Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rOrderRequest09-24.exe

Overview

General Information

Sample name:rOrderRequest09-24.exe
Analysis ID:1518168
MD5:3e322cacdbc509091f2950c4e04ff85f
SHA1:d4eab59133e0f767f7c954ee11599d7c8fdffafc
SHA256:9e783a78671bd03144b0def1540d93a92dbb8fcdd5a75bfa26a1d11e6c613bff
Tags:AgentTeslaexeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • rOrderRequest09-24.exe (PID: 7780 cmdline: "C:\Users\user\Desktop\rOrderRequest09-24.exe" MD5: 3E322CACDBC509091F2950C4E04FF85F)
    • RegSvcs.exe (PID: 7960 cmdline: "C:\Users\user\Desktop\rOrderRequest09-24.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.agaliofu.top", "Username": "egooyibo@agaliofu.top", "Password": "QPS.6YYl.Yi=                          "}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2511992775.0000000002983000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.2511992775.0000000002957000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.2509888429.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.1279971744.0000000003D60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000005.00000002.2511992775.0000000002901000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            5.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.rOrderRequest09-24.exe.3d60000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 194.36.191.196, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7960, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49704
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: rOrderRequest09-24.exeAvira: detected
                  Source: 5.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.agaliofu.top", "Username": "egooyibo@agaliofu.top", "Password": "QPS.6YYl.Yi= "}
                  Source: rOrderRequest09-24.exeReversingLabs: Detection: 78%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: rOrderRequest09-24.exeJoe Sandbox ML: detected
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Yandex Browser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Yandex\YandexBrowser\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Iridium Browser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Iridium\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Chromium
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Chromium\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 7Star
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 7Star\7Star\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Torch Browser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Torch\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Cool Novo
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: MapleStudio\ChromePlus\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Kometa
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Kometa\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Amigo
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Amigo\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Brave
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: BraveSoftware\Brave-Browser\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: CentBrowser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: CentBrowser\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Chedot
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Chedot\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Orbitum
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Orbitum\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Sputnik
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Sputnik\Sputnik\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Comodo Dragon
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Comodo\Dragon\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Vivaldi
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Vivaldi\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Citrio
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: CatalinaGroup\Citrio\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 360 Browser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 360Chrome\Chrome\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Uran
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: uCozMedia\Uran\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Liebao Browser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: liebao\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Elements Browser
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Elements Browser\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Epic Privacy
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Epic Privacy Browser\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Coccoc
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: CocCoc\Browser\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Sleipnir 6
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: QIP Surf
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: QIP Surf\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Coowon
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Coowon\Coowon\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Chrome
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Google\Chrome\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Edge Chromium
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Microsoft\Edge\User Data
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Firefox
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Mozilla\Firefox\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SeaMonkey
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Mozilla\SeaMonkey\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Thunderbird
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Thunderbird\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: BlackHawk
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \NETGATE Technologies\BlackHawk\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: CyberFox
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \8pecxstudios\Cyberfox\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: K-Meleon
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \K-Meleon\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: IceCat
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Mozilla\icecat\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: PaleMoon
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Moonchild Productions\Pale Moon\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: IceDragon
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Comodo\IceDragon\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: WaterFox
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Waterfox\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Postbox
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Postbox\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Flock
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Flock\Browser\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: true
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: APPDATA
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 00061561
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Berkelet DB
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 00000002
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 1.85 (Hash, version 2, native byte-order)
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Unknow database format
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SQLite format 3
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: table
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: UNIQUE
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SEQUENCE {
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {0:X2}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {0:X2}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {0:X2}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Windows Credential
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: credential
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: policy
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: blob
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: chrome
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {{{0}}}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: chrome
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {{{0}}}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: sha512
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: sha512
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ObjectLength
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ChainingModeGCM
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: AuthTagLength
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ChainingMode
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: KeyDataBlob
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Microsoft Primitive Provider
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: :Zone.Identifier
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SystemDrive
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {0:X2}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SELECT * FROM Win32_Processor
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Name
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: .tmp
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: None
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: win32_processor
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: processorID
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 39b6a7c8-57aa-4217-8010-6d31cf8ae5fd
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Win32_NetworkAdapterConfiguration
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: IPEnabled
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: MacAddress
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: 2b659ec0-5f97-4701-9f8d-29845a00e324
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Win32_BaseBoard
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SerialNumber
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: dab83869-5263-4922-818e-93628a526011
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: .html
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: text/html
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: .html
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {0}:
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: StorageSize: {0} (0x{0:X})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Version: 0x{0:X}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: FormatID: {0}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the SerializedPropertyStorage is less than 28 ({0})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the SerializedPropertyStore is less than {0} ({1})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Version is not equal to {0} ({1})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: {D5CDD505-2E9C-101B-9397-08002B2CF9AE}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Type: {0}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Value: {0}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ValueSize: {0} (0x{0:X})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: NameSize: {0} (0x{0:X})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Name: {0}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the StringName is less than 9 ({0})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the StringName is not equal to {0} ({1})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the NameSize is not equal to {0} ({1})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ValueSize: {0} (0x{0:X})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ID: 0x{0:X}
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the StringName is less than 9 ({0})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the StringName is not equal to {0} ({1})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the SerializedPropertyStore is less than 8 ({0})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Size of the SerializedPropertyStore is less than {0} ({1})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: StoreSize: {0} (0x{0X})
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Device\LanmanRedirector\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: \Device\LanmanRedirector\
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: Failed to retrieve system handle information.
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ()^G.
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: YsSY
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: XRxX
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: XXxX
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ccccCicb
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: ?=__
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: XRxX
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: SYX|qYYYIyYYYYyY
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: X\xX
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: X^xX
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: XPxX
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: *SY[pqXY
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: BBMbB
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: '''''?'''"
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpackString decryptor: T:T5
                  Source: rOrderRequest09-24.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: rOrderRequest09-24.exe, 00000000.00000003.1267487489.0000000004590000.00000004.00001000.00020000.00000000.sdmp, rOrderRequest09-24.exe, 00000000.00000003.1267135903.00000000043F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: rOrderRequest09-24.exe, 00000000.00000003.1267487489.0000000004590000.00000004.00001000.00020000.00000000.sdmp, rOrderRequest09-24.exe, 00000000.00000003.1267135903.00000000043F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BCC2A2 FindFirstFileExW,0_2_00BCC2A2
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C068EE FindFirstFileW,FindClose,0_2_00C068EE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00C0698F
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BFD076
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BFD3A9
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C09642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C09642
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C0979D
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BFDBBE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C09B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00C09B2B
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C05C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00C05C97
                  Source: global trafficTCP traffic: 192.168.2.10:49704 -> 194.36.191.196:587
                  Source: Joe Sandbox ViewIP Address: 194.36.191.196 194.36.191.196
                  Source: Joe Sandbox ViewIP Address: 194.36.191.196 194.36.191.196
                  Source: Joe Sandbox ViewASN Name: HSAE HSAE
                  Source: global trafficTCP traffic: 192.168.2.10:49704 -> 194.36.191.196:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00C0CE44
                  Source: global trafficDNS traffic detected: DNS query: mail.agaliofu.top
                  Source: RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://agaliofu.top
                  Source: RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.agaliofu.top
                  Source: RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                  Source: RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, SoC.cs.Net Code: _0PCB6lvQ5rw
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C0EAFF
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00C0ED6A
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C0EAFF
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00BFAA57
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C29576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00C29576

                  System Summary

                  barindex
                  Source: rOrderRequest09-24.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: rOrderRequest09-24.exe, 00000000.00000000.1258221066.0000000000C52000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_70c505a8-9
                  Source: rOrderRequest09-24.exe, 00000000.00000000.1258221066.0000000000C52000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_85d05581-8
                  Source: rOrderRequest09-24.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_690dfdc4-2
                  Source: rOrderRequest09-24.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_33d6ab72-2
                  Source: initial sampleStatic PE information: Filename: rOrderRequest09-24.exe
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00BFD5EB
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00BF1201
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00BFE8F6
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C020460_2_00C02046
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B980600_2_00B98060
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF82980_2_00BF8298
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BCE4FF0_2_00BCE4FF
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BC676B0_2_00BC676B
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C248730_2_00C24873
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BBCAA00_2_00BBCAA0
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B9CAF00_2_00B9CAF0
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BACC390_2_00BACC39
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BC6DD90_2_00BC6DD9
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B991C00_2_00B991C0
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BAB1190_2_00BAB119
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB13940_2_00BB1394
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB17060_2_00BB1706
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB781B0_2_00BB781B
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB19B00_2_00BB19B0
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B979200_2_00B97920
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BA997D0_2_00BA997D
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB7A4A0_2_00BB7A4A
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB7CA70_2_00BB7CA7
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB1C770_2_00BB1C77
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BC9EEE0_2_00BC9EEE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C1BE440_2_00C1BE44
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB1F320_2_00BB1F32
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_03F756700_2_03F75670
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00D342505_2_00D34250
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00D3A4305_2_00D3A430
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00D3F9C85_2_00D3F9C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00D3AC485_2_00D3AC48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00D34E685_2_00D34E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00D345985_2_00D34598
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C957905_2_05C95790
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C981605_2_05C98160
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C968105_2_05C96810
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C923705_2_05C92370
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C9BB085_2_05C9BB08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C95EE85_2_05C95EE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C9F1305_2_05C9F130
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05C900405_2_05C90040
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: String function: 00B99CB3 appears 31 times
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: String function: 00BAF9F2 appears 40 times
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: String function: 00BB0A30 appears 46 times
                  Source: rOrderRequest09-24.exe, 00000000.00000003.1272451924.0000000004563000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rOrderRequest09-24.exe
                  Source: rOrderRequest09-24.exe, 00000000.00000003.1266493605.00000000046BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rOrderRequest09-24.exe
                  Source: rOrderRequest09-24.exe, 00000000.00000002.1279971744.0000000003D60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename667ba23f-a209-46d6-8a32-7e551fe203f6.exe4 vs rOrderRequest09-24.exe
                  Source: rOrderRequest09-24.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, 3SHNS.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, Nsobj.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, kPjPB5Pg.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, L0cY6BffcK.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, U25VpnZdCi.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, 8Po0IVbA.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, En337tp.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, En337tp.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, F1ul27ct.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, F1ul27ct.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, F1ul27ct.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, F1ul27ct.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C037B5 GetLastError,FormatMessageW,0_2_00C037B5
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF10BF AdjustTokenPrivileges,CloseHandle,0_2_00BF10BF
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00BF16C3
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00C051CD
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C1A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00C1A67C
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00C0648E
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B942A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeFile created: C:\Users\user\AppData\Local\Temp\whereforeJump to behavior
                  Source: rOrderRequest09-24.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: rOrderRequest09-24.exeReversingLabs: Detection: 78%
                  Source: unknownProcess created: C:\Users\user\Desktop\rOrderRequest09-24.exe "C:\Users\user\Desktop\rOrderRequest09-24.exe"
