                                                      • Opcode Fuzzy Hash: a70b1c48ad77b854b62deb95412e5cfc7dfddaa66a4383e0967de69141e5f7fd
                                                      • Instruction Fuzzy Hash: A85102B06043D13DFB3663748C45BFABEAA5B06304F08868AE6E9559C2D3D8ADC4D751
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 0068AD19
                                                      • GetKeyboardState.USER32(?), ref: 0068AD2E
                                                      • SetKeyboardState.USER32(?), ref: 0068AD8F
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0068ADBB
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0068ADD8
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0068AE17
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0068AE38
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 368300eebca37fcea501bbded0b8d7860fdc7aacb9138f83779853e870aaef9f
                                                      • Instruction ID: dcafac1a7f1f4e09d4457ae7462ee2bc5531961b5ab259160ef5c58efdf3a7ec
                                                      • Opcode Fuzzy Hash: 368300eebca37fcea501bbded0b8d7860fdc7aacb9138f83779853e870aaef9f
                                                      • Instruction Fuzzy Hash: 295139B05047D13DFB3363B48C55BBABEAA5F05300F088A8AE5D5869C2D394ED84E752
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(00663CD6,?,?,?,?,?,?,?,?,00655BA3,?,?,00663CD6,?,?), ref: 00655470
                                                      • __fassign.LIBCMT ref: 006554EB
                                                      • __fassign.LIBCMT ref: 00655506
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00663CD6,00000005,00000000,00000000), ref: 0065552C
                                                      • WriteFile.KERNEL32(?,00663CD6,00000000,00655BA3,00000000,?,?,?,?,?,?,?,?,?,00655BA3,?), ref: 0065554B
                                                      • WriteFile.KERNEL32(?,?,00000001,00655BA3,00000000,?,?,?,?,?,?,?,?,?,00655BA3,?), ref: 00655584
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: 01371608eb5a3f125ff935a5289b5be4885c0304a5721c9d318490e2971a6312
                                                      • Instruction ID: a0ef37450d78354c954799059d7beacb9da60a350e71808b5b3d6470e433d857
                                                      • Opcode Fuzzy Hash: 01371608eb5a3f125ff935a5289b5be4885c0304a5721c9d318490e2971a6312
                                                      • Instruction Fuzzy Hash: BE51F7B09006499FDB10CFA8D855AEEBBFAEF08311F14415AF956E7391E730DA45CB60
                                                      APIs
                                                        • Part of subcall function 006A304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 006A307A
                                                        • Part of subcall function 006A304E: _wcslen.LIBCMT ref: 006A309B
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 006A1112
                                                      • WSAGetLastError.WSOCK32 ref: 006A1121
                                                      • WSAGetLastError.WSOCK32 ref: 006A11C9
                                                      • closesocket.WSOCK32(00000000), ref: 006A11F9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 2675159561-0
                                                      • Opcode ID: e9b3c31b8a46365ccf6ae76ad643d12230ecac65d00a6b5deb5e90255e9cfebf
                                                      • Instruction ID: 73cfda2a6befa1009258836fbc6bf8ff1b5a6a1272cb2eb16c9001f21628a3be
                                                      • Opcode Fuzzy Hash: e9b3c31b8a46365ccf6ae76ad643d12230ecac65d00a6b5deb5e90255e9cfebf
                                                      • Instruction Fuzzy Hash: 7C41D271600614AFDB10AF14D884BA9BBABEF46364F148169F9159F391C770AE81CFE1
                                                      APIs
                                                        • Part of subcall function 0068DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0068CF22,?), ref: 0068DDFD
                                                        • Part of subcall function 0068DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0068CF22,?), ref: 0068DE16
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0068CF45
                                                      • MoveFileW.KERNEL32(?,?), ref: 0068CF7F
                                                      • _wcslen.LIBCMT ref: 0068D005
                                                      • _wcslen.LIBCMT ref: 0068D01B
                                                      • SHFileOperationW.SHELL32(?), ref: 0068D061
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 3164238972-1173974218
                                                      • Opcode ID: bc6cc00fc2d517511ac5f0c9976d9e5fa8648e32c2226623cecd40d394baaa57
                                                      • Instruction ID: bcb838b85ff60b8e48bef6259e0b8a1084a6ba1a6c2ae05d389bf1a2299b4b20
                                                      • Opcode Fuzzy Hash: bc6cc00fc2d517511ac5f0c9976d9e5fa8648e32c2226623cecd40d394baaa57
                                                      • Instruction Fuzzy Hash: 9D4164719452185FDF52FFA4D981ADEB7BAAF48380F0001EAE605EB141EB34A784CF64
                                                      APIs
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006B2E1C
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 006B2E4F
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 006B2E84
                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 006B2EB6
                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006B2EE0
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 006B2EF1
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006B2F0B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID:
                                                      • API String ID: 2178440468-0
                                                      • Opcode ID: fea0b7b4a3a70b287582c5f617ddcfb48cda86b0def3059ef972741a10bf0418
                                                      • Instruction ID: 4114ed7e3ef78130fb7eba1e2ef09fef50f3004f1fd1b98cbd0de4fdf8b7c6ee
                                                      • Opcode Fuzzy Hash: fea0b7b4a3a70b287582c5f617ddcfb48cda86b0def3059ef972741a10bf0418
                                                      • Instruction Fuzzy Hash: 433114B06441529FDB218F19DC94FE537E6EB5A760F141164FA008F2B2CBB1E881DB51
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00687769
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0068778F
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00687792
                                                      • SysAllocString.OLEAUT32(?), ref: 006877B0
                                                      • SysFreeString.OLEAUT32(?), ref: 006877B9
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 006877DE
                                                      • SysAllocString.OLEAUT32(?), ref: 006877EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 5654d9a0a4294aa89c44afd5ef8a6ed2812e68a37463c0571f7304ffb8e1bab7
                                                      • Instruction ID: fc30e439239a2464c7d61c20b89d74fdf6fe317507baae04b566d829ed5abd23
                                                      • Opcode Fuzzy Hash: 5654d9a0a4294aa89c44afd5ef8a6ed2812e68a37463c0571f7304ffb8e1bab7
                                                      • Instruction Fuzzy Hash: 4C219076608219AFDB10EFA8CC88CFB77EEEB09764B148225FA15DB250D670DD81C764
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00687842
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00687868
                                                      • SysAllocString.OLEAUT32(00000000), ref: 0068786B
                                                      • SysAllocString.OLEAUT32 ref: 0068788C
                                                      • SysFreeString.OLEAUT32 ref: 00687895
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 006878AF
                                                      • SysAllocString.OLEAUT32(?), ref: 006878BD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 97ec089123502b9a65c1ed93b54b6707c187a115464f6b75dc0544f24f613330
                                                      • Instruction ID: 8bb10a9f89f9fa0e42969ab9b9b21feba7344eaa9bb0871f431764d4c62b9bac
                                                      • Opcode Fuzzy Hash: 97ec089123502b9a65c1ed93b54b6707c187a115464f6b75dc0544f24f613330
                                                      • Instruction Fuzzy Hash: EB2177B1608104BFDB10AFA8DC88DAA77EDEB09760B108235F915CB2A1DA70DD41CB74
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 006904F2
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0069052E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: eeb7178132de1129ac0250b843658e7aeb6b77c59b0e427b054d54f2b41eed3f
                                                      • Instruction ID: 783dfc868abbf6dd5e992bb5d880a1cdfca56b43d34d9cf5672f53ac8945a307
                                                      • Opcode Fuzzy Hash: eeb7178132de1129ac0250b843658e7aeb6b77c59b0e427b054d54f2b41eed3f
                                                      • Instruction Fuzzy Hash: 7B2160B5500305AFEF209F29DD44A9A77BEAF44764F614A29F8A1D62E0D7709A40CF20
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 006905C6
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00690601
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: e863f46c3e5c61047257348f49547139db2f9459a2be4dad0dfe9033774b3c1a
                                                      • Instruction ID: 12e5c7a0050fda53a57275d55559e0a1d0fe52de9f8caca05b96bc4ffa81ea02
                                                      • Opcode Fuzzy Hash: e863f46c3e5c61047257348f49547139db2f9459a2be4dad0dfe9033774b3c1a
                                                      • Instruction Fuzzy Hash: 85214F75500305AFEF209F699C04A9A77EEAF95734F200B19F8A1E76E0D77099A1CB20
                                                      APIs
                                                        • Part of subcall function 0062600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0062604C
                                                        • Part of subcall function 0062600E: GetStockObject.GDI32(00000011), ref: 00626060
                                                        • Part of subcall function 0062600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0062606A
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 006B4112
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 006B411F
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 006B412A
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 006B4139
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 006B4145
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 3d648b508addfcdfe34b7799dc4f7e0c432dbb1c5ee39e28c412844a3fbb8816
                                                      • Instruction ID: 377478514f269739b9eb07f2877e82751314f431a22a678255ebd8f6ddcc4430
                                                      • Opcode Fuzzy Hash: 3d648b508addfcdfe34b7799dc4f7e0c432dbb1c5ee39e28c412844a3fbb8816
                                                      • Instruction Fuzzy Hash: 9111B2B2150219BEEF119F64CC85EE77F6EEF09798F014111FB18A6150CA729C61DBA4
                                                      APIs
                                                        • Part of subcall function 0065D7A3: _free.LIBCMT ref: 0065D7CC
                                                      • _free.LIBCMT ref: 0065D82D
                                                        • Part of subcall function 006529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000), ref: 006529DE
                                                        • Part of subcall function 006529C8: GetLastError.KERNEL32(00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000,00000000), ref: 006529F0
                                                      • _free.LIBCMT ref: 0065D838
                                                      • _free.LIBCMT ref: 0065D843
                                                      • _free.LIBCMT ref: 0065D897
                                                      • _free.LIBCMT ref: 0065D8A2
                                                      • _free.LIBCMT ref: 0065D8AD
                                                      • _free.LIBCMT ref: 0065D8B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                      • Instruction ID: 4f8fe6365d85b8d677c001142bf7fc6b4c79dbc1513d7524bf6ec19d6906d574
                                                      • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                      • Instruction Fuzzy Hash: D3118171540B04AAD5B1BFB0CC07FCB7BDEAF09702F40082DBA99A69D2DA24F5094654
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0068DA74
                                                      • LoadStringW.USER32(00000000), ref: 0068DA7B
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0068DA91
                                                      • LoadStringW.USER32(00000000), ref: 0068DA98
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0068DADC
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 0068DAB9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 4072794657-3128320259
                                                      • Opcode ID: 869987dce6c5babf1e1d435e0852cebd762c4782c0019505e572ff6d9c4f539f
                                                      • Instruction ID: abc88868f2ade28a26d2fcdb6ec0f9cd60bc70786f7d5ec0b177e84615337bfc
                                                      • Opcode Fuzzy Hash: 869987dce6c5babf1e1d435e0852cebd762c4782c0019505e572ff6d9c4f539f
                                                      • Instruction Fuzzy Hash: B00162F29002087FE711ABA4DD89EE7376DE708311F405695B706E2181EA749EC44F74
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(0116EE30,0116EE30), ref: 0069097B
                                                      • EnterCriticalSection.KERNEL32(0116EE10,00000000), ref: 0069098D
                                                      • TerminateThread.KERNEL32(006F0074,000001F6), ref: 0069099B
                                                      • WaitForSingleObject.KERNEL32(006F0074,000003E8), ref: 006909A9
                                                      • CloseHandle.KERNEL32(006F0074), ref: 006909B8
                                                      • InterlockedExchange.KERNEL32(0116EE30,000001F6), ref: 006909C8
                                                      • LeaveCriticalSection.KERNEL32(0116EE10), ref: 006909CF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: e3950c57cb07d9898952e2b0943fd8b73ae4a071d79d884cd1696283564d64aa
                                                      • Instruction ID: 7332cb4ced4b9a5c9ffbd0542af54a710cb1c12d2e9b4336491043656f840671
                                                      • Opcode Fuzzy Hash: e3950c57cb07d9898952e2b0943fd8b73ae4a071d79d884cd1696283564d64aa
                                                      • Instruction Fuzzy Hash: F0F03171442912BFEB455F94EE8CBD67B3AFF01712F403126F101508A0C7749AA5DF90
                                                      APIs
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 006A1DC0
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 006A1DE1
                                                      • WSAGetLastError.WSOCK32 ref: 006A1DF2
                                                      • htons.WSOCK32(?,?,?,?,?), ref: 006A1EDB
                                                      • inet_ntoa.WSOCK32(?), ref: 006A1E8C
                                                        • Part of subcall function 006839E8: _strlen.LIBCMT ref: 006839F2
                                                        • Part of subcall function 006A3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0069EC0C), ref: 006A3240
                                                      • _strlen.LIBCMT ref: 006A1F35
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                      • String ID:
                                                      • API String ID: 3203458085-0
                                                      • Opcode ID: c765262568e6e2d6482dfa4b9e65d54672a4118f1b00ba5a7cda1206de93ed55
                                                      • Instruction ID: fa541ea23058d960295cb50ba9a9b03f03ad47a17a3871fa28856bdd63c69d86
                                                      • Opcode Fuzzy Hash: c765262568e6e2d6482dfa4b9e65d54672a4118f1b00ba5a7cda1206de93ed55
                                                      • Instruction Fuzzy Hash: 07B1BB70604350AFC324EF24C895E6A7BE6AF86318F54894CF4565F2A2CB31EE46CF91
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 00625D30
                                                      • GetWindowRect.USER32(?,?), ref: 00625D71
                                                      • ScreenToClient.USER32(?,?), ref: 00625D99
                                                      • GetClientRect.USER32(?,?), ref: 00625ED7
                                                      • GetWindowRect.USER32(?,?), ref: 00625EF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: 8dfc053c9c0908d9bec108b2d7b2c3cd49365838d2b8eab5637cec6e967915c6
                                                      • Instruction ID: 843f1a19d1e9a450b6938d8841d0216658e8ac0477f601261571a4dc77f8cfc9
                                                      • Opcode Fuzzy Hash: 8dfc053c9c0908d9bec108b2d7b2c3cd49365838d2b8eab5637cec6e967915c6
                                                      • Instruction Fuzzy Hash: 64B16A74A00A5ADBDB20CFA8C4407EAB7F2FF44310F14951AE8AAD7250DB30EA51DF54
                                                      APIs
                                                      • __allrem.LIBCMT ref: 006500BA
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006500D6
                                                      • __allrem.LIBCMT ref: 006500ED
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0065010B
                                                      • __allrem.LIBCMT ref: 00650122
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00650140
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                      • Instruction ID: 7374642c37296c2509792faec01fefee145cbf9689cfcbb805adc817efd851cb
                                                      • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                      • Instruction Fuzzy Hash: AD81F572A00B069BE7609F68CC41BAB73EBAF45325F24413EF951DA7C1E770D9088B95
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,006482D9,006482D9,?,?,?,0065644F,00000001,00000001,8BE85006), ref: 00656258
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0065644F,00000001,00000001,8BE85006,?,?,?), ref: 006562DE
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 006563D8
                                                      • __freea.LIBCMT ref: 006563E5
                                                        • Part of subcall function 00653820: RtlAllocateHeap.NTDLL(00000000,?,006F1444,?,0063FDF5,?,?,0062A976,00000010,006F1440,006213FC,?,006213C6,?,00621129), ref: 00653852
                                                      • __freea.LIBCMT ref: 006563EE
                                                      • __freea.LIBCMT ref: 00656413
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: 2ad7e53b077331cc1b7805716c4a74a91cfb1945ce40aecb55d7ac999d909590
                                                      • Instruction ID: 259fb7d36296292c1eee8aeddb8ae508d03ad5c8f6728d218c45058e6b95df42
                                                      • Opcode Fuzzy Hash: 2ad7e53b077331cc1b7805716c4a74a91cfb1945ce40aecb55d7ac999d909590
                                                      • Instruction Fuzzy Hash: 6851C172A00216ABEB258F64CC81EEF77ABEF44752F554629FC05D7240EB34DD89C6A0
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 006AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006AB6AE,?,?), ref: 006AC9B5
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006AC9F1
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006ACA68
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006ACA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006ABCCA
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006ABD25
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 006ABD6A
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 006ABD99
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 006ABDF3
                                                      • RegCloseKey.ADVAPI32(?), ref: 006ABDFF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                      • String ID:
                                                      • API String ID: 1120388591-0
                                                      • Opcode ID: 2e01098007bec07a90e7f7a4a93f61f97f7d0280a1131628f5721320f9b9966b
                                                      • Instruction ID: 5d6086b6cad55d808e5b009ebaf6a02bf3a4325f7c46418486c37cc09806ac8a
                                                      • Opcode Fuzzy Hash: 2e01098007bec07a90e7f7a4a93f61f97f7d0280a1131628f5721320f9b9966b
                                                      • Instruction Fuzzy Hash: ED819E70208241AFD714EF24C885E6ABBE6FF85318F14995CF4564B2A2DB32ED45CF92
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000035), ref: 0067F7B9
                                                      • SysAllocString.OLEAUT32(00000001), ref: 0067F860
                                                      • VariantCopy.OLEAUT32(0067FA64,00000000), ref: 0067F889
                                                      • VariantClear.OLEAUT32(0067FA64), ref: 0067F8AD
                                                      • VariantCopy.OLEAUT32(0067FA64,00000000), ref: 0067F8B1
                                                      • VariantClear.OLEAUT32(?), ref: 0067F8BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                      • String ID:
                                                      • API String ID: 3859894641-0
                                                      • Opcode ID: 5687608c316d1e3ad1882dd5c2948ca71052b19e81bb33ac5dcc067562f377b5
                                                      • Instruction ID: b1b416840af1103b7045e0c1d46598c8ab18708cfd5e56f42b456dd6267823d3
                                                      • Opcode Fuzzy Hash: 5687608c316d1e3ad1882dd5c2948ca71052b19e81bb33ac5dcc067562f377b5
                                                      • Instruction Fuzzy Hash: 0051C631910310BACF54AB65D895F69B3EBEF45310F24D46AF909EF291DB708C41CBAA
                                                      APIs
                                                        • Part of subcall function 00627620: _wcslen.LIBCMT ref: 00627625
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 006994E5
                                                      • _wcslen.LIBCMT ref: 00699506
                                                      • _wcslen.LIBCMT ref: 0069952D
                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00699585
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$FileName$OpenSave
                                                      • String ID: X
                                                      • API String ID: 83654149-3081909835
                                                      • Opcode ID: 9ca9796611bbf222cbf27cc40caacea1edeca1d047852a7033f458ce78cfc75a
                                                      • Instruction ID: e0251e08f2add22cc1f006f6529f52bb8c72192ed8826021f9f1a9ecded78810
                                                      • Opcode Fuzzy Hash: 9ca9796611bbf222cbf27cc40caacea1edeca1d047852a7033f458ce78cfc75a
                                                      • Instruction Fuzzy Hash: 11E1B1315047519FCB64DF28D881A6AB7E6FF84310F04896DF8899B3A2DB31DD05CBA6
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      • BeginPaint.USER32(?,?,?), ref: 00639241
                                                      • GetWindowRect.USER32(?,?), ref: 006392A5
                                                      • ScreenToClient.USER32(?,?), ref: 006392C2
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 006392D3
                                                      • EndPaint.USER32(?,?,?,?,?), ref: 00639321
                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 006771EA
                                                        • Part of subcall function 00639339: BeginPath.GDI32(00000000), ref: 00639357
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                      • String ID:
                                                      • API String ID: 3050599898-0
                                                      • Opcode ID: 42c4a7febe236f6e8204ae9fed57668ac3706a9c8ec6173c53d4701f73b58679
                                                      • Instruction ID: c9ae1fbc0574bef5a5bc5697ec82b396979cb0c64da70b65eb31d972fd3b9529
                                                      • Opcode Fuzzy Hash: 42c4a7febe236f6e8204ae9fed57668ac3706a9c8ec6173c53d4701f73b58679
                                                      • Instruction Fuzzy Hash: 23419D70104200EFE721DF24CC84FBA7BAAEB56364F140269F9A59B2A1C7B19945DFB1
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0069080C
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00690847
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00690863
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 006908DC
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 006908F3
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00690921
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                      • String ID:
                                                      • API String ID: 3368777196-0
                                                      • Opcode ID: b395ff70e5ec127393f5cf5fd048e35f8b31ea756d8be0b6bf90f1a8a95f0576
                                                      • Instruction ID: d377ae156d2df89fdd37491f768db03d6ae8a720336699bc846898f08e8818b7
                                                      • Opcode Fuzzy Hash: b395ff70e5ec127393f5cf5fd048e35f8b31ea756d8be0b6bf90f1a8a95f0576
                                                      • Instruction Fuzzy Hash: 74415C71A00205EFEF149F54DC85AAA777AFF04310F1440A9ED04AE297DB70DE65DBA4
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0067F3AB,00000000,?,?,00000000,?,0067682C,00000004,00000000,00000000), ref: 006B824C
                                                      • EnableWindow.USER32(00000000,00000000), ref: 006B8272
                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 006B82D1
                                                      • ShowWindow.USER32(00000000,00000004), ref: 006B82E5
                                                      • EnableWindow.USER32(00000000,00000001), ref: 006B830B
                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 006B832F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: f9891de3f0cf76a3fe51f2d3c7eb639c29957d76df24b566b16cb15021235679
                                                      • Instruction ID: e6690d798a141f843419ff06b70cf063fe94f4846e13cefa0ee47565eaf0fce4
                                                      • Opcode Fuzzy Hash: f9891de3f0cf76a3fe51f2d3c7eb639c29957d76df24b566b16cb15021235679
                                                      • Instruction Fuzzy Hash: A44194B4601644EFDB11CF55C899BE47BE7BB0A714F1852A9E5084F362CB71AD81CB90
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00684C95
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00684CB2
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00684CEA
                                                      • _wcslen.LIBCMT ref: 00684D08
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00684D10
                                                      • _wcsstr.LIBVCRUNTIME ref: 00684D1A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                      • String ID:
                                                      • API String ID: 72514467-0
                                                      • Opcode ID: 007305056282167c1b650d48b858618dc97adf2c28aafb38cef9b51373f9b556
                                                      • Instruction ID: f9ed10beabe3a5d9a30470bd269dc147c60057facadf7a70bc305b620d80b47f
                                                      • Opcode Fuzzy Hash: 007305056282167c1b650d48b858618dc97adf2c28aafb38cef9b51373f9b556
                                                      • Instruction Fuzzy Hash: DB215E72604201BBEB256B35DC09E7F7B9EDF45760F10413DF805CA292EE61DD4193A0
                                                      APIs
                                                        • Part of subcall function 00623AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00623A97,?,?,00622E7F,?,?,?,00000000), ref: 00623AC2
                                                      • _wcslen.LIBCMT ref: 0069587B
                                                      • CoInitialize.OLE32(00000000), ref: 00695995
                                                      • CoCreateInstance.OLE32(006BFCF8,00000000,00000001,006BFB68,?), ref: 006959AE
                                                      • CoUninitialize.OLE32 ref: 006959CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 3172280962-24824748
                                                      • Opcode ID: a36fb85a42a3ec2e8dcda2196d2735ca1a05dc7380bc1ae7baf0aeee00f352a9
                                                      • Instruction ID: 3ca3d01153630493a572742164945795a0e7be051f35f0a1d44798253dd0b8b7
                                                      • Opcode Fuzzy Hash: a36fb85a42a3ec2e8dcda2196d2735ca1a05dc7380bc1ae7baf0aeee00f352a9
                                                      • Instruction Fuzzy Hash: F0D174716087119FCB04DF24C490A6ABBEAFF89310F14885DF88A9B361DB31ED45CB92
                                                      APIs
                                                        • Part of subcall function 00680FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00680FCA
                                                        • Part of subcall function 00680FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00680FD6
                                                        • Part of subcall function 00680FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00680FE5
                                                        • Part of subcall function 00680FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00680FEC
                                                        • Part of subcall function 00680FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00681002
                                                      • GetLengthSid.ADVAPI32(?,00000000,00681335), ref: 006817AE
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006817BA
                                                      • HeapAlloc.KERNEL32(00000000), ref: 006817C1
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 006817DA
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00681335), ref: 006817EE
                                                      • HeapFree.KERNEL32(00000000), ref: 006817F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: 1f3015f5f662afaadfe65fe64cc4161918b6f7c6de1e4ee8bfb5c318e0d48e9f
                                                      • Instruction ID: 5179bba54bb05730092491a683726e17f538b024eb81a42cbedaeb47870ce7c8
                                                      • Opcode Fuzzy Hash: 1f3015f5f662afaadfe65fe64cc4161918b6f7c6de1e4ee8bfb5c318e0d48e9f
                                                      • Instruction Fuzzy Hash: 1A11AFB1500205EFDB10AFA4DC49BEE7BAEEB42365F10421DF441AB210C736AA45DB60
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006814FF
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00681506
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00681515
                                                      • CloseHandle.KERNEL32(00000004), ref: 00681520
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0068154F
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00681563
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: 3304528f2043610ed439af1ba192079ea3c3f97db68cc16be6859cc3244225d8
                                                      • Instruction ID: 109d62667744a2810cd3524ef2f2ebe747f14424bd24f6a4470c22c1b404dc5e
                                                      • Opcode Fuzzy Hash: 3304528f2043610ed439af1ba192079ea3c3f97db68cc16be6859cc3244225d8
                                                      • Instruction Fuzzy Hash: 641159B250420DABDF11DF98DD49FDE7BAEEF49714F044224FA05A6160C3728EA1DB61
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00643379,00642FE5), ref: 00643390
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0064339E
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006433B7
                                                      • SetLastError.KERNEL32(00000000,?,00643379,00642FE5), ref: 00643409
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 4426e15552625f96a796817050490224252708e5926e7cb6197fca14ae005047
                                                      • Instruction ID: 6d6609b05345973c57ed73a05b3ab88f3ccf9f0f7e0d60c18fd761a064739464
                                                      • Opcode Fuzzy Hash: 4426e15552625f96a796817050490224252708e5926e7cb6197fca14ae005047
                                                      • Instruction Fuzzy Hash: 9601D833609372BEE7693B747CD55962A97EB15779720022DF420893F1EF124E025548
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00655686,00663CD6,?,00000000,?,00655B6A,?,?,?,?,?,0064E6D1,?,006E8A48), ref: 00652D78
                                                      • _free.LIBCMT ref: 00652DAB
                                                      • _free.LIBCMT ref: 00652DD3
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0064E6D1,?,006E8A48,00000010,00624F4A,?,?,00000000,00663CD6), ref: 00652DE0
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0064E6D1,?,006E8A48,00000010,00624F4A,?,?,00000000,00663CD6), ref: 00652DEC
                                                      • _abort.LIBCMT ref: 00652DF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: e339d3fa915a41ac9e27c4a7177987818bb9acf9903a2ee4fbd03a18ba50756f
                                                      • Instruction ID: 471c1f9dbbb23fbfc06aa998db133e09ef4be9585ea25b148438512962654a1f
                                                      • Opcode Fuzzy Hash: e339d3fa915a41ac9e27c4a7177987818bb9acf9903a2ee4fbd03a18ba50756f
                                                      • Instruction Fuzzy Hash: F4F0CD32504A0367C3522739BC36E9A26776FC3BB7F25461DFC24923D2DF24894E5164
                                                      APIs
                                                        • Part of subcall function 00639639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00639693
                                                        • Part of subcall function 00639639: SelectObject.GDI32(?,00000000), ref: 006396A2
                                                        • Part of subcall function 00639639: BeginPath.GDI32(?), ref: 006396B9
                                                        • Part of subcall function 00639639: SelectObject.GDI32(?,00000000), ref: 006396E2
                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 006B8A4E
                                                      • LineTo.GDI32(?,00000003,00000000), ref: 006B8A62
                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 006B8A70
                                                      • LineTo.GDI32(?,00000000,00000003), ref: 006B8A80
                                                      • EndPath.GDI32(?), ref: 006B8A90
                                                      • StrokePath.GDI32(?), ref: 006B8AA0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: d83b84c8b0a596c453285cfae2047c8402f18924d1313764d29eac13c18b56d3
                                                      • Instruction ID: f56e7dd7fb3d8fdc2be8277129d5f12ea3096a0af4d0e5a2683e9912ab34cab3
                                                      • Opcode Fuzzy Hash: d83b84c8b0a596c453285cfae2047c8402f18924d1313764d29eac13c18b56d3
                                                      • Instruction Fuzzy Hash: BB110CB640010DFFDB119F94DC88EEA7F6EEB05364F008111BA159A161C7729E95DFA0
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00685218
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00685229
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00685230
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00685238
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0068524F
                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00685261
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: 906e971428bef058fd6344cad761613cb3063326b5a7c69e5af2ce19f98ed3ea
                                                      • Instruction ID: f13976cb3438a7c7b98d1a4edf97b59818d850f4f1dd98e69066fc7ea3d261e4
                                                      • Opcode Fuzzy Hash: 906e971428bef058fd6344cad761613cb3063326b5a7c69e5af2ce19f98ed3ea
                                                      • Instruction Fuzzy Hash: 7D0167B5E40714BBEB106BA99C49E5EBFB9EF44761F044165FA05A7381DA709D00CF60
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00621BF4
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00621BFC
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00621C07
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00621C12
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00621C1A
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00621C22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: be78df79b1ef45534b7134d5c017e00fb178260bd3c43fbb9a9a454d37c0344e
                                                      • Instruction ID: da4beffc1085a4ebc9c16fb4e2c81a7860bc58264482c0b0d7afbaa5a3614d24
                                                      • Opcode Fuzzy Hash: be78df79b1ef45534b7134d5c017e00fb178260bd3c43fbb9a9a454d37c0344e
                                                      • Instruction Fuzzy Hash: D1016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47942C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0068EB30
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0068EB46
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0068EB55
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0068EB64
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0068EB6E
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0068EB75
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: 443b850b306ca9b6fd2920e33d6e1f1575a17fc59651f7e49bb13e0ce8bfbbed
                                                      • Instruction ID: 315b093e87f6b72202a8121ab6d725b39bcc5e14ed3eccbf1bd52cec4f957d4f
                                                      • Opcode Fuzzy Hash: 443b850b306ca9b6fd2920e33d6e1f1575a17fc59651f7e49bb13e0ce8bfbbed
                                                      • Instruction Fuzzy Hash: F8F054B2140558BBE7215B529C0DEEF3F7DEFCAB21F001269F601E1191E7A05B41C6B5
                                                      APIs
                                                      • GetClientRect.USER32(?), ref: 00677452
                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00677469
                                                      • GetWindowDC.USER32(?), ref: 00677475
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00677484
                                                      • ReleaseDC.USER32(?,00000000), ref: 00677496
                                                      • GetSysColor.USER32(00000005), ref: 006774B0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                      • String ID:
                                                      • API String ID: 272304278-0
                                                      • Opcode ID: ae05fc87cab5bff7343cdca0e4f89f4de82ee8c1d831073dc29ad7a2d46e2a1e
                                                      • Instruction ID: d3f8acd75b71e489162cae2684adda86b2107886f87f4c0e26570c1a5db42f0a
                                                      • Opcode Fuzzy Hash: ae05fc87cab5bff7343cdca0e4f89f4de82ee8c1d831073dc29ad7a2d46e2a1e
                                                      • Instruction Fuzzy Hash: 9A012872400215EFDB615F64DC08BEA7BB7FB04321F515264F919A21A1CB312E91AB60
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0068187F
                                                      • UnloadUserProfile.USERENV(?,?), ref: 0068188B
                                                      • CloseHandle.KERNEL32(?), ref: 00681894
                                                      • CloseHandle.KERNEL32(?), ref: 0068189C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 006818A5
                                                      • HeapFree.KERNEL32(00000000), ref: 006818AC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: 5cf39b7ae3da678dc1479aeccb161d577d1fa8dd535268cafdaaea13f7336029
                                                      • Instruction ID: 0e21bf221fe5d085e62844eced536492a8b0f9a12eaf74552afa42cf961dfa91
                                                      • Opcode Fuzzy Hash: 5cf39b7ae3da678dc1479aeccb161d577d1fa8dd535268cafdaaea13f7336029
                                                      • Instruction Fuzzy Hash: 41E0E5B6004901BBDB015FA5ED0C90ABF7AFF49B32B509331F22591070CB3295A0EF60
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0062BEB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: D%o$D%o$D%o$D%oD%o
                                                      • API String ID: 1385522511-4062757370
                                                      • Opcode ID: d97d88f334de40fb9d506252ae77693d21b998bb6d3e0230b94d0778fab6ae88
                                                      • Instruction ID: 2668b6b59f7e001e0e183abc8fd3469aaaead89fdd85b488c5b3a73cd4ac08b0
                                                      • Opcode Fuzzy Hash: d97d88f334de40fb9d506252ae77693d21b998bb6d3e0230b94d0778fab6ae88
                                                      • Instruction Fuzzy Hash: A6914B75A00A2ACFCB18CF58E0A06F9B7F2FF58314B249569D985AB351D731AD81CF90
                                                      APIs
                                                        • Part of subcall function 00640242: EnterCriticalSection.KERNEL32(006F070C,006F1884,?,?,0063198B,006F2518,?,?,?,006212F9,00000000), ref: 0064024D
                                                        • Part of subcall function 00640242: LeaveCriticalSection.KERNEL32(006F070C,?,0063198B,006F2518,?,?,?,006212F9,00000000), ref: 0064028A
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 006400A3: __onexit.LIBCMT ref: 006400A9
                                                      • __Init_thread_footer.LIBCMT ref: 006A7BFB
                                                        • Part of subcall function 006401F8: EnterCriticalSection.KERNEL32(006F070C,?,?,00638747,006F2514), ref: 00640202
                                                        • Part of subcall function 006401F8: LeaveCriticalSection.KERNEL32(006F070C,?,00638747,006F2514), ref: 00640235
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                      • String ID: +Tg$5$G$Variable must be of type 'Object'.