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rOrderRequest09-24.exe"
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rOrderRequest09-24.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: rOrderRequest09-24.exeStatic file information: File size 1597952 > 1048576
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: rOrderRequest09-24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: rOrderRequest09-24.exe, 00000000.00000003.1267487489.0000000004590000.00000004.00001000.00020000.00000000.sdmp, rOrderRequest09-24.exe, 00000000.00000003.1267135903.00000000043F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: rOrderRequest09-24.exe, 00000000.00000003.1267487489.0000000004590000.00000004.00001000.00020000.00000000.sdmp, rOrderRequest09-24.exe, 00000000.00000003.1267135903.00000000043F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: rOrderRequest09-24.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: rOrderRequest09-24.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: rOrderRequest09-24.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: rOrderRequest09-24.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: rOrderRequest09-24.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B942DE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB0A76 push ecx; ret 0_2_00BB0A89
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BAF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00BAF98E
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C21C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00C21C41
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98809
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeAPI/Special instruction interceptor: Address: 3F75294
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7564Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1795Jump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeAPI coverage: 3.5 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BCC2A2 FindFirstFileExW,0_2_00BCC2A2
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C068EE FindFirstFileW,FindClose,0_2_00C068EE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00C0698F
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BFD076
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BFD3A9
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C09642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C09642
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C0979D
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BFDBBE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C09B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00C09B2B
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C05C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00C05C97
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B942DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99219Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98344Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97797Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97578Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95060Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlleExtKKG
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C0EAA2 BlockInput,0_2_00C0EAA2
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BC2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BC2622
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B942DE
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB4CE8 mov eax, dword ptr fs:[00000030h]0_2_00BB4CE8
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_03F75560 mov eax, dword ptr fs:[00000030h]0_2_03F75560
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_03F75500 mov eax, dword ptr fs:[00000030h]0_2_03F75500
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_03F73EC0 mov eax, dword ptr fs:[00000030h]0_2_03F73EC0
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00BF0B62
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BC2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BC2622
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BB083F
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB09D5 SetUnhandledExceptionFilter,0_2_00BB09D5
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BB0C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 73C008Jump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00BF1201
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BD2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00BD2BA5
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BFB226 SendInput,keybd_event,0_2_00BFB226
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00C122DA
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rOrderRequest09-24.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00BF0B62
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BF1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00BF1663
                  Source: rOrderRequest09-24.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: rOrderRequest09-24.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BB0698 cpuid 0_2_00BB0698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C08195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00C08195
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BED27A GetUserNameW,0_2_00BED27A
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00BCB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00BCB952
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00B942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B942DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002983000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002957000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7960, type: MEMORYSTR
                  Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.2509888429.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1279971744.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: rOrderRequest09-24.exeBinary or memory string: WIN_81
                  Source: rOrderRequest09-24.exeBinary or memory string: WIN_XP
                  Source: rOrderRequest09-24.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: rOrderRequest09-24.exeBinary or memory string: WIN_XPe
                  Source: rOrderRequest09-24.exeBinary or memory string: WIN_VISTA
                  Source: rOrderRequest09-24.exeBinary or memory string: WIN_7
                  Source: rOrderRequest09-24.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7960, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002983000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002957000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2511992775.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7960, type: MEMORYSTR
                  Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rOrderRequest09-24.exe.3d60000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rOrderRequest09-24.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.2509888429.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1279971744.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C11204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00C11204
                  Source: C:\Users\user\Desktop\rOrderRequest09-24.exeCode function: 0_2_00C11806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00C11806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets331
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials221
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  rOrderRequest09-24.exe79%ReversingLabsWin32.Spyware.Negasteal
                  rOrderRequest09-24.exe100%AviraDR/AutoIt.Gen8
                  rOrderRequest09-24.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://x1.c.lencr.org/00%URL Reputationsafe
                  http://x1.i.lencr.org/00%URL Reputationsafe
                  http://r10.o.lencr.org0#0%Avira URL Cloudsafe
                  http://r10.i.lencr.org/00%Avira URL Cloudsafe
                  http://agaliofu.top0%Avira URL Cloudsafe
                  http://mail.agaliofu.top0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  agaliofu.top
                  194.36.191.196
                  truetrue
                    unknown
                    mail.agaliofu.top
                    unknown
                    unknowntrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://r10.o.lencr.org0#RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://mail.agaliofu.topRegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://x1.c.lencr.org/0RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://agaliofu.topRegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r10.i.lencr.org/0RegSvcs.exe, 00000005.00000002.2511992775.0000000002961000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2510548933.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005B80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2514118435.0000000005BCF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      194.36.191.196
                      agaliofu.topNetherlands
                      60117HSAEtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1518168
                      Start date and time:2024-09-25 13:45:11 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 3s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:rOrderRequest09-24.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 43
                      • Number of non-executed functions: 301
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: rOrderRequest09-24.exe
                      TimeTypeDescription
                      07:46:06API Interceptor46x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      194.36.191.196http://theclearinghouseus.orgGet hashmaliciousUnknownBrowse
                      • theclearinghouseus.org/www.theclearinghouse.org/connected-banking.html
                      gqtya.ps1Get hashmaliciousUnknownBrowse
                      • udr-offdips.com/buy/
                      http://store.avast.com/store?SiteID=avast&Action=DisplayRedirectCustomPage&Locale=en_US&v=1&t=event&tid=UA-58120669-65&cid=725399894.1568213989&ec=Emailing_Digital%20River&aip=1&cm10=1&ds=Avast&ul=en_US&cs=Digital%20River&cm=email&cd2=Paid&cd3=725399894.1568213989&cd4=Business&cd5=BMG-00-001-36-AR&cd7=13306019910&cd6=22895593139&cd8=0&cd9=4871168000&cd10=USD&cd11=44&cd12=1659005853297&ea=Click&el=http://0gjysc.wildlifewalkabout.com/am9lbC5uYXNzaWZAYXJuLmFlGet hashmaliciousUnknownBrowse
                      • 0gjysc.wildlifewalkabout.com/am9lbC5uYXNzaWZAYXJuLmFl
                      #U6025-146102220896 BSIU2505935-Remitance Advise.xlsxGet hashmaliciousFormBookBrowse
                      • www.firstflightmdelivery.services/inug/?LJBd06wP=my5vzthd/gf6h+YfXGHF51EmCUBukXLQvdzfbkPp7mscRjHMsb7qcEfg2/kZIm7kG7WZ0g==&-ZcxnF=8p74g4BxA
                      jun.exeGet hashmaliciousAZORultBrowse
                      • squerad.com/cgi-sys/suspendedpage.cgi
                      Player offer.exeGet hashmaliciousAZORultBrowse
                      • squerad.com/frank/index.php
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      HSAEOrdine Request 09-24.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      gtss.exeGet hashmaliciousUnknownBrowse
                      • 194.36.188.9
                      gtss.exeGet hashmaliciousUnknownBrowse
                      • 194.36.188.9
                      gtsx.exeGet hashmaliciousUnknownBrowse
                      • 194.36.188.9
                      Document (6) lnk.lnkGet hashmaliciousUnknownBrowse
                      • 185.198.59.26
                      Document (5) lnk.lnkGet hashmaliciousUnknownBrowse
                      • 185.244.151.84
                      Ordem de Compra.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                      • 185.244.151.84
                      zte.arm7.elfGet hashmaliciousUnknownBrowse
                      • 185.106.123.68
                      New Order List 2024.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      No context
                      No context
                      Process:C:\Users\user\Desktop\rOrderRequest09-24.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):244224
                      Entropy (8bit):6.99267268605852
                      Encrypted:false
                      SSDEEP:3072:YwVKA8n67ZGCmn1/oiHszSoRWu1SPVooQ9d1LhgfVZdUKCYB5+7rt7jCOs0qwKvW:pNY/oLzJ9i6oUdrguFa9wKvLYf8e
                      MD5:A55426467B44A6A470694D0FDC95EAC0
                      SHA1:5551150B089B3226B5EBEAC084EE91435D982535
                      SHA-256:4B3E578D45C6C0E4275D9E1E50CC334622B1C2D26185D07FD59941B86EB61ED1
                      SHA-512:F883890B3301D3CB2ADE943B365F40C9BCF3B91E2EF7AAFD991A9544F8AAAE474740A1AAF59E0D8D332B2DD2832C1637060D957B4DC1074E894B5B3278A9C4F2
                      Malicious:false
                      Reputation:low
                      Preview:...479N6=DTO.YQ.W7JL2GP.E449N69DTO0RYQ3W7JL2GPQE449N69DTO0R.Q3W9U.<G.X...8....<&Cr)#\0E+!.$1?+[@.,S.6!!.;7qw.dj!]#5.H9>.N69DTO0..Q3.6IL{.5E449N69D.O2SRP.W7.O2GXQE449N8.GTO.RYQ.T7JLrGPqE44;N6=DTO0RYQ7W7JL2GPQe049L69DTO0PY..W7ZL2WPQE4$9N&9DTO0RIQ3W7JL2GPQE..:Ne9DTO.QY.6W7JL2GPQE449N69DTO0R]Q?W7JL2GPQE449N69DTO0RYQ3W7JL2GPQE449N69DTO0RYQ3W7JL2GpQE<49N69DTO0RYY.W7.L2GPQE449N6.017DRYQ'.4JL.GPQ.749L69DTO0RYQ3W7JL.GP1kFGK-69D.J0RY.0W7LL2G.RE449N69DTO0RY.3Wwd>W+?2E489N69DPO0PYQ3.4JL2GPQE449N69.TOrRYQ3W7JL2GPQE449..:DTO0R.Q3W5JI2.SE$.9N59DTN0R_Q3W7JL2GPQE449N69DTO0RYQ3W7JL2GPQE449N69DTO0RYQ3J.....o.I.3,1.b.(.Q.. .3.}H.D.O ..}.I....vFQ..L.H`...=....1.G5+X.....tRL!_-gC.AW.Y..l.dpG.|.J\.*..J..X?`.f...w....=3....@..UV)z.@"54..V,-@..S.549N6.......Z/|.a1HNeWLb....pF7f...)7JLVGPQ7449/69D.O0R6Q3WYJL29PQEJ49Np9DT.0RYf3W7oL2G=QE4.9N6GDTO./V^...#?..PQE44.....9.......zC...'...R....5..^[.@..u.._.._u.!k/Rl~.^P5S2HK6D\lK.....;@PJ2U]R?j9...q.c.....5....#.OW7JL2G.QE.49N..D.O0R.Q.W..L2G.E.4.N...T
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.375245100296791
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:rOrderRequest09-24.exe
                      File size:1'597'952 bytes
                      MD5:3e322cacdbc509091f2950c4e04ff85f
                      SHA1:d4eab59133e0f767f7c954ee11599d7c8fdffafc
                      SHA256:9e783a78671bd03144b0def1540d93a92dbb8fcdd5a75bfa26a1d11e6c613bff
                      SHA512:45fa5310f55df604989b511bdc094dda73dcbb3fea40a07253bb692ab33d0275912dcd4fcdbbeb52c33a8bf5b3aa3d2e832c03386b25600e99adcaf005a03497
                      SSDEEP:24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8aYB/yrO95Haw09t4EtDDkINjtRoSrKm0:ETvC/MTQYxsWR7aYB/t7HartldvoSr
                      TLSH:A675D0C273819062FE9B91720B76FA1356BD6E2D0D23A51F03953D79BE701B1123E6A3
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                      Icon Hash:8319596d4d756986
                      Entrypoint:0x420577
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66E765B7 [Sun Sep 15 22:54:47 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:948cc502fe9226992dce9417f952fce3
                      Instruction
                      call 00007F0045255363h
                      jmp 00007F0045254C6Fh
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F0045254E4Dh
                      mov dword ptr [esi], 0049FDF0h
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FDF8h
                      mov dword ptr [ecx], 0049FDF0h
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F0045254E1Ah
                      mov dword ptr [esi], 0049FE0Ch
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FE14h
                      mov dword ptr [ecx], 0049FE0Ch
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      and dword ptr [eax], 00000000h
                      and dword ptr [eax+04h], 00000000h
                      push eax
                      mov eax, dword ptr [ebp+08h]
                      add eax, 04h
                      push eax
                      call 00007F0045257A0Dh
                      pop ecx
                      pop ecx
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      lea eax, dword ptr [ecx+04h]
                      mov dword ptr [ecx], 0049FDD0h
                      push eax
                      call 00007F0045257A58h
                      pop ecx
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      push eax
                      call 00007F0045257A41h
                      test byte ptr [ebp+08h], 00000001h
                      pop ecx
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000xaf708.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1840000x7594.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xd40000xaf7080xaf800596c5718c0a928c41bfe2f7dcf9acca2False0.9132667824074074data7.884038986257902IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1840000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xd47d00x114b8Device independent bitmap graphic, 114 x 300 x 32, image size 68400, resolution 3779 x 3779 px/mEnglishGreat Britain0.2350790513833992
                      RT_MENU0xe5c880x50dataEnglishGreat Britain0.9
                      RT_STRING0xe5cd80x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xe626c0x68adataEnglishGreat Britain0.2735961768219833
                      RT_STRING0xe68f80x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xe6d880x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xe73840x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xe79e00x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xe7e480x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xe7fa00x9b24cdata1.0003163023157735
                      RT_GROUP_ICON0x1831ec0x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0x1832000x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0x1832140x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0x1832280x14dataEnglishGreat Britain1.25
                      RT_VERSION0x18323c0xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0x1833180x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 25, 2024 13:46:07.106641054 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:07.111506939 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:07.111582994 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.067800045 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.068566084 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.074398994 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.241220951 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.241379976 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.246345997 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.415250063 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.419378996 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.424189091 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.610415936 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.610450983 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.610464096 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.610512018 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.700731993 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.737416983 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.742748976 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.916834116 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:08.928785086 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:08.934369087 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.102611065 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.104090929 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:09.108927965 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.277283907 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.281438112 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:09.286262035 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.555978060 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.556471109 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:09.561307907 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.732765913 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:09.733329058 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:09.738239050 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.438358068 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.438736916 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:10.443653107 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.611498117 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.612221003 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:10.612288952 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:10.612319946 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:10.612334013 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:46:10.617079020 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.617100954 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.617198944 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:10.617212057 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:11.640358925 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:46:11.690135956 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:47:46.644049883 CEST49704587192.168.2.10194.36.191.196
                      Sep 25, 2024 13:47:46.649032116 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:47:46.817135096 CEST58749704194.36.191.196192.168.2.10
                      Sep 25, 2024 13:47:46.820833921 CEST49704587192.168.2.10194.36.191.196
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 25, 2024 13:46:06.624634981 CEST6442153192.168.2.101.1.1.1
                      Sep 25, 2024 13:46:07.097547054 CEST53644211.1.1.1192.168.2.10
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 25, 2024 13:46:06.624634981 CEST192.168.2.101.1.1.10x8fd6Standard query (0)mail.agaliofu.topA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 25, 2024 13:46:07.097547054 CEST1.1.1.1192.168.2.100x8fd6No error (0)mail.agaliofu.topagaliofu.topCNAME (Canonical name)IN (0x0001)false
                      Sep 25, 2024 13:46:07.097547054 CEST1.1.1.1192.168.2.100x8fd6No error (0)agaliofu.top194.36.191.196A (IP address)IN (0x0001)false
                      TimestampSource PortDest PortSource IPDest IPCommands
                      Sep 25, 2024 13:46:08.067800045 CEST58749704194.36.191.196192.168.2.10220-hosting1.nl.hostsailor.com ESMTP Exim 4.96.2 #2 Wed, 25 Sep 2024 13:46:07 +0200
                      220-We do not authorize the use of this system to transport unsolicited,
                      220 and/or bulk e-mail.