                                                      • API String ID: 535116098-1659199945
                                                      • Opcode ID: 7c769728b594792f8ce922d1f13887e738f9a5ae4bf0aa082da52019d55d8e6b
                                                      • Instruction ID: 720ab6a1e29c7583408d72e5de78a10bcb0517a28d7a6042f22a4a0103f056cd
                                                      • Opcode Fuzzy Hash: 7c769728b594792f8ce922d1f13887e738f9a5ae4bf0aa082da52019d55d8e6b
                                                      • Instruction Fuzzy Hash: 79915670A04209AFCB14FF94D8919ADBBB3AF4A310F14805DF806AB392DB71AE45CF55
                                                      APIs
                                                        • Part of subcall function 00627620: _wcslen.LIBCMT ref: 00627625
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0068C6EE
                                                      • _wcslen.LIBCMT ref: 0068C735
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0068C79C
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0068C7CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                      • String ID: 0
                                                      • API String ID: 1227352736-4108050209
                                                      • Opcode ID: 56f01f0a2b2306b15b273c6b0b38b6613bda88dfc1a3898049ba6998fc718f60
                                                      • Instruction ID: 37c73d0ecba89b0bbcc7cea2d31d5fdd027fbc07406a94ea146f86f1841142d2
                                                      • Opcode Fuzzy Hash: 56f01f0a2b2306b15b273c6b0b38b6613bda88dfc1a3898049ba6998fc718f60
                                                      • Instruction Fuzzy Hash: 2D51D1716143019BD754AF28C885BAB77E6AF49330F040B2DFA95D3290DB70D944CBA6
                                                      APIs
                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 006AAEA3
                                                        • Part of subcall function 00627620: _wcslen.LIBCMT ref: 00627625
                                                      • GetProcessId.KERNEL32(00000000), ref: 006AAF38
                                                      • CloseHandle.KERNEL32(00000000), ref: 006AAF67
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                      • String ID: <$@
                                                      • API String ID: 146682121-1426351568
                                                      • Opcode ID: 8bacc739223c8297f31d759dccfdab01d592103a297ac07c23811be61535e9d4
                                                      • Instruction ID: 6fec45cd7e21c499a2ed7bd18038abb3fb79b92021e67cd0b8fa7865f905dcae
                                                      • Opcode Fuzzy Hash: 8bacc739223c8297f31d759dccfdab01d592103a297ac07c23811be61535e9d4
                                                      • Instruction Fuzzy Hash: AD713571A006259FCB14EF94D484A9EBBF2BF09310F04849EE856AB362CB74ED45CF95
                                                      APIs
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00687206
                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0068723C
                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0068724D
                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006872CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: DllGetClassObject
                                                      • API String ID: 753597075-1075368562
                                                      • Opcode ID: 88c3eab7a2a4c5c239fa4eaff5efddd4287b6b894750f67107a12868d51cbd13
                                                      • Instruction ID: 817d43e5ecbbcd3acfafc283c8d4362c3bab0c79675fcc957401df326802eee5
                                                      • Opcode Fuzzy Hash: 88c3eab7a2a4c5c239fa4eaff5efddd4287b6b894750f67107a12868d51cbd13
                                                      • Instruction Fuzzy Hash: 314162B1604204DFDB15DF54C894A9A7FAAEF84310F2482ADFD059F21AD7B1DA45CBA0
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006B3E35
                                                      • IsMenu.USER32(?), ref: 006B3E4A
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006B3E92
                                                      • DrawMenuBar.USER32 ref: 006B3EA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert
                                                      • String ID: 0
                                                      • API String ID: 3076010158-4108050209
                                                      • Opcode ID: 32bff02a80f958dfdec465a2d891d2fadd99d2ca3df60b8da42b87e10bb3a5dd
                                                      • Instruction ID: 3be7047446d8c88d56afa4c2ea083f51366f219f7b4f40aee4c1d02b373127fd
                                                      • Opcode Fuzzy Hash: 32bff02a80f958dfdec465a2d891d2fadd99d2ca3df60b8da42b87e10bb3a5dd
                                                      • Instruction Fuzzy Hash: 8F411AB5A01219EFDB10DF50D884AEAB7B6FF45354F04412AE9059B350D770EE96CF60
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 006B2F8D
                                                      • LoadLibraryW.KERNEL32(?), ref: 006B2F94
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 006B2FA9
                                                      • DestroyWindow.USER32(?), ref: 006B2FB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                      • String ID: SysAnimate32
                                                      • API String ID: 3529120543-1011021900
                                                      • Opcode ID: 3ee1b7eb9d8b5789236201bcfc522bcfd0442bed6abf94ad73316e94ae9a8949
                                                      • Instruction ID: 4207bcb425cadb4d8907dcc428953b48ce04c1c6edb34326e9e27ae78b402e68
                                                      • Opcode Fuzzy Hash: 3ee1b7eb9d8b5789236201bcfc522bcfd0442bed6abf94ad73316e94ae9a8949
                                                      • Instruction Fuzzy Hash: 6C219AB124020AABEF104F64DCA4EFB37FEEB59764F100218FA50D6290D771DC919760
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00644D1E,006528E9,?,00644CBE,006528E9,006E88B8,0000000C,00644E15,006528E9,00000002), ref: 00644D8D
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00644DA0
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00644D1E,006528E9,?,00644CBE,006528E9,006E88B8,0000000C,00644E15,006528E9,00000002,00000000), ref: 00644DC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 08a22925c33b7392dd4288feadc1e07e4ce68123f19ac698aade715f2784a113
                                                      • Instruction ID: b0ea7f0ffa61282558970929e0f432c6dfef0d0fc306c22fc91f3e32fd807d1a
                                                      • Opcode Fuzzy Hash: 08a22925c33b7392dd4288feadc1e07e4ce68123f19ac698aade715f2784a113
                                                      • Instruction Fuzzy Hash: 4CF04475940218BBDB155F94DC49BEDBFBAEF44761F000158F905A2251CF715A84CA90
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00624EDD,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624E9C
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00624EAE
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00624EDD,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624EC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-3689287502
                                                      • Opcode ID: 443dca376f32d4e97d2e900d1387a94ea9e353a8419f037bf3fa4ec5198a6518
                                                      • Instruction ID: 53c86344118332b123f89ca4d847ad4ff139c9f58557d80e8fdaf4eabff68e3f
                                                      • Opcode Fuzzy Hash: 443dca376f32d4e97d2e900d1387a94ea9e353a8419f037bf3fa4ec5198a6518
                                                      • Instruction Fuzzy Hash: 67E08675A02A325BE3311729BC18A9F655AAF81F727060215FC40E2341DFA0CE4245A0
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00663CDE,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624E62
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00624E74
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00663CDE,?,006F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00624E87
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-1355242751
                                                      • Opcode ID: 227ab4953ec9512333e63238b0f241cbf4952cfcfb6b68ee7177137d11e9a697
                                                      • Instruction ID: a5c09bd0e78bd592c28ab4b30e96a56a987377bf4373d91da3caf43fa033d9f5
                                                      • Opcode Fuzzy Hash: 227ab4953ec9512333e63238b0f241cbf4952cfcfb6b68ee7177137d11e9a697
                                                      • Instruction Fuzzy Hash: 52D01275502A3257EB221B297C1CDCF6A1BAF85BB13070655F945B6325CF60CF4289E0
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00692C05
                                                      • DeleteFileW.KERNEL32(?), ref: 00692C87
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00692C9D
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00692CAE
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00692CC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$Copy
                                                      • String ID:
                                                      • API String ID: 3226157194-0
                                                      • Opcode ID: 371ecb3da2c6c28e86c318aed41c70fb649f2d36cb050d544dfa373e17b87757
                                                      • Instruction ID: 0986cd904a932469974238632a5c5c2c6521c3eee7bd83c77c04f0ddbf67b3c2
                                                      • Opcode Fuzzy Hash: 371ecb3da2c6c28e86c318aed41c70fb649f2d36cb050d544dfa373e17b87757
                                                      • Instruction Fuzzy Hash: CEB15D72D00129BBDF61DBA4CC95EDEB7BEEF08354F1040AAF609E6141EA319E448F65
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 006AA427
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 006AA435
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 006AA468
                                                      • CloseHandle.KERNEL32(?), ref: 006AA63D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                      • String ID:
                                                      • API String ID: 3488606520-0
                                                      • Opcode ID: b659dbb33678713b66186a03c49b8a584badb94f6f3e10073b2718a5c5a4fd7c
                                                      • Instruction ID: aaa9ea3e998c746bfe9c0c383ab664f0b6b263951706ff4bb2688be7687dbd94
                                                      • Opcode Fuzzy Hash: b659dbb33678713b66186a03c49b8a584badb94f6f3e10073b2718a5c5a4fd7c
                                                      • Instruction Fuzzy Hash: 42A1BE716047009FE760EF24D882B2AB7E6AF88714F14881DF55A9B392D770ED41CF96
                                                      APIs
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,006C3700), ref: 0065BB91
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,006F121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0065BC09
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,006F1270,000000FF,?,0000003F,00000000,?), ref: 0065BC36
                                                      • _free.LIBCMT ref: 0065BB7F
                                                        • Part of subcall function 006529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000), ref: 006529DE
                                                        • Part of subcall function 006529C8: GetLastError.KERNEL32(00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000,00000000), ref: 006529F0
                                                      • _free.LIBCMT ref: 0065BD4B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                      • String ID:
                                                      • API String ID: 1286116820-0
                                                      • Opcode ID: d16e93e52db4524e7072166ebe5e43e52b0c56f1a27d9b831bf27b739741dea0
                                                      • Instruction ID: 1d8a15681055c892d54d1d9fbabd25082f0ed5958d3ad7aad176621f015281d1
                                                      • Opcode Fuzzy Hash: d16e93e52db4524e7072166ebe5e43e52b0c56f1a27d9b831bf27b739741dea0
                                                      • Instruction Fuzzy Hash: 2E510A71900209DFCB10DFA99C819BEB7BAEF41361F10226EE950E7291EB705E49C754
                                                      APIs
                                                        • Part of subcall function 0068DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0068CF22,?), ref: 0068DDFD
                                                        • Part of subcall function 0068DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0068CF22,?), ref: 0068DE16
                                                        • Part of subcall function 0068E199: GetFileAttributesW.KERNEL32(?,0068CF95), ref: 0068E19A
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0068E473
                                                      • MoveFileW.KERNEL32(?,?), ref: 0068E4AC
                                                      • _wcslen.LIBCMT ref: 0068E5EB
                                                      • _wcslen.LIBCMT ref: 0068E603
                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0068E650
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                      • String ID:
                                                      • API String ID: 3183298772-0
                                                      • Opcode ID: 0e56f0861efb4185500b7781c115c57f5efd0a164be073bc2b4b750bcaf37a45
                                                      • Instruction ID: 2b2720925d70eaa72a021067b94425f12258abc11a331e8bf06ac21b67c6dc4e
                                                      • Opcode Fuzzy Hash: 0e56f0861efb4185500b7781c115c57f5efd0a164be073bc2b4b750bcaf37a45
                                                      • Instruction Fuzzy Hash: 975176B25087455BC764EBA0DC819DF73EEAF84340F004A1EF589D3151EF75A6888B6A
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 006AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006AB6AE,?,?), ref: 006AC9B5
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006AC9F1
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006ACA68
                                                        • Part of subcall function 006AC998: _wcslen.LIBCMT ref: 006ACA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006ABAA5
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006ABB00
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 006ABB63
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 006ABBA6
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 006ABBB3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                      • String ID:
                                                      • API String ID: 826366716-0
                                                      • Opcode ID: 53724c4a202a386d664d56d27b27c88e12bc578ba5885417eef4b9c4d8dfa838
                                                      • Instruction ID: 39e03eb16cb88dfc328322105c42bedd2abf21c6da28c073564326b7038eafb5
                                                      • Opcode Fuzzy Hash: 53724c4a202a386d664d56d27b27c88e12bc578ba5885417eef4b9c4d8dfa838
                                                      • Instruction Fuzzy Hash: DF61A171208241AFD314EF54C490E6ABBE6FF85318F14995CF4998B2A2DB31ED45CFA2
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00688BCD
                                                      • VariantClear.OLEAUT32 ref: 00688C3E
                                                      • VariantClear.OLEAUT32 ref: 00688C9D
                                                      • VariantClear.OLEAUT32(?), ref: 00688D10
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00688D3B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType
                                                      • String ID:
                                                      • API String ID: 4136290138-0
                                                      • Opcode ID: db573fb76947f699284bef95cf1b6c4f043e7a7293b2f3c92c8ed9666a63e89f
                                                      • Instruction ID: ee516b3ae330e18943a93f4680055ef139345302d0d703f8cdb78a755efbb0a5
                                                      • Opcode Fuzzy Hash: db573fb76947f699284bef95cf1b6c4f043e7a7293b2f3c92c8ed9666a63e89f
                                                      • Instruction Fuzzy Hash: 19517BB5A00219EFCB10DF68C894AAAB7F9FF89310B158659F905DB354E730EA11CF90
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00698BAE
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00698BDA
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00698C32
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00698C57
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00698C5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String
                                                      • String ID:
                                                      • API String ID: 2832842796-0
                                                      • Opcode ID: e75ecbbacc1a5963822401d2e79be3dfe9a93f081a8fa57773417d743b80438a
                                                      • Instruction ID: e7fc9523dba74582d97550dae8beb0751f9a6dc8d6f943831195447cbd9b6c31
                                                      • Opcode Fuzzy Hash: e75ecbbacc1a5963822401d2e79be3dfe9a93f081a8fa57773417d743b80438a
                                                      • Instruction Fuzzy Hash: 17512835A00615AFCB05DF64C881EA9BBF6FF49314F088458E849AB362DB35ED51CFA4
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 006A8F40
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 006A8FD0
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 006A8FEC
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 006A9032
                                                      • FreeLibrary.KERNEL32(00000000), ref: 006A9052
                                                        • Part of subcall function 0063F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00691043,?,7644E610), ref: 0063F6E6
                                                        • Part of subcall function 0063F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0067FA64,00000000,00000000,?,?,00691043,?,7644E610,?,0067FA64), ref: 0063F70D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                      • String ID:
                                                      • API String ID: 666041331-0
                                                      • Opcode ID: ee32e1b5f33e223cd77c44a7bf8e0ce60546c34349c7d043711c993d817948ef
                                                      • Instruction ID: 9b8348a71e27ef8d7b495d68f3795c930671cc37a8a1a9d07fa4156842353b2b
                                                      • Opcode Fuzzy Hash: ee32e1b5f33e223cd77c44a7bf8e0ce60546c34349c7d043711c993d817948ef
                                                      • Instruction Fuzzy Hash: C4512A35600615DFC715EF58C4848ADBBB2FF4A364F1481A9E805AB362DB31ED86CF90
                                                      APIs
                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 006B6C33
                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 006B6C4A
                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 006B6C73
                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0069AB79,00000000,00000000), ref: 006B6C98
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 006B6CC7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MessageSendShow
                                                      • String ID:
                                                      • API String ID: 3688381893-0
                                                      • Opcode ID: e5d0af36a10ac14f16a209e6b972d080db14e35f90ad0d8b7c9de2b38611fb97
                                                      • Instruction ID: ac79cb691e51cfc3f2c3aec85d54a272acda67df1210529111568ead74cb15a5
                                                      • Opcode Fuzzy Hash: e5d0af36a10ac14f16a209e6b972d080db14e35f90ad0d8b7c9de2b38611fb97
                                                      • Instruction Fuzzy Hash: B341A1B5604114AFD724CF28CC58FE97FA6EB09360F140268F995A73A1D375AE91CB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 1edac35e46f5e2d56bb24e448b5045a0c0a1290dedeb1ac306a4f21400440eec
                                                      • Instruction ID: ad476753e932a4e0bcd39df852286c8fc46bb58cb9f5d37c0f766407190d76e9
                                                      • Opcode Fuzzy Hash: 1edac35e46f5e2d56bb24e448b5045a0c0a1290dedeb1ac306a4f21400440eec
                                                      • Instruction Fuzzy Hash: 4E41D472A00201AFCB24DF78C991A9EB7A6EF8A714F154568EA15EB391D731AD05CB80
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00639141
                                                      • ScreenToClient.USER32(00000000,?), ref: 0063915E
                                                      • GetAsyncKeyState.USER32(00000001), ref: 00639183
                                                      • GetAsyncKeyState.USER32(00000002), ref: 0063919D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: d15c4f78ed52f4e668bd4a67a389b8284abc1f3a550d3da81d8f3c22efe31022
                                                      • Instruction ID: ee03ab2acaa3c75c84a0bea16f5f4c346b78aa7cfad34bde55734b7df845d323
                                                      • Opcode Fuzzy Hash: d15c4f78ed52f4e668bd4a67a389b8284abc1f3a550d3da81d8f3c22efe31022
                                                      • Instruction Fuzzy Hash: A6414F71A0861BBBDF159F64C844BEEB776FF05324F248229E429A7290C7706990CFA1
                                                      APIs
                                                      • GetInputState.USER32 ref: 006938CB
                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00693922
                                                      • TranslateMessage.USER32(?), ref: 0069394B
                                                      • DispatchMessageW.USER32(?), ref: 00693955
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00693966
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                      • String ID:
                                                      • API String ID: 2256411358-0
                                                      • Opcode ID: 55fdfa13022dd7415290fea2c5fd433606a968d37ed55435a728605adacc3bb4
                                                      • Instruction ID: 960f4272299fae1bf9a5446714dda6f35a573a65c729891df9c672676eb36814
                                                      • Opcode Fuzzy Hash: 55fdfa13022dd7415290fea2c5fd433606a968d37ed55435a728605adacc3bb4
                                                      • Instruction Fuzzy Hash: 1831C370904365DEEF35CB249908BF637AFAB12340F04056EE466C6BA0F3A49A85CB11
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0069C21E,00000000), ref: 0069CF38
                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 0069CF6F
                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,0069C21E,00000000), ref: 0069CFB4
                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0069C21E,00000000), ref: 0069CFC8
                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0069C21E,00000000), ref: 0069CFF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                      • String ID:
                                                      • API String ID: 3191363074-0
                                                      • Opcode ID: deb02703d970d5f8c4b8b5ac47bbb9a9f52d4a2272543279e52b9a2dcc10274b
                                                      • Instruction ID: 7d020a25684df8afd42eeb4b874b3c4f5e64f79789dbc01418cfbc54210c9dbc
                                                      • Opcode Fuzzy Hash: deb02703d970d5f8c4b8b5ac47bbb9a9f52d4a2272543279e52b9a2dcc10274b
                                                      • Instruction Fuzzy Hash: D8314BB1900605AFDF20DFA5C9849ABBBFEEF14360B10442EF506D2641DB30AE41DB60
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00681915
                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 006819C1
                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 006819C9
                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 006819DA
                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 006819E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: 6f3cb8c0802de8f69bb58d462c485dc4203d0b29c84416c4f628714809e1e6c8
                                                      • Instruction ID: e8db5f817a9a4be1a248fc450648ba6fde9c7ec333662107841c147bfab117a7
                                                      • Opcode Fuzzy Hash: 6f3cb8c0802de8f69bb58d462c485dc4203d0b29c84416c4f628714809e1e6c8
                                                      • Instruction Fuzzy Hash: 0731D371900219EFCF00DFA8CD58ADE3BBAEB05324F004325F961AB2D1D3709945CB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 006B5745
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 006B579D
                                                      • _wcslen.LIBCMT ref: 006B57AF
                                                      • _wcslen.LIBCMT ref: 006B57BA
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 006B5816
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen
                                                      • String ID:
                                                      • API String ID: 763830540-0
                                                      • Opcode ID: 0c88f0d8ec33cddf62145365361ae269c87722ee29af3501f77e9d09a904e459
                                                      • Instruction ID: 434cb54fb83d421cabd60364374de78a988101b95203bee405f3c540aef55ef8
                                                      • Opcode Fuzzy Hash: 0c88f0d8ec33cddf62145365361ae269c87722ee29af3501f77e9d09a904e459
                                                      • Instruction Fuzzy Hash: 862175B1904618DADB209F60CC45BED77BAFF14724F104216E92ADB281D77089C5CF50
                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 006A0951
                                                      • GetForegroundWindow.USER32 ref: 006A0968
                                                      • GetDC.USER32(00000000), ref: 006A09A4
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 006A09B0
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 006A09E8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: b174b17d9b72d0856d4154c1186c8619cb0c86fbc7d718ab21f9387ad8732f1d
                                                      • Instruction ID: 2494a02ee1d70e79e6e032453457b99817f0d0db482fcd703b9bd4cf1fcbfa78
                                                      • Opcode Fuzzy Hash: b174b17d9b72d0856d4154c1186c8619cb0c86fbc7d718ab21f9387ad8732f1d
                                                      • Instruction Fuzzy Hash: E321A175600214AFD754EF69D884AAEBBEAEF49710F00816CF84AA7752DB30AD44CF90
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0065CDC6
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0065CDE9
                                                        • Part of subcall function 00653820: RtlAllocateHeap.NTDLL(00000000,?,006F1444,?,0063FDF5,?,?,0062A976,00000010,006F1440,006213FC,?,006213C6,?,00621129), ref: 00653852
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0065CE0F
                                                      • _free.LIBCMT ref: 0065CE22
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0065CE31
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: 96542a0523cad1bac2c0abe62ca056b51d6f265f0be7862545af81b052d0e455
                                                      • Instruction ID: 85e4452a50a564599d2afe4425c017925d54132de03edbbaa6493b35b99a98be
                                                      • Opcode Fuzzy Hash: 96542a0523cad1bac2c0abe62ca056b51d6f265f0be7862545af81b052d0e455
                                                      • Instruction Fuzzy Hash: E301D8B26013167FA321167A6C4ACBB696FDEC6FB2715022DFD05D7300DA618E0581B0
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00639693
                                                      • SelectObject.GDI32(?,00000000), ref: 006396A2
                                                      • BeginPath.GDI32(?), ref: 006396B9
                                                      • SelectObject.GDI32(?,00000000), ref: 006396E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 183d98fb525d1ba0684ba70743f62a854fdd8c4c5abb96b181744fd4de8165da
                                                      • Instruction ID: 08c89f13cb7f8a39258dc4f63aa4b3661e3c236fd203b3b711113214c7f3abe1
                                                      • Opcode Fuzzy Hash: 183d98fb525d1ba0684ba70743f62a854fdd8c4c5abb96b181744fd4de8165da
                                                      • Instruction Fuzzy Hash: 0C217F70802309EBEB119F29DC157F93BABBB133A5F105216F410AA2A0D3F15991CFE4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 020da7222312bfcffadd1f73d43797c54aecfbe95f48d3fa72451a643d7ac748
                                                      • Instruction ID: 6c25a7cda2c6c19894cb532ebba588da9f75f1388c606b75233ca5e998a519ea
                                                      • Opcode Fuzzy Hash: 020da7222312bfcffadd1f73d43797c54aecfbe95f48d3fa72451a643d7ac748
                                                      • Instruction Fuzzy Hash: 1F01B5A5641609FBE3096610DD92FFB735F9B21394F408134FD069E241FB60ED9183A9
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,0064F2DE,00653863,006F1444,?,0063FDF5,?,?,0062A976,00000010,006F1440,006213FC,?,006213C6), ref: 00652DFD
                                                      • _free.LIBCMT ref: 00652E32
                                                      • _free.LIBCMT ref: 00652E59
                                                      • SetLastError.KERNEL32(00000000,00621129), ref: 00652E66
                                                      • SetLastError.KERNEL32(00000000,00621129), ref: 00652E6F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 845fbb6890ec4aa367bda402f5c7bc9c45e107704e867bbe507b1caa8980b7ee
                                                      • Instruction ID: 6370edba848cb3d5150bd9ad2552dd57915acb8c64cabdd0056a42ca2ac71611
                                                      • Opcode Fuzzy Hash: 845fbb6890ec4aa367bda402f5c7bc9c45e107704e867bbe507b1caa8980b7ee
                                                      • Instruction Fuzzy Hash: 1F01F472205A0267C71227756CA7DAB269BABD37B7F25412DFD21A2392EE209D4E4120
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?,?,0068035E), ref: 0068002B
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?), ref: 00680046
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?), ref: 00680054
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?), ref: 00680064
                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0067FF41,80070057,?,?), ref: 00680070
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: d1b3f8846d9332ff10ac72a233de6643163f0a051592d61e6deffce1ac273175
                                                      • Instruction ID: abb9e57b87b475ab704ed9c4cae2c26abb29f6f5e7e18d808793b518729d8d98
                                                      • Opcode Fuzzy Hash: d1b3f8846d9332ff10ac72a233de6643163f0a051592d61e6deffce1ac273175
                                                      • Instruction Fuzzy Hash: B601A2B2600204BFEB515F68DC04BAA7EFFEF44762F145624F905D6210D771DE849BA0
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0068E997
                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 0068E9A5
                                                      • Sleep.KERNEL32(00000000), ref: 0068E9AD
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0068E9B7
                                                      • Sleep.KERNEL32 ref: 0068E9F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 8f3e27796b8595f4a72af7b2b74ab9ac56124cad0c706445ba492385f122f4ae
                                                      • Instruction ID: a4a5bd4d56ca03416ed7734cd43b045928b6a354b41472bf25bdd9141a715420
                                                      • Opcode Fuzzy Hash: 8f3e27796b8595f4a72af7b2b74ab9ac56124cad0c706445ba492385f122f4ae
                                                      • Instruction Fuzzy Hash: E1018C71C0162DDBCF00AFE8DC59AEDBB7AFF09311F000646E542B2240CBB59691CBA1
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00681114
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 00681120
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 0068112F
                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00680B9B,?,?,?), ref: 00681136
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0068114D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: 2d9bd220d4d2026328800de610009a1f08fbd3202c025b4a90df56f6757833eb
                                                      • Instruction ID: 3f28c9af90b69ca31261ca6b2a4c680b703c1e00cf003600f88912a31736a504
                                                      • Opcode Fuzzy Hash: 2d9bd220d4d2026328800de610009a1f08fbd3202c025b4a90df56f6757833eb
                                                      • Instruction Fuzzy Hash: B80169B5200205BFDB115FA8DC4DAAA3B6FEF8A3A0B200529FA41D7360DA31DD409B60
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00680FCA
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00680FD6
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00680FE5
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00680FEC
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00681002
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 0506a8ee1b56b436626dd2ea1e541de38effc0e2a646ec2aaf6f1b2b04c2012f
                                                      • Instruction ID: 9954c4b03ff740fdae4ea517fd90b82c33fd26fb3e53f8a8c33df841015df12a
                                                      • Opcode Fuzzy Hash: 0506a8ee1b56b436626dd2ea1e541de38effc0e2a646ec2aaf6f1b2b04c2012f
                                                      • Instruction Fuzzy Hash: ABF049B5200301ABDB216FA8DC49F963BAEEF8A762F104525FA45DA251CA71DD818A60
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0068102A
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00681036
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00681045
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0068104C
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00681062
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 62192787130348df130d7c7ec52527cea617b2f552bae6c8faf5e886dada65fc
                                                      • Instruction ID: 11c19ea80137412989108c46af8af470f504986b3a83453568d4dbeadcb33105
                                                      • Opcode Fuzzy Hash: 62192787130348df130d7c7ec52527cea617b2f552bae6c8faf5e886dada65fc
                                                      • Instruction Fuzzy Hash: 12F04FB5100305ABD7216FA4EC49F973BAEEF8A761F100515FA45DA250CA71D9C18A60
                                                      APIs
                                                      • CloseHandle.KERNEL32(?,?,?,?,0069017D,?,006932FC,?,00000001,00662592,?), ref: 00690324
                                                      • CloseHandle.KERNEL32(?,?,?,?,0069017D,?,006932FC,?,00000001,00662592,?), ref: 00690331
                                                      • CloseHandle.KERNEL32(?,?,?,?,0069017D,?,006932FC,?,00000001,00662592,?), ref: 0069033E
                                                      • CloseHandle.KERNEL32(?,?,?,?,0069017D,?,006932FC,?,00000001,00662592,?), ref: 0069034B
                                                      • CloseHandle.KERNEL32(?,?,?,?,0069017D,?,006932FC,?,00000001,00662592,?), ref: 00690358
                                                      • CloseHandle.KERNEL32(?,?,?,?,0069017D,?,006932FC,?,00000001,00662592,?), ref: 00690365
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 27914c2b0aff028a61b7be9e1ea1ec98e746f574d2fcec60f437d23af70cb703
                                                      • Instruction ID: 62411db3befdb85d5145e53d6f7e72de0c1c991a9aceea3070cb5078f1774920
                                                      • Opcode Fuzzy Hash: 27914c2b0aff028a61b7be9e1ea1ec98e746f574d2fcec60f437d23af70cb703
                                                      • Instruction Fuzzy Hash: 9D01A276800B169FDB309F66D880452F7FABF503153158A3FD19652A31C371A955DF80
                                                      APIs
                                                      • _free.LIBCMT ref: 0065D752
                                                        • Part of subcall function 006529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000), ref: 006529DE
                                                        • Part of subcall function 006529C8: GetLastError.KERNEL32(00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000,00000000), ref: 006529F0
                                                      • _free.LIBCMT ref: 0065D764
                                                      • _free.LIBCMT ref: 0065D776
                                                      • _free.LIBCMT ref: 0065D788
                                                      • _free.LIBCMT ref: 0065D79A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 91938717bf488f1fdb66accf3833ffc97ffe124b46cce63d330c1d79e63b6ab4
                                                      • Instruction ID: 3e3585209a10c98f3a5e540aa9b5e8320489069ef8354d77f30535f97f52caec
                                                      • Opcode Fuzzy Hash: 91938717bf488f1fdb66accf3833ffc97ffe124b46cce63d330c1d79e63b6ab4
                                                      • Instruction Fuzzy Hash: C4F04F32500349ABC675EB65F9C1C9A7BDFBB09722FA41809F848EB642C720FC848664
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00685C58
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00685C6F
                                                      • MessageBeep.USER32(00000000), ref: 00685C87
                                                      • KillTimer.USER32(?,0000040A), ref: 00685CA3
                                                      • EndDialog.USER32(?,00000001), ref: 00685CBD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: f63e91f259a17b037242ec8ff4ea62b47492849ecbc532cf927b8033ffc37072
                                                      • Instruction ID: e8193fa325f6d2308fd0a5b3c7a38444adbb2ddaa1b44bc26c78b7c21e9865b6
                                                      • Opcode Fuzzy Hash: f63e91f259a17b037242ec8ff4ea62b47492849ecbc532cf927b8033ffc37072
                                                      • Instruction Fuzzy Hash: FC018670500B14ABEB216B14DD4EFE677BABB00B05F00275DB583A14E1EBF0AA848F91
                                                      APIs
                                                      • _free.LIBCMT ref: 006522BE