                      Sep 25, 2024 13:46:08.068566084 CEST49704587192.168.2.10194.36.191.196EHLO 142233
                      Sep 25, 2024 13:46:08.241220951 CEST58749704194.36.191.196192.168.2.10250-hosting1.nl.hostsailor.com Hello 142233 [8.46.123.33]
                      250-SIZE 52428800
                      250-8BITMIME
                      250-PIPELINING
                      250-PIPECONNECT
                      250-STARTTLS
                      250 HELP
                      Sep 25, 2024 13:46:08.241379976 CEST49704587192.168.2.10194.36.191.196STARTTLS
                      Sep 25, 2024 13:46:08.415250063 CEST58749704194.36.191.196192.168.2.10220 TLS go ahead

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:07:46:03
                      Start date:25/09/2024
                      Path:C:\Users\user\Desktop\rOrderRequest09-24.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\rOrderRequest09-24.exe"
                      Imagebase:0xb90000
                      File size:1'597'952 bytes
                      MD5 hash:3E322CACDBC509091F2950C4E04FF85F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1279971744.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:5
                      Start time:07:46:04
                      Start date:25/09/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\rOrderRequest09-24.exe"
                      Imagebase:0x580000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2511992775.0000000002983000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2511992775.0000000002957000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.2509888429.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2511992775.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2511992775.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:2.8%
                        Dynamic/Decrypted Code Coverage:1.1%
                        Signature Coverage:3.1%
                        Total number of Nodes:1668
                        Total number of Limit Nodes:52
                        execution_graph 96874 bb03fb 96875 bb0407 CallCatchBlock 96874->96875 96903 bafeb1 96875->96903 96877 bb0561 96930 bb083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96877->96930 96878 bb040e 96878->96877 96881 bb0438 96878->96881 96880 bb0568 96931 bb4e52 28 API calls _abort 96880->96931 96892 bb0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96881->96892 96914 bc247d 96881->96914 96883 bb056e 96932 bb4e04 28 API calls _abort 96883->96932 96887 bb0576 96888 bb0457 96890 bb04d8 96922 bb0959 96890->96922 96892->96890 96926 bb4e1a 38 API calls 3 library calls 96892->96926 96894 bb04de 96895 bb04f3 96894->96895 96927 bb0992 GetModuleHandleW 96895->96927 96897 bb04fa 96897->96880 96898 bb04fe 96897->96898 96899 bb0507 96898->96899 96928 bb4df5 28 API calls _abort 96898->96928 96929 bb0040 13 API calls 2 library calls 96899->96929 96902 bb050f 96902->96888 96904 bafeba 96903->96904 96933 bb0698 IsProcessorFeaturePresent 96904->96933 96906 bafec6 96934 bb2c94 10 API calls 3 library calls 96906->96934 96908 bafecb 96913 bafecf 96908->96913 96935 bc2317 96908->96935 96911 bafee6 96911->96878 96913->96878 96915 bc2494 96914->96915 96916 bb0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96915->96916 96917 bb0451 96916->96917 96917->96888 96918 bc2421 96917->96918 96920 bc2450 96918->96920 96919 bb0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96921 bc2479 96919->96921 96920->96919 96921->96892 97010 bb2340 96922->97010 96925 bb097f 96925->96894 96926->96890 96927->96897 96928->96899 96929->96902 96930->96880 96931->96883 96932->96887 96933->96906 96934->96908 96939 bcd1f6 96935->96939 96938 bb2cbd 8 API calls 3 library calls 96938->96913 96940 bcd213 96939->96940 96943 bcd20f 96939->96943 96940->96943 96945 bc4bfb 96940->96945 96942 bafed8 96942->96911 96942->96938 96957 bb0a8c 96943->96957 96946 bc4c07 CallCatchBlock 96945->96946 96964 bc2f5e EnterCriticalSection 96946->96964 96948 bc4c0e 96965 bc50af 96948->96965 96950 bc4c1d 96956 bc4c2c 96950->96956 96978 bc4a8f 29 API calls 96950->96978 96953 bc4c27 96979 bc4b45 GetStdHandle GetFileType 96953->96979 96954 bc4c3d __fread_nolock 96954->96940 96980 bc4c48 LeaveCriticalSection _abort 96956->96980 96958 bb0a97 IsProcessorFeaturePresent 96957->96958 96959 bb0a95 96957->96959 96961 bb0c5d 96958->96961 96959->96942 97009 bb0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96961->97009 96963 bb0d40 96963->96942 96964->96948 96966 bc50bb CallCatchBlock 96965->96966 96967 bc50df 96966->96967 96968 bc50c8 96966->96968 96981 bc2f5e EnterCriticalSection 96967->96981 96989 bbf2d9 20 API calls _free 96968->96989 96971 bc50cd 96990 bc27ec 26 API calls __fread_nolock 96971->96990 96973 bc50d7 __fread_nolock 96973->96950 96974 bc5117 96991 bc513e LeaveCriticalSection _abort 96974->96991 96976 bc50eb 96976->96974 96982 bc5000 96976->96982 96978->96953 96979->96956 96980->96954 96981->96976 96992 bc4c7d 96982->96992 96985 bc5012 96988 bc501f 96985->96988 96999 bc3405 11 API calls 2 library calls 96985->96999 96986 bc5071 96986->96976 97000 bc29c8 96988->97000 96989->96971 96990->96973 96991->96973 96997 bc4c8a _free 96992->96997 96993 bc4cca 97007 bbf2d9 20 API calls _free 96993->97007 96994 bc4cb5 RtlAllocateHeap 96995 bc4cc8 96994->96995 96994->96997 96995->96985 96997->96993 96997->96994 97006 bb4ead 7 API calls 2 library calls 96997->97006 96999->96985 97001 bc29fc _free 97000->97001 97002 bc29d3 RtlFreeHeap 97000->97002 97001->96986 97002->97001 97003 bc29e8 97002->97003 97008 bbf2d9 20 API calls _free 97003->97008 97005 bc29ee GetLastError 97005->97001 97006->96997 97007->96995 97008->97005 97009->96963 97011 bb096c GetStartupInfoW 97010->97011 97011->96925 97012 b91098 97017 b942de 97012->97017 97016 b910a7 97038 b9a961 97017->97038 97021 b94342 97024 b94378 97021->97024 97055 b993b2 97021->97055 97023 b9436c 97059 b937a0 97023->97059 97025 b9441b GetCurrentProcess IsWow64Process 97024->97025 97033 bd37df 97024->97033 97027 b94437 97025->97027 97028 b9444f LoadLibraryA 97027->97028 97029 bd3824 GetSystemInfo 97027->97029 97030 b9449c GetSystemInfo 97028->97030 97031 b94460 GetProcAddress 97028->97031 97032 b94476 97030->97032 97031->97030 97034 b94470 GetNativeSystemInfo 97031->97034 97035 b9447a FreeLibrary 97032->97035 97036 b9109d 97032->97036 97034->97032 97035->97036 97037 bb00a3 29 API calls __onexit 97036->97037 97037->97016 97063 bafe0b 97038->97063 97040 b9a976 97073 bafddb 97040->97073 97042 b942f5 GetVersionExW 97043 b96b57 97042->97043 97044 bd4ba1 97043->97044 97045 b96b67 _wcslen 97043->97045 97046 b993b2 22 API calls 97044->97046 97048 b96b7d 97045->97048 97049 b96ba2 97045->97049 97047 bd4baa 97046->97047 97047->97047 97098 b96f34 22 API calls 97048->97098 97051 bafddb 22 API calls 97049->97051 97053 b96bae 97051->97053 97052 b96b85 __fread_nolock 97052->97021 97054 bafe0b 22 API calls 97053->97054 97054->97052 97056 b993c0 97055->97056 97058 b993c9 __fread_nolock 97055->97058 97056->97058 97099 b9aec9 97056->97099 97058->97023 97060 b937ae 97059->97060 97061 b993b2 22 API calls 97060->97061 97062 b937c2 97061->97062 97062->97024 97065 bafddb 97063->97065 97066 bafdfa 97065->97066 97068 bafdfc 97065->97068 97083 bbea0c 97065->97083 97090 bb4ead 7 API calls 2 library calls 97065->97090 97066->97040 97069 bb066d 97068->97069 97091 bb32a4 RaiseException 97068->97091 97092 bb32a4 RaiseException 97069->97092 97072 bb068a 97072->97040 97076 bafde0 97073->97076 97074 bbea0c ___std_exception_copy 21 API calls 97074->97076 97075 bafdfa 97075->97042 97076->97074 97076->97075 97079 bafdfc 97076->97079 97095 bb4ead 7 API calls 2 library calls 97076->97095 97078 bb066d 97097 bb32a4 RaiseException 97078->97097 97079->97078 97096 bb32a4 RaiseException 97079->97096 97082 bb068a 97082->97042 97088 bc3820 _free 97083->97088 97084 bc385e 97094 bbf2d9 20 API calls _free 97084->97094 97086 bc3849 RtlAllocateHeap 97087 bc385c 97086->97087 97086->97088 97087->97065 97088->97084 97088->97086 97093 bb4ead 7 API calls 2 library calls 97088->97093 97090->97065 97091->97069 97092->97072 97093->97088 97094->97087 97095->97076 97096->97078 97097->97082 97098->97052 97100 b9aed9 __fread_nolock 97099->97100 97101 b9aedc 97099->97101 97100->97058 97102 bafddb 22 API calls 97101->97102 97103 b9aee7 97102->97103 97104 bafe0b 22 API calls 97103->97104 97104->97100 97105 b9105b 97110 b9344d 97105->97110 97107 b9106a 97141 bb00a3 29 API calls __onexit 97107->97141 97109 b91074 97111 b9345d __wsopen_s 97110->97111 97112 b9a961 22 API calls 97111->97112 97113 b93513 97112->97113 97142 b93a5a 97113->97142 97115 b9351c 97149 b93357 97115->97149 97122 b9a961 22 API calls 97123 b9354d 97122->97123 97170 b9a6c3 97123->97170 97126 bd3176 RegQueryValueExW 97127 bd320c RegCloseKey 