                                                        • Part of subcall function 006529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000), ref: 006529DE
                                                        • Part of subcall function 006529C8: GetLastError.KERNEL32(00000000,?,0065D7D1,00000000,00000000,00000000,00000000,?,0065D7F8,00000000,00000007,00000000,?,0065DBF5,00000000,00000000), ref: 006529F0
                                                      • _free.LIBCMT ref: 006522D0
                                                      • _free.LIBCMT ref: 006522E3
                                                      • _free.LIBCMT ref: 006522F4
                                                      • _free.LIBCMT ref: 00652305
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: f9d67eb8bc382b2af9d38d5e42144496f0cbee5119208fba8d01448446074170
                                                      • Instruction ID: fd2f9e67602c9f4b17b4107c5d9e4a4b23d7993f7741a4f79db4e196d63ffed6
                                                      • Opcode Fuzzy Hash: f9d67eb8bc382b2af9d38d5e42144496f0cbee5119208fba8d01448446074170
                                                      • Instruction Fuzzy Hash: E8F05B744012129BC752AF55BC518A93F57F716B62F00250AFC20EB371C7310655DFD8
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 006395D4
                                                      • StrokeAndFillPath.GDI32(?,?,006771F7,00000000,?,?,?), ref: 006395F0
                                                      • SelectObject.GDI32(?,00000000), ref: 00639603
                                                      • DeleteObject.GDI32 ref: 00639616
                                                      • StrokePath.GDI32(?), ref: 00639631
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: d562f4c3748492e608c5886b52194b43590070540c8b43c684db905ed0c5e2f9
                                                      • Instruction ID: d1853cf33eeffb8394773555ffe7174eddfbce67767a65d19f814923414fd6f9
                                                      • Opcode Fuzzy Hash: d562f4c3748492e608c5886b52194b43590070540c8b43c684db905ed0c5e2f9
                                                      • Instruction Fuzzy Hash: DCF0F630006208EBDB126F69ED187B93B67AB133B6F04A214E465591F0C7B18A91DFE0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: __freea$_free
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 3432400110-3206640213
                                                      • Opcode ID: 6aafe3cde64e6cfd737cdfdc2b25d337aab7904df12760d3d29465b62b6c5b1b
                                                      • Instruction ID: 983d37cc2b61f94cc737e0cce4cc2d89d74bc1df6a4426ce00e4d27756710e19
                                                      • Opcode Fuzzy Hash: 6aafe3cde64e6cfd737cdfdc2b25d337aab7904df12760d3d29465b62b6c5b1b
                                                      • Instruction Fuzzy Hash: 36D1F331900206DADB249F68C865BFAB7B3EF07702F28015AED019F751D7759E89CB91
                                                      APIs
                                                        • Part of subcall function 00640242: EnterCriticalSection.KERNEL32(006F070C,006F1884,?,?,0063198B,006F2518,?,?,?,006212F9,00000000), ref: 0064024D
                                                        • Part of subcall function 00640242: LeaveCriticalSection.KERNEL32(006F070C,?,0063198B,006F2518,?,?,?,006212F9,00000000), ref: 0064028A
                                                        • Part of subcall function 006400A3: __onexit.LIBCMT ref: 006400A9
                                                      • __Init_thread_footer.LIBCMT ref: 006A6238
                                                        • Part of subcall function 006401F8: EnterCriticalSection.KERNEL32(006F070C,?,?,00638747,006F2514), ref: 00640202
                                                        • Part of subcall function 006401F8: LeaveCriticalSection.KERNEL32(006F070C,?,00638747,006F2514), ref: 00640235
                                                        • Part of subcall function 0069359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006935E4
                                                        • Part of subcall function 0069359C: LoadStringW.USER32(006F2390,?,00000FFF,?), ref: 0069360A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                      • String ID: x#o$x#o$x#o
                                                      • API String ID: 1072379062-639736625
                                                      • Opcode ID: 34ad114ab11efd3716f670865f4baf75b661c437ef73e5f406325b394dc8cd61
                                                      • Instruction ID: ead68a107fdfd4ab7516114ae4fb101e297e794a4265648f6adcc9ed2a564a29
                                                      • Opcode Fuzzy Hash: 34ad114ab11efd3716f670865f4baf75b661c437ef73e5f406325b394dc8cd61
                                                      • Instruction Fuzzy Hash: 6BC15C71A00109AFDB14EF98C891EBEB7BAEF49310F148069FA159B291DB70ED45CF94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: JOb
                                                      • API String ID: 0-1443988154
                                                      • Opcode ID: e2e4da3dff07e4827174f99c26d2502d134a8c3e020c73d387cf99294a1bdd7c
                                                      • Instruction ID: 88fbdd50fc2cdb43981b82dbca436836123512af319165952577788ad3f54694
                                                      • Opcode Fuzzy Hash: e2e4da3dff07e4827174f99c26d2502d134a8c3e020c73d387cf99294a1bdd7c
                                                      • Instruction Fuzzy Hash: CC51B171D0060A9FDF109FA8C86DEEE7BB6AF05312F14015DFC06AB291D6719A09CB65
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00658B6E
                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00658B7A
                                                      • __dosmaperr.LIBCMT ref: 00658B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                      • String ID: .d
                                                      • API String ID: 2434981716-3816422287
                                                      • Opcode ID: 562a6595b7e47f651597ecf8d515f8dafedd738e3c85e13a9e2ba598187c0c0b
                                                      • Instruction ID: 44f83e24502aaf8fae710ca36be4d790a33bd5986dd11bb540df5754e42d4cb5
                                                      • Opcode Fuzzy Hash: 562a6595b7e47f651597ecf8d515f8dafedd738e3c85e13a9e2ba598187c0c0b
                                                      • Instruction Fuzzy Hash: 03416CB0604145AFDB249F64CC81ABD7FEBDB85305F2841A9FC85ABA52DE318D078794
                                                      APIs
                                                        • Part of subcall function 0068B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006821D0,?,?,00000034,00000800,?,00000034), ref: 0068B42D
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00682760
                                                        • Part of subcall function 0068B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0068B3F8
                                                        • Part of subcall function 0068B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0068B355
                                                        • Part of subcall function 0068B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00682194,00000034,?,?,00001004,00000000,00000000), ref: 0068B365
                                                        • Part of subcall function 0068B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00682194,00000034,?,?,00001004,00000000,00000000), ref: 0068B37B
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006827CD
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0068281A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: 0aa52c708bbf70337a8c6e71d139556fb2f37132b2caddfd5d6f8e7f07dbc90c
                                                      • Instruction ID: 35da935687e3df01df8fe08c66dd78e24114399de705c12781249242fc6b0c23
                                                      • Opcode Fuzzy Hash: 0aa52c708bbf70337a8c6e71d139556fb2f37132b2caddfd5d6f8e7f07dbc90c
                                                      • Instruction Fuzzy Hash: 25413C72900218BFDB10EBA4CD56AEEBBB9AF09300F005159FA55B7181DB706E85CBA1
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NEWORDER.exe,00000104), ref: 00651769
                                                      • _free.LIBCMT ref: 00651834
                                                      • _free.LIBCMT ref: 0065183E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\Desktop\NEWORDER.exe
                                                      • API String ID: 2506810119-4249851805
                                                      • Opcode ID: db69577cfc8c3a444737a484c99f48c01afd17b7307793d7c855ce801b86d871
                                                      • Instruction ID: 1bbdc7c640bd06b444cd4e204810d113425a05e139d4be3e2a68102308d12083
                                                      • Opcode Fuzzy Hash: db69577cfc8c3a444737a484c99f48c01afd17b7307793d7c855ce801b86d871
                                                      • Instruction Fuzzy Hash: BA318375A00218EBDB21DB999C81EDEBBBEEB86351F10416AF8149B311D6704E44CB94
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0068C306
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 0068C34C
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006F1990,01174D88), ref: 0068C395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem
                                                      • String ID: 0
                                                      • API String ID: 135850232-4108050209
                                                      • Opcode ID: b4c6b7a8744b7564ad2f73b893b72f188249b7fd855c5b564df983e67da96e58
                                                      • Instruction ID: 775eeeec0381753a3a9e697a5aececfac0989278253d053d3309a45618f6817e
                                                      • Opcode Fuzzy Hash: b4c6b7a8744b7564ad2f73b893b72f188249b7fd855c5b564df983e67da96e58
                                                      • Instruction Fuzzy Hash: 8141AD712043019FD720EF24D884B5ABBEAEF85320F148B2DF8A5973D1D770A906CB66
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,006BCC08,00000000,?,?,?,?), ref: 006B44AA
                                                      • GetWindowLongW.USER32 ref: 006B44C7
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006B44D7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: cb0dd04194a53ad75860a7609d0a6267b4a6154511a774b36a5db2204f2ba15c
                                                      • Instruction ID: 5c7ccafa05950906686a00ae8c8eb956fc809afc56d6d40ed5228242bfd5d4d7
                                                      • Opcode Fuzzy Hash: cb0dd04194a53ad75860a7609d0a6267b4a6154511a774b36a5db2204f2ba15c
                                                      • Instruction Fuzzy Hash: 213181B2110605AFDB208E38DC45BEA77AAEB09334F204719F975922D1DB70ECA19B60
                                                      APIs
                                                      • SysReAllocString.OLEAUT32(?,?), ref: 00686EED
                                                      • VariantCopyInd.OLEAUT32(?,?), ref: 00686F08
                                                      • VariantClear.OLEAUT32(?), ref: 00686F12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyString
                                                      • String ID: *jh
                                                      • API String ID: 2173805711-383807587
                                                      • Opcode ID: 2dfda15053f73adcc55764c95b72025e606f2eb39057033b995fd443e7743024
                                                      • Instruction ID: d7149a7852104b2851b52bf36804c1e9f164d4237b0f2235cb78497238b13cbe
                                                      • Opcode Fuzzy Hash: 2dfda15053f73adcc55764c95b72025e606f2eb39057033b995fd443e7743024
                                                      • Instruction Fuzzy Hash: 6F318F72604655DBCB05BFA5E8519BE77B7EF89300B1006A8FA025B2B1CB34DA12DB94
                                                      APIs
                                                        • Part of subcall function 006A335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,006A3077,?,?), ref: 006A3378
                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 006A307A
                                                      • _wcslen.LIBCMT ref: 006A309B
                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 006A3106
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 946324512-2422070025
                                                      • Opcode ID: d3138df0a8103feb77b638ac8f35c9149e7a4bd5a09d73b5e1d701882efc085b
                                                      • Instruction ID: 423e4e309e0d8ba6172d8d56089faada6ae0370567324b8b58ad3a60c5817cad
                                                      • Opcode Fuzzy Hash: d3138df0a8103feb77b638ac8f35c9149e7a4bd5a09d73b5e1d701882efc085b
                                                      • Instruction Fuzzy Hash: F431C4752042159FCB10EF68C586EA977E2EF56318F248059F8158B392DB31EE41CB70
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 006B4705
                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 006B4713
                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 006B471A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyWindow
                                                      • String ID: msctls_updown32
                                                      • API String ID: 4014797782-2298589950
                                                      • Opcode ID: 61d45f784e6958889b582009f2a4c38fe161ad81d427f52da3ff3518f89ad842
                                                      • Instruction ID: 44730c12d13b3c3bdada3981129e197454245c265eaeae570aedeaa6540b5fb5
                                                      • Opcode Fuzzy Hash: 61d45f784e6958889b582009f2a4c38fe161ad81d427f52da3ff3518f89ad842
                                                      • Instruction Fuzzy Hash: 62212AF5601219AFDB10DF68DC91DF637AEEB5A3A4B040159FA009B352DB71EC51CBA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 176396367-2734436370
                                                      • Opcode ID: ff73a85bf49e3772d338eb380a23c54868ccfc0dfce3f1c41066247ddfaf5931
                                                      • Instruction ID: a5d1d875a9fa27b0850bfca3a20991f7a4239b8eb4edc3df1b3c513a4ca0c4b6
                                                      • Opcode Fuzzy Hash: ff73a85bf49e3772d338eb380a23c54868ccfc0dfce3f1c41066247ddfaf5931
                                                      • Instruction Fuzzy Hash: 23210872204521A6D331BB249C02FFB739B9F51310F18452AF94997242FB919D82C3F9
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 006B3840
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 006B3850
                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 006B3876
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: 52130678dfe66a4340e739320ab3a66b74aa752887adb7874b9602b8ff1e36d5
                                                      • Instruction ID: eb5507f0a3025c5cf7970f5c947e16001a53020621307b4efc255cfd9f4df4f0
                                                      • Opcode Fuzzy Hash: 52130678dfe66a4340e739320ab3a66b74aa752887adb7874b9602b8ff1e36d5
                                                      • Instruction Fuzzy Hash: BD2180B2710228BBEB118F55DC45EFB376FEF89760F118124F9059B290CA71DD9287A0
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00694A08
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00694A5C
                                                      • SetErrorMode.KERNEL32(00000000,?,?,006BCC08), ref: 00694AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume
                                                      • String ID: %lu
                                                      • API String ID: 2507767853-685833217
                                                      • Opcode ID: 4312c516b2b3cb89be1ef0a9c1fa8f1714e8de72a4e028f0835f1da439b22057
                                                      • Instruction ID: 75404003e722d889cd4a3c65a39877cf4c9cfac564fc5662b1b4f8cfcb5be607
                                                      • Opcode Fuzzy Hash: 4312c516b2b3cb89be1ef0a9c1fa8f1714e8de72a4e028f0835f1da439b22057
                                                      • Instruction Fuzzy Hash: 5D317371A00109AFDB50DF54C885EAA7BFAEF44318F1480A9F505EB352DB71EE46CB61
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 006B424F
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 006B4264
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 006B4271
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: 0c74f0dfedce94dd0b0878f2d49d838c184253d6d35ab58531f9db1c11bb65bf
                                                      • Instruction ID: 4f2bc3f0f48e7b667f6724565922efc8a6e8d57666ea806f26977eebbf35946f
                                                      • Opcode Fuzzy Hash: 0c74f0dfedce94dd0b0878f2d49d838c184253d6d35ab58531f9db1c11bb65bf
                                                      • Instruction Fuzzy Hash: 4011E3B1240248BEEF205F29CC06FFB3BAEEF95B64F010114FA55E6191D671DC919B50
                                                      APIs
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                        • Part of subcall function 00682DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00682DC5
                                                        • Part of subcall function 00682DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00682DD6
                                                        • Part of subcall function 00682DA7: GetCurrentThreadId.KERNEL32 ref: 00682DDD
                                                        • Part of subcall function 00682DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00682DE4
                                                      • GetFocus.USER32 ref: 00682F78
                                                        • Part of subcall function 00682DEE: GetParent.USER32(00000000), ref: 00682DF9
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00682FC3
                                                      • EnumChildWindows.USER32(?,0068303B), ref: 00682FEB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                      • String ID: %s%d
                                                      • API String ID: 1272988791-1110647743
                                                      • Opcode ID: aa4c73de2726b93d2271e9dde69fe1a845aa795255ca6a34f091226a7c3694f1
                                                      • Instruction ID: 7b5eaada050ec4fac13257719ab2a237ded7b1cff4f1ec50e47a6e008c386ea8
                                                      • Opcode Fuzzy Hash: aa4c73de2726b93d2271e9dde69fe1a845aa795255ca6a34f091226a7c3694f1
                                                      • Instruction Fuzzy Hash: 6E1106B16002156BCF507F70DC95EED376BAF84314F044179FD09AB252DE309A458B74
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006B58C1
                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006B58EE
                                                      • DrawMenuBar.USER32(?), ref: 006B58FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Menu$InfoItem$Draw
                                                      • String ID: 0
                                                      • API String ID: 3227129158-4108050209
                                                      • Opcode ID: bc144a84ef67fc40533ecfb2228247f308245f68982105555b50deca796895d2
                                                      • Instruction ID: 1bc7c03c01c0660b6f223f8a78eb9f621bacc48bc9299e3a79aa0f83684fd895
                                                      • Opcode Fuzzy Hash: bc144a84ef67fc40533ecfb2228247f308245f68982105555b50deca796895d2
                                                      • Instruction Fuzzy Hash: 4D016172500258EFDB619F11DC44BEEBBB6FB45360F14809AE849D6251DB308AD4DF61
                                                      APIs
                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0067D3BF
                                                      • FreeLibrary.KERNEL32 ref: 0067D3E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                      • API String ID: 3013587201-2590602151
                                                      • Opcode ID: 876f49ee32a643a57bc4d67e686fd2891bcdcf6cefd65cd742e2583ba3b3ba11
                                                      • Instruction ID: 82e400e4e839e0869f852fdfc925eba2b364e48c9d3ff6bb6f3329eb024c48fd
                                                      • Opcode Fuzzy Hash: 876f49ee32a643a57bc4d67e686fd2891bcdcf6cefd65cd742e2583ba3b3ba11
                                                      • Instruction Fuzzy Hash: 91F05CB18016219BC3314B148C549A97737AF11B10F56CA54F50DF6142D760CF8387D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3ea2c158d863c9a3c90bb2f7f0214cb8f311b901f76dbeadfed2da8e58fde883
                                                      • Instruction ID: 70de129218e98401bad0ec13689dc1c47530c6988e829cb886da4b5970060248
                                                      • Opcode Fuzzy Hash: 3ea2c158d863c9a3c90bb2f7f0214cb8f311b901f76dbeadfed2da8e58fde883
                                                      • Instruction Fuzzy Hash: 09C18E75A00216EFEB54DF94C898EAEB7B6FF48314F108A98E405EB251C771EE45CB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                      • String ID:
                                                      • API String ID: 1998397398-0
                                                      • Opcode ID: 597e495c0128b1c09feffb7d52c11df807e22d59a34f3d8f9ee586192702edbf
                                                      • Instruction ID: f4d6c3d06280d7b045013ed0a31dd45f181342fd486a50ef6932883935bd44fe
                                                      • Opcode Fuzzy Hash: 597e495c0128b1c09feffb7d52c11df807e22d59a34f3d8f9ee586192702edbf
                                                      • Instruction Fuzzy Hash: 42A12B756046109FC740EF28C585A2AB7E6FF89714F14885DF98AAB362DB30EE01CF95
                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,006BFC08,?), ref: 006805F0
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,006BFC08,?), ref: 00680608
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,006BCC40,000000FF,?,00000000,00000800,00000000,?,006BFC08,?), ref: 0068062D
                                                      • _memcmp.LIBVCRUNTIME ref: 0068064E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID:
                                                      • API String ID: 314563124-0
                                                      • Opcode ID: 5458cf6de4988e873f227b897c45780f68bf6d65ab9a7d14d4aac19ac9e02d15
                                                      • Instruction ID: 522978220dff8889cdd8b7c31048121b8a30aa5cf5ef1b8915c72acc6d67f3ae
                                                      • Opcode Fuzzy Hash: 5458cf6de4988e873f227b897c45780f68bf6d65ab9a7d14d4aac19ac9e02d15
                                                      • Instruction Fuzzy Hash: 30812B71A00109EFDB44DF94C984EEEB7BAFF89315F204558E506AB250DB71AE4ACF60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 9c88c6d287e3637fd44bd129d42f10863934e36fbdd58b33d2eb60b2e7f97f79
                                                      • Instruction ID: 3293a8879b892e376dcba7a4d5eb0bcb059e1cf7196aa52c258fa9ee2977fef3
                                                      • Opcode Fuzzy Hash: 9c88c6d287e3637fd44bd129d42f10863934e36fbdd58b33d2eb60b2e7f97f79
                                                      • Instruction Fuzzy Hash: 2D413B31A00111ABDB61AFF98C466FE3AE7EF43370F1C4229F819DB391EA74894153A5
                                                      APIs
                                                      • GetWindowRect.USER32(0117EA40,?), ref: 006B62E2
                                                      • ScreenToClient.USER32(?,?), ref: 006B6315
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 006B6382
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID:
                                                      • API String ID: 3880355969-0
                                                      • Opcode ID: c4f3f4fe1ffa242771a76490a56523c5202fc673ac2433de152245e4f882c40a
                                                      • Instruction ID: bad3820dcf006763e5e613c9309c22a20289f6176d3455fecd1ac10204b49c14
                                                      • Opcode Fuzzy Hash: c4f3f4fe1ffa242771a76490a56523c5202fc673ac2433de152245e4f882c40a
                                                      • Instruction Fuzzy Hash: 36510AB4900209EFDB10DF58D8819EE7BF6EF55360F109269F9159B290D774AE81CB90
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 006A1AFD
                                                      • WSAGetLastError.WSOCK32 ref: 006A1B0B
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 006A1B8A
                                                      • WSAGetLastError.WSOCK32 ref: 006A1B94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$socket
                                                      • String ID:
                                                      • API String ID: 1881357543-0
                                                      • Opcode ID: 93ab7fa23e50381e37823404a702faef54ec87c52cb4cb67ca05a64d0499b82a
                                                      • Instruction ID: 04a6d5eafc34e68fc4c08e6fb9bb44d4a72de83c9b32703b636855c7e5bcb9e9
                                                      • Opcode Fuzzy Hash: 93ab7fa23e50381e37823404a702faef54ec87c52cb4cb67ca05a64d0499b82a
                                                      • Instruction Fuzzy Hash: 5C41D034600610AFE720AF20D886F6977E6AF49718F54844CF91A9F7D3D772ED428B90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5a7a000f8fedf8bfaece8e3f14ccc79be536386ae47609eaa6038fb878b92e1f
                                                      • Instruction ID: e8d27cf977ab6992b7215d0d4c638b797fbb1fc773af45397f173e7e4a0f244a
                                                      • Opcode Fuzzy Hash: 5a7a000f8fedf8bfaece8e3f14ccc79be536386ae47609eaa6038fb878b92e1f
                                                      • Instruction Fuzzy Hash: 7E410672A00314AFD7249F78CC41BAABBFBEF88711F20452EF941DB282D77199058784
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00695783
                                                      • GetLastError.KERNEL32(?,00000000), ref: 006957A9
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006957CE
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006957FA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: 767f3eca2c5bac2fe1946968485fb382aff9a3a25a4c413f78c768e8a141d42d
                                                      • Instruction ID: 386fe6fd595afe36dd0f98af924607b57730f6947b1e2f7a38576c90e2984e20
                                                      • Opcode Fuzzy Hash: 767f3eca2c5bac2fe1946968485fb382aff9a3a25a4c413f78c768e8a141d42d
                                                      • Instruction Fuzzy Hash: 78411A35600A20DFCB11EF55D544A5EBBE6EF89320B188488E84AAB762CB31FD40CF95
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00646D71,00000000,00000000,006482D9,?,006482D9,?,00000001,00646D71,?,00000001,006482D9,006482D9), ref: 0065D910
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0065D999
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0065D9AB
                                                      • __freea.LIBCMT ref: 0065D9B4
                                                        • Part of subcall function 00653820: RtlAllocateHeap.NTDLL(00000000,?,006F1444,?,0063FDF5,?,?,0062A976,00000010,006F1440,006213FC,?,006213C6,?,00621129), ref: 00653852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: 38caacae2351ac5fdc075911663d4346c3d6b7b460f791b54c6552133de7a779
                                                      • Instruction ID: 67965fa75055fecd2838198afab2afe23bf1800806743f284166efe910882b13
                                                      • Opcode Fuzzy Hash: 38caacae2351ac5fdc075911663d4346c3d6b7b460f791b54c6552133de7a779
                                                      • Instruction Fuzzy Hash: 4431CE72A0020AABDF24DF64DC41EEE7BA6EB41311F050268FC04E6291EB35CD58CB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 006B5352
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B5375
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006B5382
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006B53A8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$InvalidateMessageRectSend
                                                      • String ID:
                                                      • API String ID: 3340791633-0
                                                      • Opcode ID: 141f3e23d518df5562b346728c07a46d49d4992ceddb2c7b1298f2fbcec936a6
                                                      • Instruction ID: 4cd64890e7e4c35f93154907234f44dea0e3fc118e8e380597359880c39dd0ee
                                                      • Opcode Fuzzy Hash: 141f3e23d518df5562b346728c07a46d49d4992ceddb2c7b1298f2fbcec936a6
                                                      • Instruction Fuzzy Hash: 0A31D2B0A55A08EFEB309F14CC15FE837E7AB05390F585101FA12963E1E7B599C1DB82
                                                      APIs
                                                      • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 0068ABF1
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 0068AC0D
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 0068AC74
                                                      • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 0068ACC6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 915a809d231d6a1e1173fef096828d319a473c108ee057a5c6224b557b60b213
                                                      • Instruction ID: 67e68ec4b8ed718b4785e860bcbb39a4dfd59b69b190d57a23d82ff6e1fcc912
                                                      • Opcode Fuzzy Hash: 915a809d231d6a1e1173fef096828d319a473c108ee057a5c6224b557b60b213
                                                      • Instruction Fuzzy Hash: 20310870A406186FFF35EBA58C04BFA7BB7AB49320F08431FE985522D1D3758A858762
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 006B769A
                                                      • GetWindowRect.USER32(?,?), ref: 006B7710
                                                      • PtInRect.USER32(?,?,006B8B89), ref: 006B7720
                                                      • MessageBeep.USER32(00000000), ref: 006B778C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: e6bd2ac119d69eb03aaf2bd9e1f80ffb0c2ac2691bb8167bd5a6eacba04d2f05
                                                      • Instruction ID: a3a2c820510030e0702e633e9f0e09478fdd0a2f84ced6d72c3c979ab7f2eaa1
                                                      • Opcode Fuzzy Hash: e6bd2ac119d69eb03aaf2bd9e1f80ffb0c2ac2691bb8167bd5a6eacba04d2f05
                                                      • Instruction Fuzzy Hash: FD41BCB4A09214DFCB11CF58D884EE9B7F6FB89310F1841B8E5159B361DB30E982CB90
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 006B16EB
                                                        • Part of subcall function 00683A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00683A57
                                                        • Part of subcall function 00683A3D: GetCurrentThreadId.KERNEL32 ref: 00683A5E
                                                        • Part of subcall function 00683A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006825B3), ref: 00683A65
                                                      • GetCaretPos.USER32(?), ref: 006B16FF
                                                      • ClientToScreen.USER32(00000000,?), ref: 006B174C
                                                      • GetForegroundWindow.USER32 ref: 006B1752
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 2098d4fbcdd8d13fa1501682394fecde895a2101f2155d373dbb747c0e1a8536
                                                      • Instruction ID: 56a8b8ee9b82a28e579eabf227ea2710cdbafe55f5200dbc0e4b6aac333c25c4
                                                      • Opcode Fuzzy Hash: 2098d4fbcdd8d13fa1501682394fecde895a2101f2155d373dbb747c0e1a8536
                                                      • Instruction Fuzzy Hash: A93150B1D00159AFC700EFA9D881CEEB7FAEF49304B50806DE415E7211DA319E45CFA0
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0068D501
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0068D50F
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0068D52F
                                                      • CloseHandle.KERNEL32(00000000), ref: 0068D5DC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 420147892-0
                                                      • Opcode ID: 5b133f21926cf7411af7aafd9730a251d5bf2f8af0e5eea4ae28c4b97ca6c252
                                                      • Instruction ID: 76f7cef5a44e2fb4fec8f66e12c3640aa7bd4a9b935395646cb04e1ca00b4f93
                                                      • Opcode Fuzzy Hash: 5b133f21926cf7411af7aafd9730a251d5bf2f8af0e5eea4ae28c4b97ca6c252
                                                      • Instruction Fuzzy Hash: DE31A7711083009FD304EF54D885AAFBBF9EFD9354F14092DF581962A1EB719A45CBA3
                                                      APIs
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      • GetCursorPos.USER32(?), ref: 006B9001
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00677711,?,?,?,?,?), ref: 006B9016
                                                      • GetCursorPos.USER32(?), ref: 006B905E
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00677711,?,?,?), ref: 006B9094
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: f7e100b728a26ed0fe0848867e3433470655dc5360fbc59236901585f6cd79d3
                                                      • Instruction ID: 20c52258684904883cf544750acac0fb4229559d716bc28410aec17c73713ae7
                                                      • Opcode Fuzzy Hash: f7e100b728a26ed0fe0848867e3433470655dc5360fbc59236901585f6cd79d3
                                                      • Instruction Fuzzy Hash: 0B219F75600018EFCB299F94CC98EFA7BBBEB4A360F044159FA054B261C3719990DBB0
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,006BCB68), ref: 0068D2FB
                                                      • GetLastError.KERNEL32 ref: 0068D30A
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0068D319
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,006BCB68), ref: 0068D376
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: e512999c62b49eca5c85e935cf979a6d8fc891dd7bdb363dd11b28429a6038f1
                                                      • Instruction ID: 6937f051e28a97223aaada02fa73058d5010f46f8c4052cb8fb65b942ec3d98c
                                                      • Opcode Fuzzy Hash: e512999c62b49eca5c85e935cf979a6d8fc891dd7bdb363dd11b28429a6038f1
                                                      • Instruction Fuzzy Hash: 0A2180705046019FC710EF24D8814AEB7E5AE9A364F104B1DF499C72E1DB30DA46CBA7
                                                      APIs
                                                        • Part of subcall function 00681014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0068102A
                                                        • Part of subcall function 00681014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00681036
                                                        • Part of subcall function 00681014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00681045
                                                        • Part of subcall function 00681014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0068104C
                                                        • Part of subcall function 00681014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00681062
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006815BE
                                                      • _memcmp.LIBVCRUNTIME ref: 006815E1
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00681617
                                                      • HeapFree.KERNEL32(00000000), ref: 0068161E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: 4de8945a17c6fbd48c09a65d7a1ad425e10e9b3e1160d9641bf88bc640985c23
                                                      • Instruction ID: b40588b0f815f1fbad4ecd7f3ade79f4d68cc8d3473cbe1c0659e135acd3b6c5
                                                      • Opcode Fuzzy Hash: 4de8945a17c6fbd48c09a65d7a1ad425e10e9b3e1160d9641bf88bc640985c23
                                                      • Instruction Fuzzy Hash: F921AF71E00108EFDF10EFA4C945BEEB7BAFF45354F084659E441AB241E730AA86DBA0
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 006B280A
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 006B2824
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 006B2832
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 006B2840
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: f348d757e273bbfea26cf4ec2b07c65947bee203bdc67d914bc0130f4bd5495c
                                                      • Instruction ID: fb54b7553295980c502a3a7b5286b0601f3f647868ca4fdf8ea72b48e4ed32f7
                                                      • Opcode Fuzzy Hash: f348d757e273bbfea26cf4ec2b07c65947bee203bdc67d914bc0130f4bd5495c
                                                      • Instruction Fuzzy Hash: 63219071204512AFD7149B24C855FEA7B9AAF85324F148258F4268B6A2CB71FD82CB94
                                                      APIs
                                                        • Part of subcall function 00688D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0068790A,?,000000FF,?,00688754,00000000,?,0000001C,?,?), ref: 00688D8C
                                                        • Part of subcall function 00688D7D: lstrcpyW.KERNEL32(00000000,?,?,0068790A,?,000000FF,?,00688754,00000000,?,0000001C,?,?,00000000), ref: 00688DB2
                                                        • Part of subcall function 00688D7D: lstrcmpiW.KERNEL32(00000000,?,0068790A,?,000000FF,?,00688754,00000000,?,0000001C,?,?), ref: 00688DE3
                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00688754,00000000,?,0000001C,?,?,00000000), ref: 00687923
                                                      • lstrcpyW.KERNEL32(00000000,?,?,00688754,00000000,?,0000001C,?,?,00000000), ref: 00687949
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00688754,00000000,?,0000001C,?,?,00000000), ref: 00687984
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 0c573463099ea04aed4d0c4392c421a0564abcc80f2680c8a65400280557bf68
                                                      • Instruction ID: 042a4148287658f527405ac9f13e3fddd9132dbe8359c19619016c50b808364b
                                                      • Opcode Fuzzy Hash: 0c573463099ea04aed4d0c4392c421a0564abcc80f2680c8a65400280557bf68
                                                      • Instruction Fuzzy Hash: 7F11E43A200202AFCF15AF39C844DBA77AAEF55390B50412AF942C7364EF31D901C791