97126->97127 97128 bd3193 97126->97128 97130 b93578 97127->97130 97140 bd321e _wcslen 97127->97140 97129 bafe0b 22 API calls 97128->97129 97131 bd31ac 97129->97131 97130->97107 97176 b95722 97131->97176 97134 b94c6d 22 API calls 97134->97140 97135 bd31d4 97136 b96b57 22 API calls 97135->97136 97137 bd31ee messages 97136->97137 97137->97127 97139 b9515f 22 API calls 97139->97140 97140->97130 97140->97134 97140->97139 97179 b99cb3 97140->97179 97141->97109 97185 bd1f50 97142->97185 97145 b99cb3 22 API calls 97146 b93a8d 97145->97146 97187 b93aa2 97146->97187 97148 b93a97 97148->97115 97150 bd1f50 __wsopen_s 97149->97150 97151 b93364 GetFullPathNameW 97150->97151 97152 b93386 97151->97152 97153 b96b57 22 API calls 97152->97153 97154 b933a4 97153->97154 97155 b933c6 97154->97155 97156 b933dd 97155->97156 97157 bd30bb 97155->97157 97197 b933ee 97156->97197 97159 bafddb 22 API calls 97157->97159 97161 bd30c5 _wcslen 97159->97161 97160 b933e8 97164 b9515f 97160->97164 97162 bafe0b 22 API calls 97161->97162 97163 bd30fe __fread_nolock 97162->97163 97165 b9516e 97164->97165 97169 b9518f __fread_nolock 97164->97169 97167 bafe0b 22 API calls 97165->97167 97166 bafddb 22 API calls 97168 b93544 97166->97168 97167->97169 97168->97122 97169->97166 97171 b9a6dd 97170->97171 97175 b93556 RegOpenKeyExW 97170->97175 97172 bafddb 22 API calls 97171->97172 97173 b9a6e7 97172->97173 97174 bafe0b 22 API calls 97173->97174 97174->97175 97175->97126 97175->97130 97177 bafddb 22 API calls 97176->97177 97178 b95734 RegQueryValueExW 97177->97178 97178->97135 97178->97137 97180 b99cc2 _wcslen 97179->97180 97181 bafe0b 22 API calls 97180->97181 97182 b99cea __fread_nolock 97181->97182 97183 bafddb 22 API calls 97182->97183 97184 b99d00 97183->97184 97184->97140 97186 b93a67 GetModuleFileNameW 97185->97186 97186->97145 97188 bd1f50 __wsopen_s 97187->97188 97189 b93aaf GetFullPathNameW 97188->97189 97190 b93ae9 97189->97190 97191 b93ace 97189->97191 97192 b9a6c3 22 API calls 97190->97192 97193 b96b57 22 API calls 97191->97193 97194 b93ada 97192->97194 97193->97194 97195 b937a0 22 API calls 97194->97195 97196 b93ae6 97195->97196 97196->97148 97198 b933fe _wcslen 97197->97198 97199 bd311d 97198->97199 97200 b93411 97198->97200 97202 bafddb 22 API calls 97199->97202 97207 b9a587 97200->97207 97203 bd3127 97202->97203 97205 bafe0b 22 API calls 97203->97205 97204 b9341e __fread_nolock 97204->97160 97206 bd3157 __fread_nolock 97205->97206 97208 b9a59d 97207->97208 97211 b9a598 __fread_nolock 97207->97211 97209 bafe0b 22 API calls 97208->97209 97210 bdf80f 97208->97210 97209->97211 97211->97204 97212 b9f7bf 97213 b9f7d3 97212->97213 97214 b9fcb6 97212->97214 97215 b9fcc2 97213->97215 97217 bafddb 22 API calls 97213->97217 97303 b9aceb 23 API calls messages 97214->97303 97304 b9aceb 23 API calls messages 97215->97304 97219 b9f7e5 97217->97219 97219->97215 97220 b9f83e 97219->97220 97221 b9fd3d 97219->97221 97235 b9ed9d messages 97220->97235 97247 ba1310 97220->97247 97305 c01155 22 API calls 97221->97305 97224 bafddb 22 API calls 97245 b9ec76 messages 97224->97245 97225 be4beb 97313 c0359c 82 API calls __wsopen_s 97225->97313 97226 b9fef7 97233 b9a8c7 22 API calls 97226->97233 97226->97235 97229 be4b0b 97311 c0359c 82 API calls __wsopen_s 97229->97311 97230 be4600 97230->97235 97306 b9a8c7 97230->97306 97233->97235 97236 b9a8c7 22 API calls 97236->97245 97238 bb0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97238->97245 97239 b9fbe3 97239->97235 97242 be4bdc 97239->97242 97246 b9f3ae messages 97239->97246 97240 b9a961 22 API calls 97240->97245 97241 bb00a3 29 API calls pre_c_initialization 97241->97245 97312 c0359c 82 API calls __wsopen_s 97242->97312 97244 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97244->97245 97245->97224 97245->97225 97245->97226 97245->97229 97245->97230 97245->97235 97245->97236 97245->97238 97245->97239 97245->97240 97245->97241 97245->97244 97245->97246 97301 ba01e0 207 API calls 2 library calls 97245->97301 97302 ba06a0 41 API calls messages 97245->97302 97246->97235 97310 c0359c 82 API calls __wsopen_s 97246->97310 97248 ba17b0 97247->97248 97249 ba1376 97247->97249 97451 bb0242 5 API calls __Init_thread_wait 97248->97451 97250 ba1390 97249->97250 97251 be6331 97249->97251 97253 ba1940 9 API calls 97250->97253 97254 be633d 97251->97254 97456 c1709c 207 API calls 97251->97456 97257 ba13a0 97253->97257 97254->97245 97256 ba17ba 97258 ba17fb 97256->97258 97260 b99cb3 22 API calls 97256->97260 97259 ba1940 9 API calls 97257->97259 97262 be6346 97258->97262 97264 ba182c 97258->97264 97261 ba13b6 97259->97261 97268 ba17d4 97260->97268 97261->97258 97263 ba13ec 97261->97263 97457 c0359c 82 API calls __wsopen_s 97262->97457 97263->97262 97277 ba1408 __fread_nolock 97263->97277 97453 b9aceb 23 API calls messages 97264->97453 97267 ba1839 97454 bad217 207 API calls 97267->97454 97452 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97268->97452 97271 be636e 97458 c0359c 82 API calls __wsopen_s 97271->97458 97273 ba153c 97275 ba1940 9 API calls 97273->97275 97274 be63d1 97460 c15745 54 API calls _wcslen 97274->97460 97278 ba1549 97275->97278 97277->97267 97277->97271 97279 bafddb 22 API calls 97277->97279 97280 bafe0b 22 API calls 97277->97280 97288 ba152f 97277->97288 97291 be63b2 97277->97291 97295 ba15c7 messages 97277->97295 97426 b9ec40 97277->97426 97283 ba1940 9 API calls 97278->97283 97278->97295 97279->97277 97280->97277 97281 ba1872 97455 bafaeb 23 API calls 97281->97455 97292 ba1563 97283->97292 97285 ba171d 97285->97245 97287 ba167b messages 97287->97285 97450 bace17 22 API calls messages 97287->97450 97288->97273 97288->97274 97459 c0359c 82 API calls __wsopen_s 97291->97459 97294 b9a8c7 22 API calls 97292->97294 97292->97295 97294->97295 97295->97281 97295->97287 97314 ba1940 97295->97314 97324 c0744a 97295->97324 97380 c1e204 97295->97380 97416 c083da 97295->97416 97419 c1958b 97295->97419 97422 b96246 97295->97422 97461 c0359c 82 API calls __wsopen_s 97295->97461 97301->97245 97302->97245 97303->97215 97304->97221 97305->97235 97307 b9a8ea __fread_nolock 97306->97307 97308 b9a8db 97306->97308 97307->97235 97308->97307 97309 bafe0b 22 API calls 97308->97309 97309->97307 97310->97235 97311->97235 97312->97225 97313->97235 97315 ba1981 97314->97315 97319 ba195d 97314->97319 97462 bb0242 5 API calls __Init_thread_wait 97315->97462 97318 ba198b 97318->97319 97463 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97318->97463 97323 ba196e 97319->97323 97464 bb0242 5 API calls __Init_thread_wait 97319->97464 97320 ba8727 97320->97323 97465 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97320->97465 97323->97295 97325 c07469 97324->97325 97326 c07474 97324->97326 97497 b9b567 39 API calls 97325->97497 97329 b9a961 22 API calls 97326->97329 97365 c07554 97326->97365 97328 bafddb 22 API calls 97330 c07587 97328->97330 97331 c07495 97329->97331 97332 bafe0b 22 API calls 97330->97332 97333 b9a961 22 API calls 97331->97333 97334 c07598 97332->97334 97335 c0749e 97333->97335 97336 b96246 CloseHandle 97334->97336 97337 b97510 53 API calls 97335->97337 97338 c075a3 97336->97338 97339 c074aa 97337->97339 97340 b9a961 22 API calls 97338->97340 97498 b9525f 22 API calls 97339->97498 97341 c075ab 97340->97341 97343 b96246 CloseHandle 97341->97343 97345 c075b2 97343->97345 97344 c074bf 97499 b96350 97344->97499 97466 b97510 97345->97466 97350 c0754a 97510 b9b567 39 API calls 97350->97510 97352 b96246 CloseHandle 97354 c075c8 97352->97354 97353 c07502 97353->97350 97356 c07506 97353->97356 97489 b95745 97354->97489 97357 b99cb3 22 API calls 97356->97357 97359 c07513 97357->97359 97509 bfd2c1 26 API calls 97359->97509 97362 c075ea 97511 b953de 27 API calls messages 97362->97511 97363 c076de GetLastError 97364 c076f7 97363->97364 97518 b96216 CloseHandle messages 97364->97518 97365->97328 97368 c076a4 97365->97368 97368->97295 97369 c0751c 97369->97350 97370 c075f8 97512 b953c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97370->97512 97372 c07645 97373 bafddb 22 API calls 97372->97373 97375 c07679 97373->97375 97374 c075ff 97374->97372 97513 bfccff 97374->97513 97376 b9a961 22 API calls 97375->97376 97378 c07686 97376->97378 97378->97368 97517 bf417d 22 API calls __fread_nolock 97378->97517 97381 b9a961 22 API calls 97380->97381 97382 c1e21b 97381->97382 97383 b97510 53 API calls 97382->97383 97384 c1e22a 97383->97384 97536 b96270 97384->97536 97387 b97510 53 API calls 97388 c1e24a 97387->97388 97389 c1e262 97388->97389 97390 c1e2c7 97388->97390 97560 b9b567 39 API calls 97389->97560 97391 b97510 53 API calls 97390->97391 97393 c1e2cc 97391->97393 97395 c1e314 97393->97395 97396 c1e2d9 97393->97396 97394 c1e267 97394->97396 97397 c1e280 97394->97397 97398 c1e32c 97395->97398 97564 b9b567 39 API calls 97395->97564 97563 