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006B7D0B
                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 006B7D2A
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 006B7D42
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0069B7AD,00000000), ref: 006B7D6B
                                                        • Part of subcall function 00639BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00639BB2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID:
                                                      • API String ID: 847901565-0
                                                      • Opcode ID: a5466d8b01854aafd0216a314f39e1533dc353baa123e374baa012e1cdbfafba
                                                      • Instruction ID: dbf155c2a7b4139475c8816082c42ad86a44ed07eac76bd7a24ee33b22c15bfa
                                                      • Opcode Fuzzy Hash: a5466d8b01854aafd0216a314f39e1533dc353baa123e374baa012e1cdbfafba
                                                      • Instruction Fuzzy Hash: 2C1163B15156159FCB109F28CC04AF63BA6AF863B0B155724F835DB2F0E7319991DB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 006B56BB
                                                      • _wcslen.LIBCMT ref: 006B56CD
                                                      • _wcslen.LIBCMT ref: 006B56D8
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 006B5816
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend_wcslen
                                                      • String ID:
                                                      • API String ID: 455545452-0
                                                      • Opcode ID: 31e53ba2930aff6976394822eff95f6d3eb9974c3ae7e64ee4a5cb19dc597583
                                                      • Instruction ID: 1ed5ada1badefa49168ed76d7df7ab2a98665ff4d8cfe9d17fcdec08824f0179
                                                      • Opcode Fuzzy Hash: 31e53ba2930aff6976394822eff95f6d3eb9974c3ae7e64ee4a5cb19dc597583
                                                      • Instruction Fuzzy Hash: AC11D6B1600618AADF209F61CC85BEE77ADEF11764F10412AF916D6182EB70CAC1CB64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fe2efbec583e81c9cf3a0b048fea5f776e46be1412e272d74ca1979fc1dbbea3
                                                      • Instruction ID: ddedd13516e222eafcdb13286d425a6d15ed9907e19d8f7261a18078dbfa36fb
                                                      • Opcode Fuzzy Hash: fe2efbec583e81c9cf3a0b048fea5f776e46be1412e272d74ca1979fc1dbbea3
                                                      • Instruction Fuzzy Hash: 0201A7B22096163EF76116786CC0FA7672FDF827BAF30132AFD31652D2DB608C484164
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00681A47
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00681A59
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00681A6F
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00681A8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 605053575ca9b7b53168eed3ee3dbee6987c5d8780374adf67c6a1d7cc0b3fcd
                                                      • Instruction ID: c40b6fa05efe66557952bdc6e7ccee495262c1d4028836333e4e00e67d14b36d
                                                      • Opcode Fuzzy Hash: 605053575ca9b7b53168eed3ee3dbee6987c5d8780374adf67c6a1d7cc0b3fcd
                                                      • Instruction Fuzzy Hash: F5113C7AD01219FFEB10DBA4CD85FADBB79EB08750F200191E610B7290D6716E51DB94
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 0068E1FD
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 0068E230
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0068E246
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0068E24D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 2880819207-0
                                                      • Opcode ID: ad536f59946537bf17ea7e299316387bbf6824b5ccf3c9e0f332af8569388fb9
                                                      • Instruction ID: 041e7863f48db79683aed8a92f0032b8a65502e42534fd27bf32e80758cb69f8
                                                      • Opcode Fuzzy Hash: ad536f59946537bf17ea7e299316387bbf6824b5ccf3c9e0f332af8569388fb9
                                                      • Instruction Fuzzy Hash: 041108B2D04214BBC701AFA89C15AAE7FAFAB46320F004325F914E3290D6B18A0087A0
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,?,0064CFF9,00000000,00000004,00000000), ref: 0064D218
                                                      • GetLastError.KERNEL32 ref: 0064D224
                                                      • __dosmaperr.LIBCMT ref: 0064D22B
                                                      • ResumeThread.KERNEL32(00000000), ref: 0064D249
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                      • String ID:
                                                      • API String ID: 173952441-0
                                                      • Opcode ID: 69ad5899257e598c679ad5df8c980307a65fc63e253d3dcd747b134882a4f305
                                                      • Instruction ID: f6018df3cfb9c5d5b060868152445be089d70f1eec46bbcb3b9fc09ea56a64ff
                                                      • Opcode Fuzzy Hash: 69ad5899257e598c679ad5df8c980307a65fc63e253d3dcd747b134882a4f305
                                                      • Instruction Fuzzy Hash: 5001D276C05214BBCB615BA5DC09BEF7AABDF81731F100319FA25922D0CBB0CA41C6A0
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0062604C
                                                      • GetStockObject.GDI32(00000011), ref: 00626060
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0062606A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CreateMessageObjectSendStockWindow
                                                      • String ID:
                                                      • API String ID: 3970641297-0
                                                      • Opcode ID: 46871881890922be2afa1695d8c37756ad2c43f97dc637d949dda1a6eda8e391
                                                      • Instruction ID: d7e69deb866486397b9b4b1e9466499ea6a31dd1ac72d71aded73a4d70abf8f9
                                                      • Opcode Fuzzy Hash: 46871881890922be2afa1695d8c37756ad2c43f97dc637d949dda1a6eda8e391
                                                      • Instruction Fuzzy Hash: D2118EB2101918BFEF124FA4DD54EEA7B6AEF093A4F001215FA0456110D7329CA0EFA0
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00643B56
                                                        • Part of subcall function 00643AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00643AD2
                                                        • Part of subcall function 00643AA3: ___AdjustPointer.LIBCMT ref: 00643AED
                                                      • _UnwindNestedFrames.LIBCMT ref: 00643B6B
                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00643B7C
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00643BA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                      • String ID:
                                                      • API String ID: 737400349-0
                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                      • Instruction ID: e3b94c24c39c775a2dc3420d625d5d651d79271d6a20c2e9d9bcbabff67480d7
                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                      • Instruction Fuzzy Hash: 9D014C32100148BBDF126E95CC42EEB3F6EEF58754F044018FE4896221C732E961DBA4
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,006213C6,00000000,00000000,?,0065301A,006213C6,00000000,00000000,00000000,?,0065328B,00000006,FlsSetValue), ref: 006530A5
                                                      • GetLastError.KERNEL32(?,0065301A,006213C6,00000000,00000000,00000000,?,0065328B,00000006,FlsSetValue,006C2290,FlsSetValue,00000000,00000364,?,00652E46), ref: 006530B1
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0065301A,006213C6,00000000,00000000,00000000,?,0065328B,00000006,FlsSetValue,006C2290,FlsSetValue,00000000), ref: 006530BF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 38924edc9b2263cc16545a961fa6341a519191560cb03cec50b76999b8a3bf2a
                                                      • Instruction ID: 1cf49a29fdb80913a1c086cb1721e63056a62218a00d5cc0296b65661947ff23
                                                      • Opcode Fuzzy Hash: 38924edc9b2263cc16545a961fa6341a519191560cb03cec50b76999b8a3bf2a
                                                      • Instruction Fuzzy Hash: 8801B172301332ABCB214A689C449A67B9AAB45FB2F100720FD05E7380C721DA4AC6E0
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0068747F
                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00687497
                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006874AC
                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006874CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                      • String ID:
                                                      • API String ID: 1352324309-0
                                                      • Opcode ID: 6ae170c7bf6f01c47af45351a7466c7b2734c206f213c1a8179b8e480cd8f0d5
                                                      • Instruction ID: 9bf182642261bb1d6b83ab9b7a012e518aa7a54bafe2a9bbba8942b2f58d67db
                                                      • Opcode Fuzzy Hash: 6ae170c7bf6f01c47af45351a7466c7b2734c206f213c1a8179b8e480cd8f0d5
                                                      • Instruction Fuzzy Hash: D611ADB1209314ABE720EF54DC08B927FFEEB40B10F208669E656D6191D7B0EA44DB60
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0068ACD3,?,00008000), ref: 0068B0C4
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0068ACD3,?,00008000), ref: 0068B0E9
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0068ACD3,?,00008000), ref: 0068B0F3
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0068ACD3,?,00008000), ref: 0068B126
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID:
                                                      • API String ID: 2875609808-0
                                                      • Opcode ID: c1eb79609fb80f9b190adcb14aafb91f461c8304bd9cccd60810807c35bf1206
                                                      • Instruction ID: 33feea6de6c961e6c142a585d933fc4202198e2a2baab7571d6314e1068e6827
                                                      • Opcode Fuzzy Hash: c1eb79609fb80f9b190adcb14aafb91f461c8304bd9cccd60810807c35bf1206
                                                      • Instruction Fuzzy Hash: 2F115E71C0151DD7CF00EFE8E9586EEBB79FF0A711F105296D981B6281CB3056518B51
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00682DC5
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00682DD6
                                                      • GetCurrentThreadId.KERNEL32 ref: 00682DDD
                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00682DE4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: aa21f06964023f23d62099f8bdaaefa8c46ad6fa7e73130fa3a9a015486836b0
                                                      • Instruction ID: 1295bd4681bc4f3212d0ee28bf954bc85b784abda42abf83cf55d5d9db6497f5
                                                      • Opcode Fuzzy Hash: aa21f06964023f23d62099f8bdaaefa8c46ad6fa7e73130fa3a9a015486836b0
                                                      • Instruction Fuzzy Hash: 47E092B25012247BD7202B729C0DFEB7F6EEF42BB1F001215F505D1080AAA0CA81D7B0
                                                      APIs
                                                        • Part of subcall function 00639639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00639693
                                                        • Part of subcall function 00639639: SelectObject.GDI32(?,00000000), ref: 006396A2
                                                        • Part of subcall function 00639639: BeginPath.GDI32(?), ref: 006396B9
                                                        • Part of subcall function 00639639: SelectObject.GDI32(?,00000000), ref: 006396E2
                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 006B8887
                                                      • LineTo.GDI32(?,?,?), ref: 006B8894
                                                      • EndPath.GDI32(?), ref: 006B88A4
                                                      • StrokePath.GDI32(?), ref: 006B88B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 39636de3643d3dbe85382679661fa6734f083cab1d6fa6f14b53f0835a1648d2
                                                      • Instruction ID: 64bfbd45871b21fd61da1171d84e495111db6741057ca5c92427b76fdeadb579
                                                      • Opcode Fuzzy Hash: 39636de3643d3dbe85382679661fa6734f083cab1d6fa6f14b53f0835a1648d2
                                                      • Instruction Fuzzy Hash: 02F05E76041259FBEB126F94AC0AFDE3F5BAF06320F048100FA11661E1C7B65691CFE9
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 006398CC
                                                      • SetTextColor.GDI32(?,?), ref: 006398D6
                                                      • SetBkMode.GDI32(?,00000001), ref: 006398E9
                                                      • GetStockObject.GDI32(00000005), ref: 006398F1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Color$ModeObjectStockText
                                                      • String ID:
                                                      • API String ID: 4037423528-0
                                                      • Opcode ID: 2d7ccd5935b5586d8c568db1734079f565615fdd9f758101fa33d8df73b21ce7
                                                      • Instruction ID: 2d35c05389b7133fd630df6a9552eb865c43096998dd81ab916e8e63e61f24a2
                                                      • Opcode Fuzzy Hash: 2d7ccd5935b5586d8c568db1734079f565615fdd9f758101fa33d8df73b21ce7
                                                      • Instruction Fuzzy Hash: 87E06571244240AADB215B7CAC09BD83F52AB12335F04C319F6F9581E1C77147909F20
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 00681634
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,006811D9), ref: 0068163B
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006811D9), ref: 00681648
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,006811D9), ref: 0068164F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: a10eb438e6f9669787e6ecb8c36b6bf8b1306c3a1f69228a00e123a81748df18
                                                      • Instruction ID: 45aeaef62c67d597a1939fef7cfc8b5342596b82c6068e0224d5c36e0747168c
                                                      • Opcode Fuzzy Hash: a10eb438e6f9669787e6ecb8c36b6bf8b1306c3a1f69228a00e123a81748df18
                                                      • Instruction Fuzzy Hash: A8E086B1601211DBD7302FA09D0DFC63B7EAF457A1F184918F285CD080E63446C1C760
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 0067D858
                                                      • GetDC.USER32(00000000), ref: 0067D862
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0067D882
                                                      • ReleaseDC.USER32(?), ref: 0067D8A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 7f9c957d30a532e04a830ebc533289f87e97cf941597eb92690c27ca340d3912
                                                      • Instruction ID: b96196b03783abbb17cf122f8bb9854ace1dd930797e17c6ad956ff73c71efee
                                                      • Opcode Fuzzy Hash: 7f9c957d30a532e04a830ebc533289f87e97cf941597eb92690c27ca340d3912
                                                      • Instruction Fuzzy Hash: E4E01AB4C00204EFCB51AFA4D908A6DBBB3FF48320F109509E806E7250D7384A82AF51
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 0067D86C
                                                      • GetDC.USER32(00000000), ref: 0067D876
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0067D882
                                                      • ReleaseDC.USER32(?), ref: 0067D8A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 5a3b3a027a2ef465346db6ec435fe3a2eba3644cffd119d054429149d892b1e4
                                                      • Instruction ID: 4bbac6564f293e4a1126380332bab1afecc18fe19396c9eb748585069181a506
                                                      • Opcode Fuzzy Hash: 5a3b3a027a2ef465346db6ec435fe3a2eba3644cffd119d054429149d892b1e4
                                                      • Instruction Fuzzy Hash: FDE01AB4C00204DFCB50AFA4D808A6DBBB2BB48320F109108E906E7250D7385A419F50
                                                      APIs
                                                        • Part of subcall function 00627620: _wcslen.LIBCMT ref: 00627625
                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00694ED4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Connection_wcslen
                                                      • String ID: *$LPT
                                                      • API String ID: 1725874428-3443410124
                                                      • Opcode ID: 6b1cffd001ede958995151d81b8366f79e120442094f673b536ac0eb5f5ff630
                                                      • Instruction ID: 84473c76ead62da4aae0608f7650c3bd316665553e4df2e459dcd3b73a9dfbe8
                                                      • Opcode Fuzzy Hash: 6b1cffd001ede958995151d81b8366f79e120442094f673b536ac0eb5f5ff630
                                                      • Instruction Fuzzy Hash: C9916275A002159FCB14DF58C484EAABBF6BF84304F15809DE40A9F762DB31ED86CB91
                                                      APIs
                                                      • CharUpperBuffW.USER32(0067569E,00000000,?,006BCC08,?,00000000,00000000), ref: 006A78DD
                                                        • Part of subcall function 00626B57: _wcslen.LIBCMT ref: 00626B6A
                                                      • CharUpperBuffW.USER32(0067569E,00000000,?,006BCC08,00000000,?,00000000,00000000), ref: 006A783B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper$_wcslen
                                                      • String ID: <sn
                                                      • API String ID: 3544283678-2083038092
                                                      • Opcode ID: a46c7ade6e524f62d8604b6d620be9ca9ba8e7750f73876a4b87f7da37d33c70
                                                      • Instruction ID: bca1aa2d5d99869a39152ee94930269b8c672b4f51b4b1f13749816d35bb66d3
                                                      • Opcode Fuzzy Hash: a46c7ade6e524f62d8604b6d620be9ca9ba8e7750f73876a4b87f7da37d33c70
                                                      • Instruction Fuzzy Hash: 75614B72914129AACF44FBA4DC91DFEB37ABF19300B44452AF542A3191EF345E45CFA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #
                                                      • API String ID: 0-1885708031
                                                      • Opcode ID: e751dc544ea726449692264f9d70fad1f4329e8faaefee48c5d4c2c96860bc34
                                                      • Instruction ID: b6f279967e49adc39bd38de846083eaf1413bc1ba9394519dbec8ca7acaabde8
                                                      • Opcode Fuzzy Hash: e751dc544ea726449692264f9d70fad1f4329e8faaefee48c5d4c2c96860bc34
                                                      • Instruction Fuzzy Hash: 1D513635500246DFDB19DF68C481AFA7BA6EF19310F248099F8559B3D0D7369E47CBA0
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 0063F2A2