b99c6e 22 API calls 97396->97563 97561 b96d25 22 API calls __fread_nolock 97397->97561 97402 c1e345 97398->97402 97565 b9b567 39 API calls 97398->97565 97405 b9a8c7 22 API calls 97402->97405 97403 c1e28d 97406 b96350 22 API calls 97403->97406 97407 c1e35f 97405->97407 97409 c1e29b 97406->97409 97541 bf92c8 97407->97541 97562 b96d25 22 API calls __fread_nolock 97409->97562 97411 c1e2b4 97412 b96350 22 API calls 97411->97412 97415 c1e2c2 97412->97415 97413 c1e2e6 97413->97295 97566 b962b5 22 API calls 97415->97566 97579 c098e3 97416->97579 97418 c083ea 97418->97295 97642 c17f59 97419->97642 97421 c1959b 97421->97295 97423 b9625f 97422->97423 97424 b96250 97422->97424 97423->97424 97425 b96264 CloseHandle 97423->97425 97424->97295 97425->97424 97428 b9ec76 messages 97426->97428 97427 bb00a3 29 API calls pre_c_initialization 97427->97428 97428->97427 97429 be4beb 97428->97429 97430 bafddb 22 API calls 97428->97430 97433 b9fef7 97428->97433 97434 be4b0b 97428->97434 97435 b9a8c7 22 API calls 97428->97435 97436 be4600 97428->97436 97442 bb0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97428->97442 97443 b9fbe3 97428->97443 97444 b9ed9d messages 97428->97444 97445 b9a961 22 API calls 97428->97445 97448 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97428->97448 97449 b9f3ae messages 97428->97449 97726 ba01e0 207 API calls 2 library calls 97428->97726 97727 ba06a0 41 API calls messages 97428->97727 97731 c0359c 82 API calls __wsopen_s 97429->97731 97430->97428 97439 b9a8c7 22 API calls 97433->97439 97433->97444 97729 c0359c 82 API calls __wsopen_s 97434->97729 97435->97428 97441 b9a8c7 22 API calls 97436->97441 97436->97444 97439->97444 97441->97444 97442->97428 97443->97444 97446 be4bdc 97443->97446 97443->97449 97444->97277 97445->97428 97730 c0359c 82 API calls __wsopen_s 97446->97730 97448->97428 97449->97444 97728 c0359c 82 API calls __wsopen_s 97449->97728 97450->97287 97451->97256 97452->97258 97453->97267 97454->97281 97455->97281 97456->97254 97457->97295 97458->97295 97459->97295 97460->97292 97461->97295 97462->97318 97463->97319 97464->97320 97465->97323 97467 b97525 97466->97467 97483 b97522 97466->97483 97468 b9755b 97467->97468 97469 b9752d 97467->97469 97471 bd50f6 97468->97471 97474 b9756d 97468->97474 97479 bd500f 97468->97479 97519 bb51c6 26 API calls 97469->97519 97522 bb5183 26 API calls 97471->97522 97472 b9753d 97478 bafddb 22 API calls 97472->97478 97520 bafb21 51 API calls 97474->97520 97475 bd510e 97475->97475 97480 b97547 97478->97480 97482 bafe0b 22 API calls 97479->97482 97488 bd5088 97479->97488 97481 b99cb3 22 API calls 97480->97481 97481->97483 97484 bd5058 97482->97484 97483->97352 97485 bafddb 22 API calls 97484->97485 97486 bd507f 97485->97486 97487 b99cb3 22 API calls 97486->97487 97487->97488 97521 bafb21 51 API calls 97488->97521 97490 b9575c CreateFileW 97489->97490 97491 bd4035 97489->97491 97492 b9577b 97490->97492 97491->97492 97493 bd403b CreateFileW 97491->97493 97492->97362 97492->97363 97493->97492 97494 bd4063 97493->97494 97523 b954c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97494->97523 97496 bd406e 97496->97492 97497->97326 97498->97344 97500 b96362 97499->97500 97501 bd4a51 97499->97501 97524 b96373 97500->97524 97534 b94a88 22 API calls __fread_nolock 97501->97534 97504 bd4a5b 97506 bd4a67 97504->97506 97507 b9a8c7 22 API calls 97504->97507 97505 b9636e 97505->97350 97508 bfd4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 97505->97508 97507->97506 97508->97353 97509->97369 97510->97365 97511->97370 97512->97374 97514 bfcd0e 97513->97514 97515 bfcd19 WriteFile 97513->97515 97535 bfcc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97514->97535 97515->97372 97517->97368 97518->97368 97519->97472 97520->97472 97521->97471 97522->97475 97523->97496 97525 b963b6 __fread_nolock 97524->97525 97526 b96382 97524->97526 97525->97505 97526->97525 97527 b963a9 97526->97527 97528 bd4a82 97526->97528 97530 b9a587 22 API calls 97527->97530 97529 bafddb 22 API calls 97528->97529 97531 bd4a91 97529->97531 97530->97525 97532 bafe0b 22 API calls 97531->97532 97533 bd4ac5 __fread_nolock 97532->97533 97534->97504 97535->97515 97537 bafe0b 22 API calls 97536->97537 97538 b96295 97537->97538 97539 bafddb 22 API calls 97538->97539 97540 b962a3 97539->97540 97540->97387 97542 b9a961 22 API calls 97541->97542 97543 bf92de 97542->97543 97544 b96270 22 API calls 97543->97544 97545 bf92f2 97544->97545 97552 bf9314 97545->97552 97567 bf8e54 97545->97567 97547 bf8e54 41 API calls 97547->97552 97551 b96350 22 API calls 97551->97552 97552->97547 97552->97551 97553 bf93b3 97552->97553 97556 bf9397 97552->97556 97575 b96d25 22 API calls __fread_nolock 97552->97575 97554 b9a8c7 22 API calls 97553->97554 97555 bf93c2 97553->97555 97554->97555 97555->97415 97576 b96d25 22 API calls __fread_nolock 97556->97576 97558 bf93a7 97559 b96350 22 API calls 97558->97559 97559->97553 97560->97394 97561->97403 97562->97411 97563->97413 97564->97398 97565->97402 97566->97413 97568 bf8e74 _wcslen 97567->97568 97569 bf8f63 97568->97569 97571 bf8f68 97568->97571 97572 bf8ea9 97568->97572 97569->97552 97574 b96d25 22 API calls __fread_nolock 97569->97574 97571->97569 97578 bace60 41 API calls 97571->97578 97572->97569 97577 bace60 41 API calls 97572->97577 97574->97552 97575->97552 97576->97558 97577->97572 97578->97571 97580 c09902 97579->97580 97581 c099e8 97579->97581 97582 bafddb 22 API calls 97580->97582 97637 c09caa 39 API calls 97581->97637 97584 c09909 97582->97584 97585 bafe0b 22 API calls 97584->97585 97587 c0991a 97585->97587 97586 c099ca 97586->97418 97589 b96246 CloseHandle 97587->97589 97588 c09ac5 97630 c01e96 97588->97630 97590 c09925 97589->97590 97593 b9a961 22 API calls 97590->97593 97592 c099a2 97592->97586 97592->97588 97595 c09a33 97592->97595 97596 c0992d 97593->97596 97594 c09acc 97599 bfccff 4 API calls 97594->97599 97597 b97510 53 API calls 97595->97597 97598 b96246 CloseHandle 97596->97598 97601 c09a3a 97597->97601 97600 c09934 97598->97600 97624 c09aa8 97599->97624 97603 b97510 53 API calls 97600->97603 97602 c09abb 97601->97602 97623 c09a6e 97601->97623 97639 bfcd57 30 API calls 97602->97639 97605 c09940 97603->97605 97607 b96246 CloseHandle 97605->97607 97606 b96270 22 API calls 97608 c09a7e 97606->97608 97609 c0994a 97607->97609 97611 c09a8e 97608->97611 97614 b9a8c7 22 API calls 97608->97614 97612 b95745 5 API calls 97609->97612 97610 b96246 CloseHandle 97613 c09b1e 97610->97613 97616 b933c6 22 API calls 97611->97616 97615 c09959 97612->97615 97640 b96216 CloseHandle messages 97613->97640 97614->97611 97618 c099c2 97615->97618 97619 c0995d 97615->97619 97620 c09a9c 97616->97620 97636 b96216 CloseHandle messages 97618->97636 97634 b953de 27 API calls messages 97619->97634 97638 bfcd57 30 API calls 97620->97638 97623->97606 97624->97586 97624->97610 97626 c0996b 97635 b953c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97626->97635 97628 c09972 97628->97592 97629 bfccff 4 API calls 97628->97629 97629->97592 97631 c01ea4 97630->97631 97632 c01e9f 97630->97632 97631->97594 97641 c00f67 24 API calls __fread_nolock 97632->97641 97634->97626 97635->97628 97636->97586 97637->97592 97638->97624 97639->97624 97640->97586 97641->97631 97643 b97510 53 API calls 97642->97643 97644 c17f90 97643->97644 97665 c17fd5 messages 97644->97665 97680 c18cd3 97644->97680 97646 c18281 97647 c1844f 97646->97647 97651 c1828f 97646->97651 97721 c18ee4 60 API calls 97647->97721 97650 c1845e 97650->97651 97652 c1846a 97650->97652 97693 c17e86 97651->97693 97652->97665 97653 b97510 53 API calls 97670 c18049 97653->97670 97658 c182c8 97708 bafc70 97658->97708 97661 c18302 97715 b963eb 22 API calls 97661->97715 97662 c182e8 97714 c0359c 82 API calls __wsopen_s 97662->97714 97665->97421 97666 c182f3 GetCurrentProcess TerminateProcess 97666->97661 97667 c18311 97716 b96a50 22 API calls 97667->97716 97669 c1832a 97679 c18352 97669->97679 97717 ba04f0 22 API calls 97669->97717 97670->97646 97670->97653 97670->97665 97712 bf417d 22 API calls __fread_nolock 97670->97712 97713 c1851d 42 API calls _strftime 97670->97713 97672 c184c5 97672->97665 97674 c184d9 FreeLibrary 97672->97674 97673 c18341 97718 c18b7b 75 API calls 97673->97718 97674->97665 97679->97672 97719 ba04f0 22 API calls 97679->97719 97720 b9aceb 23 API calls messages 97679->97720 97722 c18b7b 75 API calls 97679->97722 97681 b9aec9 22 API calls 97680->97681 97682 c18cee CharLowerBuffW 97681->97682 97683 bf8e54 41 API calls 97682->97683 97684 c18d0f 97683->97684 97686 b9a961 22 API calls 97684->97686 97692 c18d48 _wcslen 97684->97692 97687 c18d2a 97686->97687 97723 b96d25 22 API calls __fread_nolock 97687->97723 97689 c18d3e 97690 b993b2 22 API calls 97689->97690 97690->97692 97691 c18e5e _wcslen 97691->97670 97692->97691 97724 c1851d 42 API calls _strftime 97692->97724 97694 c17ea1 97693->97694 97698 c17eec 97693->97698 97695 bafe0b 22 API calls 97694->97695 97697 c17ec3 97695->97697 97696 bafddb 22 API calls 97696->97697 97697->97696 97697->97698 97699 c19096 97698->97699 97700 c192ab messages 97699->97700 97707 c190ba _strcat _wcslen 97699->97707 97700->97658 97701 b9b567 39 API calls 97701->97707 97702 b9b38f 39 API calls 97702->97707 97703 b9b6b5 39 API calls 97703->97707 97704 b97510 53 API calls 97704->97707 97705 bbea0c 21 API calls ___std_exception_copy 97705->97707 97707->97700 97707->97701 97707->97702 97707->97703 97707->97704 97707->97705 97725 bfefae 24 API calls _wcslen 97707->97725 97710 bafc85 97708->97710 97709 bafd1d VirtualProtect 97711 bafceb 97709->97711 97710->97709 97710->97711 97711->97661 97711->97662 97712->97670 97713->97670 97714->97666 97715->97667 97716->97669 97717->97673 97718->97679 97719->97679 97720->97679 97721->97650 97722->97679 97723->97689 97724->97691 97725->97707 97726->97428 97727->97428 97728->97444 97729->97444 97730->97429 97731->97444 97732 b91033 97737 b94c91 97732->97737 97736 b91042 97738 b9a961 22 API calls 97737->97738 97739 b94cff 97738->97739 97745 b93af0 97739->97745 97742 b94d9c 97743 b91038 97742->97743 97748 b951f7 22 API calls __fread_nolock 97742->97748 97744 bb00a3 29 API calls __onexit 97743->97744 97744->97736 97749 b93b1c 97745->97749 97748->97742 97750 b93b0f 97749->97750 97751 b93b29 97749->97751 97750->97742 97751->97750 97752 b93b30 RegOpenKeyExW 97751->97752 97752->97750 97753 b93b4a RegQueryValueExW 97752->97753 97754 b93b80 RegCloseKey 97753->97754 97755 b93b6b 97753->97755 97754->97750 97755->97754 97756 be3f75 97767 baceb1 97756->97767 97758 be3f8b 97759 be4006 97758->97759 97834 bae300 23 API calls 97758->97834 97776 b9bf40 97759->97776 97763 be4052 97766 be4a88 97763->97766 97836 c0359c 82 API calls __wsopen_s 97763->97836 97764 be3fe6 97764->97763 97835 c01abf 22 API calls 97764->97835 97768 bacebf 97767->97768 97769 baced2 97767->97769 97837 b9aceb 23 API calls messages 97768->97837 97771 baced7 97769->97771 97772 bacf05 97769->97772 97773 bafddb 22 API calls 97771->97773 97838 b9aceb 23 API calls messages 97772->97838 97775 bacec9 97773->97775 97775->97758 97839 b9adf0 97776->97839 97778 b9bf9d 97779 b9bfa9 97778->97779 97780 be04b6 97778->97780 97782 be04c6 97779->97782 97783 b9c01e 97779->97783 97858 c0359c 82 API calls __wsopen_s 97780->97858 97859 c0359c 82 API calls __wsopen_s 97782->97859 97844 b9ac91 97783->97844 97786 b9c603 97786->97763 97788 bf7120 22 API calls 97820 b9c039 __fread_nolock messages 97788->97820 97789 b9c7da 97792 bafe0b 22 API calls 97789->97792 97800 b9c808 __fread_nolock 97792->97800 97794 be04f5 97798 be055a 97794->97798 97860 bad217 207 API calls 97794->97860 97797 b9af8a 22 API calls 97797->97820 97798->97786 97861 c0359c 82 API calls __wsopen_s 97798->97861 97799 bafe0b 22 API calls 97817 b9c350 __fread_nolock messages 97799->97817 97800->97799 97801 be091a 97871 c03209 23 API calls 97801->97871 97804 b9ec40 207 API calls 97804->97820 97805 be08a5 97806 b9ec40 207 API calls 97805->97806 97807 be08cf 97806->97807 97807->97786 97869 b9a81b 41 API calls 97807->97869 97809 be0591 97862 c0359c 82 API calls __wsopen_s 97809->97862 97810 be08f6 97870 c0359c 82 API calls __wsopen_s 97810->97870 97814 b9bbe0 40 API calls 97814->97820 97816 b9c3ac 97816->97763 97817->97816 97857 bace17 22 API calls messages 97817->97857 97818 b9c237 97821 b9c253 97818->97821 97823 b9a8c7 22 API calls 97818->97823 97820->97786 97820->97788 97820->97789 97820->97794 97820->97797 97820->97798 97820->97800 97820->97801 97820->97804 97820->97805 97820->97809 97820->97810 97820->97814 97820->97818 97822 bafe0b 22 API calls 97820->97822 97827 bafddb 22 API calls 97820->97827 97830 be09bf 97820->97830 97848 b9ad81 97820->97848 97863 bf7099 22 API calls __fread_nolock 97820->97863 97864 c15745 54 API calls _wcslen 97820->97864 97865 baaa42 22 API calls messages 97820->97865 97866 bff05c 40 API calls 97820->97866 97867 b9a993 41 API calls 97820->97867 97868 b9aceb 23 API calls messages 97820->97868 97825 be0976 97821->97825 97828 b9c297 messages 97821->97828 97822->97820 97823->97821 97872 b9aceb 23 API calls messages 97825->97872 97827->97820 97828->97830 97855 b9aceb 23 API calls messages 97828->97855 97830->97786 97873 c0359c 82 API calls __wsopen_s 97830->97873 97831 b9c335 97831->97830 97832 b9c342 97831->97832 97856 b9a704 22 API calls messages 97832->97856 97834->97764 97835->97759 97836->97766 97837->97775 97838->97775 97840 b9ae01 97839->97840 97843 b9ae1c messages 97839->97843 97841 b9aec9 22 API calls 97840->97841 97842 b9ae09 CharUpperBuffW 97841->97842 97842->97843 97843->97778 97845 b9acae 97844->97845 97846 b9acd1 97845->97846 97874 c0359c 82 API calls __wsopen_s 97845->97874 97846->97820 97849 bdfadb 97848->97849 97850 b9ad92 97848->97850 97851 bafddb 22 API calls 97850->97851 97852 b9ad99 97851->97852 97875 b9adcd 97852->97875 97855->97831 97856->97817 97857->97817 97858->97782 97859->97786 97860->97798 97861->97786 97862->97786 97863->97820 97864->97820 97865->97820 97866->97820 97867->97820 97868->97820 97869->97810 97870->97786 97871->97818 97872->97830 97873->97786 97874->97846 97878 b9addd 97875->97878 97876 b9adb6 97876->97820 97877 bafddb 22 API calls 97877->97878 97878->97876 97878->97877 97879 b9a961 22 API calls 97878->97879 97880 b9adcd 22 API calls 97878->97880 97881 b9a8c7 22 API calls 97878->97881 97879->97878 97880->97878 97881->97878 97882 b92e37 97883 b9a961 22 API calls 97882->97883 97884 b92e4d 97883->97884 97961 b94ae3 97884->97961 97886 b92e6b 97887 b93a5a 24 API calls 97886->97887 97888 b92e7f 97887->97888 97889 b99cb3 22 API calls 97888->97889 97890 b92e8c 97889->97890 97975 b94ecb 97890->97975 97893 b92ead 97898 b9a8c7 22 API calls 97893->97898 97894 bd2cb0 98013 c02cf9 97894->98013 97896 bd2cc3 97897 bd2ccf 97896->97897 98039 b94f39 97896->98039 97902 b94f39 68 API calls 97897->97902 97900 b92ec3 97898->97900 97997 b96f88 22 API calls 97900->97997 97904 bd2ce5 97902->97904 97903 b92ecf 97905 b99cb3 22 API calls 97903->97905 98045 b93084 22 API calls 97904->98045 97906 b92edc 97905->97906 97998 b9a81b 41 API calls 97906->97998 97908 b92eec 97911 b99cb3 22 API calls 97908->97911 97910 bd2d02 98046 b93084 22 API calls 97910->98046 97912 b92f12 97911->97912 97999 b9a81b 41 API calls 97912->97999 97914 bd2d1e 97916 b93a5a 24 API calls 97914->97916 97917 bd2d44 97916->97917 98047 b93084 22 API calls 97917->98047 97918 b92f21 97921 b9a961 22 API calls 97918->97921 97920 bd2d50 97922 b9a8c7 22 API calls 97920->97922 97923 b92f3f 97921->97923 97924 bd2d5e 97922->97924 98000 b93084 22 API calls 97923->98000 98048 b93084 22 API calls 97924->98048 97927 b92f4b 98001 bb4a28 40 API calls 3 library calls 97927->98001 97928 bd2d6d 97933 b9a8c7 22 API calls 97928->97933 97930 b92f59 97930->97904 97931 b92f63 97930->97931 98002 bb4a28 40 API calls 3 library calls 97931->98002 97935 bd2d83 97933->97935 97934 b92f6e 97934->97910 97936 b92f78 97934->97936 98049 b93084 22 API calls 97935->98049 98003 bb4a28 40 API calls 3 library calls 97936->98003 97938 bd2d90 97940 b92f83 97940->97914 97941 b92f8d 97940->97941 98004 bb4a28 40 API calls 3 library calls 97941->98004 97943 b92f98 97944 b92fdc 97943->97944 98005 b93084 22 API calls 97943->98005 97944->97928 97945 b92fe8 97944->97945 97945->97938 98007 b963eb 22 API calls 97945->98007 97948 b92fbf 97950 b9a8c7 22 API calls 97948->97950 97949 b92ff8 98008 b96a50 22 API calls 97949->98008 97951 b92fcd 97950->97951 98006 b93084 22 API calls 97951->98006 97954 b93006 98009 b970b0 23 API calls 97954->98009 97958 b93021 97959 b93065 97958->97959 98010 b96f88 22 API calls 97958->98010 98011 b970b0 23 API calls 97958->98011 98012 b93084 22 API calls 97958->98012 97962 b94af0 __wsopen_s 97961->97962 97963 b96b57 22 API calls 97962->97963 97964 b94b22 97962->97964 97963->97964 97974 b94b58 97964->97974 98050 b94c6d 97964->98050 97966 b99cb3 22 API calls 97968 b94c52 97966->97968 97967 b99cb3 22 API calls 97967->97974 97969 b9515f 22 API calls 97968->97969 97972 b94c5e 97969->97972 97970 b94c6d 22 API calls 97970->97974 97971 b9515f 22 API calls 97971->97974 97972->97886 97973 b94c29 97973->97966 97973->97972 97974->97967 97974->97970 97974->97971 97974->97973 98053 b94e90 LoadLibraryA 97975->98053 97980 bd3ccf 97982 b94f39 68 API calls 97980->97982 97981 b94ef6 LoadLibraryExW 98061 b94e59 LoadLibraryA 97981->98061 97984 bd3cd6 97982->97984 97986 b94e59 3 API calls 97984->97986 97988 bd3cde 97986->97988 98083 b950f5 97988->98083 97989 b94f20 97989->97988 97990 b94f2c 97989->97990 97992 b94f39 68 API calls 97990->97992 97993 b92ea5 97992->97993 97993->97893 97993->97894 97996 bd3d05 97997->97903 97998->97908 97999->97918 98000->97927 98001->97930 