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0063F2BB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: 31b7d5561ded50ea99780e6ad3f2e4f66984dfb02de924fdb9a1229eca0d291d
                                                      • Instruction ID: 658c1e5cab313e248dc857ad7eea7e3c436540aeb346f4d66e054552b79d3b30
                                                      • Opcode Fuzzy Hash: 31b7d5561ded50ea99780e6ad3f2e4f66984dfb02de924fdb9a1229eca0d291d
                                                      • Instruction Fuzzy Hash: 67515871408B449BD360AF50E886BAFBBF9FF84310F81885DF1D941195EB709529CB6B
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 006A57E0
                                                      • _wcslen.LIBCMT ref: 006A57EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper_wcslen
                                                      • String ID: CALLARGARRAY
                                                      • API String ID: 157775604-1150593374
                                                      • Opcode ID: d731459fa6cfb46502ed8e5d20b3f2cac4f48eb853c7fafa517f34e3be7a4531
                                                      • Instruction ID: c1c9ab46735f3fa9956d4ce241573d9da20af20ec7589a27cc168fa2e083af6a
                                                      • Opcode Fuzzy Hash: d731459fa6cfb46502ed8e5d20b3f2cac4f48eb853c7fafa517f34e3be7a4531
                                                      • Instruction Fuzzy Hash: 9A418E71A005199FCB14EFA8C8819EEBBB6FF5A320F14416DE506A7351E7349D81CFA4
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0069D130
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0069D13A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_wcslen
                                                      • String ID: |
                                                      • API String ID: 596671847-2343686810
                                                      • Opcode ID: b5bd6bd2bf8733ff37cb4e851450a91665d04c4679599d106969ae01f8991cc6
                                                      • Instruction ID: f91086d884efaff0506f684c65e59d07b2493cf368526e321fc82af97b18d5e2
                                                      • Opcode Fuzzy Hash: b5bd6bd2bf8733ff37cb4e851450a91665d04c4679599d106969ae01f8991cc6
                                                      • Instruction Fuzzy Hash: B5317E71C01219ABCF55EFA4DC85AEE7FBAFF04344F004029F815A6262DB31AA06DF64
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 006B3621
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 006B365C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: aa8c3df6e4a07609005931f8f7d9c32af89237a20e61c4218150f026fac2d482
                                                      • Instruction ID: 58e0bc0270e28521eb435487465718b70659b320379e66eb79a4a5cbc84abfeb
                                                      • Opcode Fuzzy Hash: aa8c3df6e4a07609005931f8f7d9c32af89237a20e61c4218150f026fac2d482
                                                      • Instruction Fuzzy Hash: E73192B1210614AEDB24DF68DC40EFB73AAFF48760F00961DF8A597280DA31AD81D764
                                                      APIs
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 006B461F
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006B4634
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: e0863e5ca6412a93cfc4d38823b7108301acadfa580c07b6d3011b21c3dcce58
                                                      • Instruction ID: 3baa98ace71f417a326ff5bc6e510b739b1bb2e3c688385f60745201cc0a3fad
                                                      • Opcode Fuzzy Hash: e0863e5ca6412a93cfc4d38823b7108301acadfa580c07b6d3011b21c3dcce58
                                                      • Instruction Fuzzy Hash: 38313CB5A017199FDF14CF69C990BDA7BB6FF09340F104069E904AB342EB70A981CF90
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 006B327C
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006B3287
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 660db99d4c37d771785b4a6850cae513be617b8043ac116b06e160a2ec398bd0
                                                      • Instruction ID: 012914c9e8b9e8c239cb2c70a949a478440bf584e781a986422c25ac9bf7eaa1
                                                      • Opcode Fuzzy Hash: 660db99d4c37d771785b4a6850cae513be617b8043ac116b06e160a2ec398bd0
                                                      • Instruction Fuzzy Hash: 9A11B2B13002187FEF219F94DC81EFB376BEB993A4F104228F91897391D6719E918760
                                                      APIs
                                                        • Part of subcall function 0062600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0062604C
                                                        • Part of subcall function 0062600E: GetStockObject.GDI32(00000011), ref: 00626060
                                                        • Part of subcall function 0062600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0062606A
                                                      • GetWindowRect.USER32(00000000,?), ref: 006B377A
                                                      • GetSysColor.USER32(00000012), ref: 006B3794
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: 65a6e3f712bc811f2206cd8c493144f60d6f5ffe6d14408469935acf46b33a97
                                                      • Instruction ID: cdf71d13af222d6c3a12a3532d6789b9b970c828d4ab3a78d7ed94f4400f026f
                                                      • Opcode Fuzzy Hash: 65a6e3f712bc811f2206cd8c493144f60d6f5ffe6d14408469935acf46b33a97
                                                      • Instruction Fuzzy Hash: 151129B2610219AFDB00DFA8CC45EEA7BB9EB09354F005624F955E3250EB35E991DB60
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0069CD7D
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0069CDA6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: cd5a24c2fbfbc2e22020d6f9b2b8efaae52655ebcb68ea497f395fc4fceb44e7
                                                      • Instruction ID: 4ce2fc52eafd85d176850803b1c8333a9c294e34596fd8f1cf03d0f18e49ed74
                                                      • Opcode Fuzzy Hash: cd5a24c2fbfbc2e22020d6f9b2b8efaae52655ebcb68ea497f395fc4fceb44e7
                                                      • Instruction Fuzzy Hash: 2611C2B1205631BADB384B668C49EE7BEAEEF527B4F00423AB10983580D7709949D6F0
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 006B34AB
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006B34BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: 2866afa9ea5ef7110dcd5985bcc6418a15a4bd87163983a6ca11b3a711f398fb
                                                      • Instruction ID: 9d04270ad70e0bd07794f4abbe8b149274a9763dcd492c2b4bc92673d7ee708e
                                                      • Opcode Fuzzy Hash: 2866afa9ea5ef7110dcd5985bcc6418a15a4bd87163983a6ca11b3a711f398fb
                                                      • Instruction Fuzzy Hash: C2116AB1200218ABEB228E68DC44AEB37ABEB05374F504324F961973E0C771DD919B60
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00686CB6
                                                      • _wcslen.LIBCMT ref: 00686CC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: STOP
                                                      • API String ID: 1256254125-2411985666
                                                      • Opcode ID: b336fd1d374d938a6e2903cde45facc8c9fe1ea19df61caf5d1617680eafa795
                                                      • Instruction ID: 14ed1304d4ffbf55c5288c6742cc6860d54f5f3136492afcb9ea08b860eac53e
                                                      • Opcode Fuzzy Hash: b336fd1d374d938a6e2903cde45facc8c9fe1ea19df61caf5d1617680eafa795
                                                      • Instruction Fuzzy Hash: E601A1326105268BCB21AEBDDC819FF77A7AF61710B100628F85296290EA71D9418B50
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 00683CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00683CCA
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00681D4C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 1fd19f79eca8ccc3cfa4625e7d2295bc5b6e4d90678acff1ed500d6f819240b2
                                                      • Instruction ID: 80cbd0ac86497a0e5d1beadefef84d02db3fbbded056906f904eea02ad01ea32
                                                      • Opcode Fuzzy Hash: 1fd19f79eca8ccc3cfa4625e7d2295bc5b6e4d90678acff1ed500d6f819240b2
                                                      • Instruction Fuzzy Hash: 9F01B575601228ABCB18FBA4DD51DFE736AFF47350F040B1DA8226B3C1EA3059098B60
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 00683CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00683CCA
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00681C46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 91a8c5d8b6b4b5c5f65edb9b011f3536ccde605388423ef0260df97ef8c9b5c6
                                                      • Instruction ID: 261b764114009994c98989f7b917c1e62ab8059ecc4a3d328857c3e7e5782494
                                                      • Opcode Fuzzy Hash: 91a8c5d8b6b4b5c5f65edb9b011f3536ccde605388423ef0260df97ef8c9b5c6
                                                      • Instruction Fuzzy Hash: 0601A7B5B8111867CB08FB90DA61DFF77AEAB56340F14011DA40677281EA249F0987B5
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 00683CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00683CCA
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00681CC8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: e6e3c2cf3961bf7fff4bad7ce237f8c83cb9ee6133e13943b5858352270246ea
                                                      • Instruction ID: 5999ac82e2c33b924074d47a852ee2fa4fb4e3b97a588a3291e8141480311ac4
                                                      • Opcode Fuzzy Hash: e6e3c2cf3961bf7fff4bad7ce237f8c83cb9ee6133e13943b5858352270246ea
                                                      • Instruction Fuzzy Hash: 1401F9B5B8122867CB04FBA1DB11EFF73AEAB12380F140119B80277381EA649F09C775
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0063A529
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer_wcslen
                                                      • String ID: ,%o$3yg
                                                      • API String ID: 2551934079-4247039339
                                                      • Opcode ID: 569406581b4ee971bfce4023255e5d0671de3223c304d11aca10dd752702b5bf
                                                      • Instruction ID: 186c5d88d56db23f445fed11adb2657fd1b10e8cdd44b119f47c8b02c233699d
                                                      • Opcode Fuzzy Hash: 569406581b4ee971bfce4023255e5d0671de3223c304d11aca10dd752702b5bf
                                                      • Instruction Fuzzy Hash: 0C01F77170062557D604F7A8EC27AAD37A79B45720F50002CF641572C3DE609D019EEB
                                                      APIs
                                                        • Part of subcall function 00629CB3: _wcslen.LIBCMT ref: 00629CBD
                                                        • Part of subcall function 00683CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00683CCA
                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00681DD3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: ecfa1340303e73d9dd4a6493aaf0b4f3b330effb99c97736af13a8b9e94deab3
                                                      • Instruction ID: 51af893a0cb98350a814a05d6de8799d8abce536d3b9fa13c1b6cc85af00502b
                                                      • Opcode Fuzzy Hash: ecfa1340303e73d9dd4a6493aaf0b4f3b330effb99c97736af13a8b9e94deab3
                                                      • Instruction Fuzzy Hash: 44F0A471B4162867DB08F7A4DD62FFE777EAF42750F040A19B822773C1EA605A098B74
                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006F3018,006F305C), ref: 006B81BF
                                                      • CloseHandle.KERNEL32 ref: 006B81D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: \0o
                                                      • API String ID: 3712363035-2561426684
                                                      • Opcode ID: a851f5a106561afba76866a601397a41356122219aae98ad42cbbc7e135684dc
                                                      • Instruction ID: 93597fc3396dc26d8088d9ccfbfa8e5d53f368157fb182ec1df16add2239d676
                                                      • Opcode Fuzzy Hash: a851f5a106561afba76866a601397a41356122219aae98ad42cbbc7e135684dc
                                                      • Instruction Fuzzy Hash: C4F089F1640324BFE3506B65AC45FB73A5EEB04754F401426BB08D62A2DA768F40C3F8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: 3, 3, 16, 1
                                                      • API String ID: 176396367-3042988571
                                                      • Opcode ID: 99beeb94b5d6efb22bba365f1436108586ae91e00cbc3b96bdb6438edf93aa0f
                                                      • Instruction ID: 1317c762b4308e8bac51bdcc67fde4c07c1fbb27696c2d8e9e2614e0dd39fac9
                                                      • Opcode Fuzzy Hash: 99beeb94b5d6efb22bba365f1436108586ae91e00cbc3b96bdb6438edf93aa0f
                                                      • Instruction Fuzzy Hash: C9E0E502215220109371226A9CC2ABF57CBCFCA750710282EF981C2266EE949D92A3A4
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00680B23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 2030045667-4017498283
                                                      • Opcode ID: 92e135ed369b388264a838e43f9e1d007a57d774582283546559708769a427f1
                                                      • Instruction ID: 9e59536fb5f1d967c0015b93277cfd0ebaa04a107d4957f3a41ea7178b02de5b
                                                      • Opcode Fuzzy Hash: 92e135ed369b388264a838e43f9e1d007a57d774582283546559708769a427f1
                                                      • Instruction Fuzzy Hash: F9E0487224535837E2543B95BC07FC97B878F05B65F10042EFB58555C38EE2659047ED
                                                      APIs
                                                        • Part of subcall function 0063F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00640D71,?,?,?,0062100A), ref: 0063F7CE
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,0062100A), ref: 00640D75
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0062100A), ref: 00640D84
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00640D7F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 55579361-631824599
                                                      • Opcode ID: 2935dc0e2469bb91603c9e8aa34f5331ca07a6190e9e19807dcfe8cd273f5b5d
                                                      • Instruction ID: d170401d5b192ff2b864dc3f40d5f9d538f4f26bccf15e13f66a999c7ef591d2
                                                      • Opcode Fuzzy Hash: 2935dc0e2469bb91603c9e8aa34f5331ca07a6190e9e19807dcfe8cd273f5b5d
                                                      • Instruction Fuzzy Hash: 54E092B06007218BE3709FBCE8047927FE3BF04740F004A2DE582C6661DBB5E588CBA1
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0063E3D5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: 0%o$8%o
                                                      • API String ID: 1385522511-1239035482
                                                      • Opcode ID: 44ee4f4cc8ca3f750e07368b6a97d57456181fb6d44cfe2e2b8e4284527a01f6
                                                      • Instruction ID: 3a7ef9eaa102bf3df5ec9042fa8409a1d5598fe4cd41c68311e6f373cf83c416
                                                      • Opcode Fuzzy Hash: 44ee4f4cc8ca3f750e07368b6a97d57456181fb6d44cfe2e2b8e4284527a01f6
                                                      • Instruction Fuzzy Hash: 25E08635554926CBEB049B18B876AA93357FF05320F502169E6128B2D19B722C45CEA9
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0069302F
                                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00693044
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: Temp$FileNamePath
                                                      • String ID: aut
                                                      • API String ID: 3285503233-3010740371
                                                      • Opcode ID: ef94fa5d14e07aeab810edcab6fc068ab64df7e6d3ce7606b63810bed5511e61
                                                      • Instruction ID: 38be48d9c364a027e1cfc61269f5f4c3365ca158108fe5205f12aa0584cb82bd
                                                      • Opcode Fuzzy Hash: ef94fa5d14e07aeab810edcab6fc068ab64df7e6d3ce7606b63810bed5511e61
                                                      • Instruction Fuzzy Hash: 14D05BB150031467DB2097959C0DFC73A6CD704760F0002617755D2091DAB09784CBD0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: %.3d$X64
                                                      • API String ID: 481472006-1077770165
                                                      • Opcode ID: 1683bb08c50984f0c3fd974df12d6b49b153fcc398d271fb21f2a38b72ebdd7d
                                                      • Instruction ID: e33cb8b29c16c63350f056966b1ee268427a42718266abd69265eafd30cdb78a
                                                      • Opcode Fuzzy Hash: 1683bb08c50984f0c3fd974df12d6b49b153fcc398d271fb21f2a38b72ebdd7d
                                                      • Instruction Fuzzy Hash: 86D012A1C09108FACB9097D0DC458B9B37EAF18301F50C852FA1AA1041D634C74B6761
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006B236C
                                                      • PostMessageW.USER32(00000000), ref: 006B2373
                                                        • Part of subcall function 0068E97B: Sleep.KERNEL32 ref: 0068E9F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: e603af771ad4c78454450e1bf35d8e1bbed73bf06186b70d0a2f2d7369b4cd19
                                                      • Instruction ID: da7c8bceb3ecf16e6a0984d49e62a2fad40ba2e557243f9933c5a85db0491fbc
                                                      • Opcode Fuzzy Hash: e603af771ad4c78454450e1bf35d8e1bbed73bf06186b70d0a2f2d7369b4cd19
                                                      • Instruction Fuzzy Hash: 77D0A9723C13007AEAA4B730DC0FFC666169B04B20F000A06B281AA0D0D8E0A8808A08
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006B232C
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 006B233F
                                                        • Part of subcall function 0068E97B: Sleep.KERNEL32 ref: 0068E9F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2186022735.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2185993705.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2186260098.00000000006E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188580838.00000000006EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.00000000006F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2188600062.0000000000727000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_NEWORDER.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 895d51e9d2f81c7ffa2bf10ae698e5fd2305ba2f99f18288766d3801aa8ef4f5
                                                      • Instruction ID: 592b4241fe6486f2110be89ec36796c8689e90079f95f9bf4a8e988f58803f4c
                                                      • Opcode Fuzzy Hash: 895d51e9d2f81c7ffa2bf10ae698e5fd2305ba2f99f18288766d3801aa8ef4f5
                                                      • Instruction Fuzzy Hash: 62D0A972390300B6EAA4B730DC0FFD66A169B00B20F000A06B285AA0D0D8E0A8808A04