98002->97934 98003->97940 98004->97943 98005->97948 98006->97944 98007->97949 98008->97954 98009->97958 98010->97958 98011->97958 98012->97958 98014 c02d15 98013->98014 98015 b9511f 64 API calls 98014->98015 98016 c02d29 98015->98016 98214 c02e66 98016->98214 98019 c02d3f 98019->97896 98020 b950f5 40 API calls 98021 c02d56 98020->98021 98022 b950f5 40 API calls 98021->98022 98023 c02d66 98022->98023 98024 b950f5 40 API calls 98023->98024 98025 c02d81 98024->98025 98026 b950f5 40 API calls 98025->98026 98027 c02d9c 98026->98027 98028 b9511f 64 API calls 98027->98028 98029 c02db3 98028->98029 98030 bbea0c ___std_exception_copy 21 API calls 98029->98030 98031 c02dba 98030->98031 98032 bbea0c ___std_exception_copy 21 API calls 98031->98032 98033 c02dc4 98032->98033 98034 b950f5 40 API calls 98033->98034 98035 c02dd8 98034->98035 98036 c028fe 27 API calls 98035->98036 98037 c02dee 98036->98037 98037->98019 98220 c022ce 98037->98220 98040 b94f4a 98039->98040 98041 b94f43 98039->98041 98043 b94f59 98040->98043 98044 b94f6a FreeLibrary 98040->98044 98042 bbe678 67 API calls 98041->98042 98042->98040 98043->97897 98044->98043 98045->97910 98046->97914 98047->97920 98048->97928 98049->97938 98051 b9aec9 22 API calls 98050->98051 98052 b94c78 98051->98052 98052->97964 98054 b94ea8 GetProcAddress 98053->98054 98055 b94ec6 98053->98055 98056 b94eb8 98054->98056 98058 bbe5eb 98055->98058 98056->98055 98057 b94ebf FreeLibrary 98056->98057 98057->98055 98091 bbe52a 98058->98091 98060 b94eea 98060->97980 98060->97981 98062 b94e8d 98061->98062 98063 b94e6e GetProcAddress 98061->98063 98066 b94f80 98062->98066 98064 b94e7e 98063->98064 98064->98062 98065 b94e86 FreeLibrary 98064->98065 98065->98062 98067 bafe0b 22 API calls 98066->98067 98068 b94f95 98067->98068 98069 b95722 22 API calls 98068->98069 98070 b94fa1 __fread_nolock 98069->98070 98071 b94fdc 98070->98071 98072 bd3d1d 98070->98072 98073 b950a5 98070->98073 98076 b950f5 40 API calls 98071->98076 98077 bd3d22 98071->98077 98082 b9506e messages 98071->98082 98149 b9511f 98071->98149 98154 c0304d 74 API calls 98072->98154 98143 b942a2 CreateStreamOnHGlobal 98073->98143 98076->98071 98078 b9511f 64 API calls 98077->98078 98079 bd3d45 98078->98079 98080 b950f5 40 API calls 98079->98080 98080->98082 98082->97989 98084 bd3d70 98083->98084 98085 b95107 98083->98085 98176 bbe8c4 98085->98176 98088 c028fe 98197 c0274e 98088->98197 98090 c02919 98090->97996 98094 bbe536 CallCatchBlock 98091->98094 98092 bbe544 98116 bbf2d9 20 API calls _free 98092->98116 98094->98092 98096 bbe574 98094->98096 98095 bbe549 98117 bc27ec 26 API calls __fread_nolock 98095->98117 98098 bbe579 98096->98098 98099 bbe586 98096->98099 98118 bbf2d9 20 API calls _free 98098->98118 98108 bc8061 98099->98108 98102 bbe58f 98103 bbe5a2 98102->98103 98104 bbe595 98102->98104 98120 bbe5d4 LeaveCriticalSection __fread_nolock 98103->98120 98119 bbf2d9 20 API calls _free 98104->98119 98105 bbe554 __fread_nolock 98105->98060 98109 bc806d CallCatchBlock 98108->98109 98121 bc2f5e EnterCriticalSection 98109->98121 98111 bc807b 98122 bc80fb 98111->98122 98115 bc80ac __fread_nolock 98115->98102 98116->98095 98117->98105 98118->98105 98119->98105 98120->98105 98121->98111 98129 bc811e 98122->98129 98123 bc8088 98135 bc80b7 98123->98135 98124 bc8177 98125 bc4c7d _free 20 API calls 98124->98125 98126 bc8180 98125->98126 98128 bc29c8 _free 20 API calls 98126->98128 98130 bc8189 98128->98130 98129->98123 98129->98124 98138 bb918d EnterCriticalSection 98129->98138 98139 bb91a1 LeaveCriticalSection 98129->98139 98130->98123 98140 bc3405 11 API calls 2 library calls 98130->98140 98132 bc81a8 98141 bb918d EnterCriticalSection 98132->98141 98142 bc2fa6 LeaveCriticalSection 98135->98142 98137 bc80be 98137->98115 98138->98129 98139->98129 98140->98132 98141->98123 98142->98137 98144 b942bc FindResourceExW 98143->98144 98148 b942d9 98143->98148 98145 bd35ba LoadResource 98144->98145 98144->98148 98146 bd35cf SizeofResource 98145->98146 98145->98148 98147 bd35e3 LockResource 98146->98147 98146->98148 98147->98148 98148->98071 98150 b9512e 98149->98150 98151 bd3d90 98149->98151 98155 bbece3 98150->98155 98154->98077 98158 bbeaaa 98155->98158 98157 b9513c 98157->98071 98162 bbeab6 CallCatchBlock 98158->98162 98159 bbeac2 98171 bbf2d9 20 API calls _free 98159->98171 98161 bbeae8 98173 bb918d EnterCriticalSection 98161->98173 98162->98159 98162->98161 98164 bbeac7 98172 bc27ec 26 API calls __fread_nolock 98164->98172 98165 bbeaf4 98174 bbec0a 62 API calls 2 library calls 98165->98174 98168 bbeb08 98175 bbeb27 LeaveCriticalSection __fread_nolock 98168->98175 98170 bbead2 __fread_nolock 98170->98157 98171->98164 98172->98170 98173->98165 98174->98168 98175->98170 98179 bbe8e1 98176->98179 98178 b95118 98178->98088 98180 bbe8ed CallCatchBlock 98179->98180 98181 bbe92d 98180->98181 98182 bbe900 ___scrt_fastfail 98180->98182 98183 bbe925 __fread_nolock 98180->98183 98194 bb918d EnterCriticalSection 98181->98194 98192 bbf2d9 20 API calls _free 98182->98192 98183->98178 98185 bbe937 98195 bbe6f8 38 API calls 3 library calls 98185->98195 98188 bbe91a 98193 bc27ec 26 API calls __fread_nolock 98188->98193 98189 bbe94e 98196 bbe96c LeaveCriticalSection __fread_nolock 98189->98196 98192->98188 98193->98183 98194->98185 98195->98189 98196->98183 98200 bbe4e8 98197->98200 98199 c0275d 98199->98090 98203 bbe469 98200->98203 98202 bbe505 98202->98199 98204 bbe478 98203->98204 98205 bbe48c 98203->98205 98211 bbf2d9 20 API calls _free 98204->98211 98210 bbe488 __alldvrm 98205->98210 98213 bc333f 11 API calls 2 library calls 98205->98213 98207 bbe47d 98212 bc27ec 26 API calls __fread_nolock 98207->98212 98210->98202 98211->98207 98212->98210 98213->98210 98218 c02e7a 98214->98218 98215 c028fe 27 API calls 98215->98218 98216 c02d3b 98216->98019 98216->98020 98217 b950f5 40 API calls 98217->98218 98218->98215 98218->98216 98218->98217 98219 b9511f 64 API calls 98218->98219 98219->98218 98221 c022e7 98220->98221 98222 c022d9 98220->98222 98224 c0232c 98221->98224 98225 bbe5eb 29 API calls 98221->98225 98244 c022f0 98221->98244 98223 bbe5eb 29 API calls 98222->98223 98223->98221 98249 c02557 40 API calls __fread_nolock 98224->98249 98227 c02311 98225->98227 98227->98224 98229 c0231a 98227->98229 98228 c02370 98230 c02374 98228->98230 98231 c02395 98228->98231 98229->98244 98257 bbe678 98229->98257 98234 c02381 98230->98234 98236 bbe678 67 API calls 98230->98236 98250 c02171 98231->98250 98239 bbe678 67 API calls 98234->98239 98234->98244 98235 c0239d 98237 c023c3 98235->98237 98238 c023a3 98235->98238 98236->98234 98270 c023f3 74 API calls 98237->98270 98240 c023b0 98238->98240 98242 bbe678 67 API calls 98238->98242 98239->98244 98243 bbe678 67 API calls 98240->98243 98240->98244 98242->98240 98243->98244 98244->98019 98245 c023ca 98246 c023de 98245->98246 98247 bbe678 67 API calls 98245->98247 98246->98244 98248 bbe678 67 API calls 98246->98248 98247->98246 98248->98244 98249->98228 98251 bbea0c ___std_exception_copy 21 API calls 98250->98251 98252 c0217f 98251->98252 98253 bbea0c ___std_exception_copy 21 API calls 98252->98253 98254 c02190 98253->98254 98255 bbea0c ___std_exception_copy 21 API calls 98254->98255 98256 c0219c 98255->98256 98256->98235 98258 bbe684 CallCatchBlock 98257->98258 98259 bbe6aa 98258->98259 98260 bbe695 98258->98260 98269 bbe6a5 __fread_nolock 98259->98269 98271 bb918d EnterCriticalSection 98259->98271 98288 bbf2d9 20 API calls _free 98260->98288 98263 bbe69a 98289 bc27ec 26 API calls __fread_nolock 98263->98289 98264 bbe6c6 98272 bbe602 98264->98272 98267 bbe6d1 98290 bbe6ee LeaveCriticalSection __fread_nolock 98267->98290 98269->98244 98270->98245 98271->98264 98273 bbe60f 98272->98273 98274 bbe624 98272->98274 98323 bbf2d9 20 API calls _free 98273->98323 98281 bbe61f 98274->98281 98291 bbdc0b 98274->98291 98276 bbe614 98324 bc27ec 26 API calls __fread_nolock 98276->98324 98281->98267 98284 bbe646 98308 bc862f 98284->98308 98287 bc29c8 _free 20 API calls 98287->98281 98288->98263 98289->98269 98290->98269 98292 bbdc23 98291->98292 98296 bbdc1f 98291->98296 98293 bbd955 __fread_nolock 26 API calls 98292->98293 98292->98296 98294 bbdc43 98293->98294 98325 bc59be 62 API calls 5 library calls 98294->98325 98297 bc4d7a 98296->98297 98298 bbe640 98297->98298 98299 bc4d90 98297->98299 98301 bbd955 98298->98301 98299->98298 98300 bc29c8 _free 20 API calls 98299->98300 98300->98298 98302 bbd961 98301->98302 98303 bbd976 98301->98303 98326 bbf2d9 20 API calls _free 98302->98326 98303->98284 98305 bbd966 98327 bc27ec 26 API calls __fread_nolock 98305->98327 98307 bbd971 98307->98284 98309 bc863e 98308->98309 98310 bc8653 98308->98310 98331 bbf2c6 20 API calls _free 98309->98331 98311 bc868e 98310->98311 98315 bc867a 98310->98315 98333 bbf2c6 20 API calls _free 98311->98333 98314 bc8643 98332 bbf2d9 20 API calls _free 98314->98332 98328 bc8607 98315->98328 98316 bc8693 98334 bbf2d9 20 API calls _free 98316->98334 98320 bc869b 98335 bc27ec 26 API calls __fread_nolock 98320->98335 98321 bbe64c 98321->98281 98321->98287 98323->98276 98324->98281 98325->98296 98326->98305 98327->98307 98336 bc8585 98328->98336 98330 bc862b 98330->98321 98331->98314 98332->98321 98333->98316 98334->98320 98335->98321 98337 bc8591 CallCatchBlock 98336->98337 98347 bc5147 EnterCriticalSection 98337->98347 98339 bc859f 98340 bc85c6 98339->98340 98341 bc85d1 98339->98341 98348 bc86ae 98340->98348 98363 bbf2d9 20 API calls _free 98341->98363 98344 bc85cc 98364 bc85fb LeaveCriticalSection __wsopen_s 98344->98364 98346 bc85ee __fread_nolock 98346->98330 98347->98339 98365 bc53c4 98348->98365 98350 bc86c4 98378 bc5333 21 API calls 3 library calls 98350->98378 98352 bc86be 98352->98350 98353 bc86f6 98352->98353 98355 bc53c4 __wsopen_s 26 API calls 98352->98355 98353->98350 98356 bc53c4 __wsopen_s 26 API calls 98353->98356 98354 bc871c 98357 bc873e 98354->98357 98379 bbf2a3 20 API calls 2 library calls 98354->98379 98358 bc86ed 98355->98358 98359 bc8702 CloseHandle 98356->98359 98357->98344 98361 bc53c4 __wsopen_s 26 API calls 98358->98361 98359->98350 98362 bc870e GetLastError 98359->98362 98361->98353 98362->98350 98363->98344 98364->98346 98366 bc53e6 98365->98366 98367 bc53d1 98365->98367 98373 bc540b 98366->98373 98382 bbf2c6 20 API calls _free 98366->98382 98380 bbf2c6 20 API calls _free 98367->98380 98369 bc53d6 98381 bbf2d9 20 API calls _free 98369->98381 98371 bc5416 98383 bbf2d9 20 API calls _free 98371->98383 98373->98352 98375 bc53de 98375->98352 98376 bc541e 98384 bc27ec 26 API calls __fread_nolock 98376->98384 98378->98354 98379->98357 98380->98369 98381->98375 98382->98371 98383->98376 98384->98375 98385 b93156 98388 b93170 98385->98388 98389 b93187 98388->98389 98390 b931eb 98389->98390 98391 b9318c 98389->98391 98429 b931e9 98389->98429 98393 bd2dfb 98390->98393 98394 b931f1 98390->98394 98395 b93199 98391->98395 98396 b93265 PostQuitMessage 98391->98396 98392 b931d0 DefWindowProcW 98397 b9316a 98392->98397 98437 b918e2 10 API calls 98393->98437 98398 b931f8 98394->98398 98399 b9321d SetTimer RegisterWindowMessageW 98394->98399 98401 bd2e7c 98395->98401 98402 b931a4 98395->98402 98396->98397 98403 bd2d9c 98398->98403 98404 b93201 KillTimer 98398->98404 98399->98397 98406 b93246 CreatePopupMenu I_RpcFreeBuffer 98399->98406 98452 bfbf30 34 API calls ___scrt_fastfail 98401->98452 98407 bd2e68 98402->98407 98408 b931ae 98402->98408 98410 bd2dd7 MoveWindow 98403->98410 98411 bd2da1 98403->98411 98433 b930f2 Shell_NotifyIconW ___scrt_fastfail 98404->98433 98405 bd2e1c 98438 bae499 42 API calls 98405->98438 98415 b93253 98406->98415 98451 bfc161 27 API calls ___scrt_fastfail 98407->98451 98416 bd2e4d 98408->98416 98417 b931b9 98408->98417 98410->98397 98419 bd2da7 98411->98419 98420 bd2dc6 SetFocus 98411->98420 98435 b9326f 44 API calls ___scrt_fastfail 98415->98435 98416->98392 98450 bf0ad7 22 API calls 98416->98450 98417->98415 98423 b931c4 98417->98423 98418 bd2e8e 98418->98392 98418->98397 98419->98423 98425 bd2db0 98419->98425 98420->98397 98421 b93214 98434 b93c50 DeleteObject DestroyWindow 98421->98434 98422 b93263 98422->98397 98423->98392 98439 b930f2 Shell_NotifyIconW ___scrt_fastfail 98423->98439 98436 b918e2 10 API calls 98425->98436 98429->98392 98431 bd2e41 98440 b93837 98431->98440 98433->98421 98434->98397 98435->98422 98436->98397 98437->98405 98438->98423 98439->98431 98441 b93862 ___scrt_fastfail 98440->98441 98453 b94212 98441->98453 98444 b938e8 98446 bd3386 Shell_NotifyIconW 98444->98446 98447 b93906 Shell_NotifyIconW 98444->98447 98457 b93923 98447->98457 98449 b9391c 98449->98429 98450->98429 98451->98422 98452->98418 98454 bd35a4 98453->98454 98455 b938b7 98453->98455 98454->98455 98456 bd35ad DestroyIcon 98454->98456 98455->98444 98479 bfc874 42 API calls _strftime 98455->98479 98456->98455 98458 b9393f 98457->98458 98477 b93a13 98457->98477 98459 b96270 22 API calls 98458->98459 98460 b9394d 98459->98460 98461 b9395a 98460->98461 98462 bd3393 LoadStringW 98460->98462 98463 b96b57 22 API calls 98461->98463 98464 bd33ad 98462->98464 98465 b9396f 98463->98465 98468 b9a8c7 22 API calls 98464->98468 98472 b93994 ___scrt_fastfail 98464->98472 98466 bd33c9 98465->98466 98467 b9397c 98465->98467 98470 b96350 22 API calls 98466->98470 98467->98464 98469 b93986 98467->98469 98468->98472 98471 b96350 22 API calls 98469->98471 98473 bd33d7 98470->98473 98471->98472 98475 b939f9 Shell_NotifyIconW 98472->98475 98473->98472 98474 b933c6 22 API calls 98473->98474 98476 bd33f9 98474->98476 98475->98477 98478 b933c6 22 API calls 98476->98478 98477->98449 98478->98472 98479->98444 98480 b91cad SystemParametersInfoW 98481 3f74400 98495 3f72050 98481->98495 98483 3f744d1 98498 3f742f0 98483->98498 98485 3f744fa CreateFileW 98487 3f7454e 98485->98487 98491 3f74549 98485->98491 98488 3f74565 VirtualAlloc 98487->98488 98487->98491 98489 3f74583 ReadFile 98488->98489 98488->98491 98490 3f7459e 98489->98490 98489->98491 98492 3f732f0 13 API calls 98490->98492 98493 3f745d1 98492->98493 98494 3f745f4 ExitProcess 98493->98494 98494->98491 98501 3f75500 GetPEB 98495->98501 98497 3f726db 98497->98483 98499 3f742f9 Sleep 98498->98499 98500 3f74307 98499->98500 98502 3f7552a 98501->98502 98502->98497 98503 bd2ba5 98504 bd2baf 98503->98504 98505 b92b25 98503->98505 98507 b93a5a 24 API calls 98504->98507 98531 b92b83 7 API calls 98505->98531 98509 bd2bb8 98507->98509 98511 b99cb3 22 API calls 98509->98511 98513 bd2bc6 98511->98513 98512 b92b2f 98516 b93837 49 API calls 98512->98516 98522 b92b44 98512->98522 98514 bd2bce 98513->98514 98515 bd2bf5 98513->98515 98517 b933c6 22 API calls 98514->98517 98518 b933c6 22 API calls 98515->98518 98516->98522 98519 bd2bd9 98517->98519 98520 bd2bf1 GetForegroundWindow ShellExecuteW 98518->98520 98524 b96350 22 API calls 98519->98524 98525 bd2c26 98520->98525 98523 b92b5f 98522->98523 98535 b930f2 Shell_NotifyIconW ___scrt_fastfail 98522->98535 98529 b92b66 SetCurrentDirectoryW 98523->98529 98527 bd2be7 98524->98527 98525->98523 98528 b933c6 22 API calls 98527->98528 98528->98520 98530 b92b7a 98529->98530 98536 b92cd4 7 API calls 98531->98536 98533 b92b2a 98534 b92c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98533->98534 98534->98512 98535->98523 98536->98533 98537 b9ddc0 98540 b9aa19 98537->98540 98539 b9ddcc 98541 b9aa3a 98540->98541 98542 b9aa8f 98540->98542 98541->98542 98544 b9ec40 207 API calls 98541->98544 98543 b9aabe 98542->98543 98550 c0359c 82 API calls __wsopen_s 98542->98550 98543->98539 98547 b9aa6b 98544->98547 98546 bdf907 98546->98546 98547->98543 98549 b9aceb 23 API calls messages 98547->98549 98549->98542 98550->98546 98551 b92de3 98552 b92df0 __wsopen_s 98551->98552 98553 b92e09 98552->98553 98554 bd2c2b ___scrt_fastfail 98552->98554 98555 b93aa2 23 API calls 98553->98555 98557 bd2c47 GetOpenFileNameW 98554->98557 98556 b92e12 98555->98556 98567 b92da5 98556->98567 98558 bd2c96 98557->98558 98560 b96b57 22 API calls 98558->98560 98562 bd2cab 98560->98562 98562->98562 98564 b92e27 98585 b944a8 98564->98585 98568 bd1f50 __wsopen_s 98567->98568 98569 b92db2 GetLongPathNameW 98568->98569 98570 b96b57 22 API calls 98569->98570 98571 b92dda 98570->98571 98572 b93598 98571->98572 98573 b9a961 22 API calls 98572->98573 98574 b935aa 98573->98574 98575 b93aa2 23 API calls 98574->98575 98576 b935b5 98575->98576 98577 bd32eb 98576->98577 98578 b935c0 98576->98578 98583 bd330d 98577->98583 98621 bace60 41 API calls 98577->98621 98579 b9515f 22 API calls 98578->98579 98581 b935cc 98579->98581 98615 b935f3 98581->98615 98584 b935df 98584->98564 98586 b94ecb 94 API calls 98585->98586 98587 b944cd 98586->98587 98588 bd3833 98587->98588 98590 b94ecb 94 API calls 98587->98590 98589 c02cf9 80 API calls 98588->98589 98591 bd3848 98589->98591 98592 b944e1 98590->98592 98593 bd384c 98591->98593 98594 bd3869 98591->98594 98592->98588 98595 b944e9 98592->98595 98596 b94f39 68 API calls 98593->98596 98597 bafe0b 22 API calls 98594->98597 98598 bd3854 98595->98598 98599 b944f5 98595->98599 98596->98598 98614 bd38ae 98597->98614 98646 bfda5a 82 API calls 98598->98646 98645 b9940c 136 API calls 2 library calls 98599->98645 98602 bd3862 98602->98594 98603 b92e31 98604 bd3a5f 98609 bd3a67 98604->98609 98605 b94f39 68 API calls 98605->98609 98609->98605 98648 bf989b 82 API calls __wsopen_s 98609->98648 98611 b99cb3 22 API calls 98611->98614 98614->98604 98614->98609 98614->98611 98622 bf967e 98614->98622 98625 c00b5a 98614->98625 98631 b9a4a1 98614->98631 98639 b93ff7 98614->98639 98647 bf95ad 42 API calls _wcslen 98614->98647 98616 b93605 98615->98616 98620 b93624 __fread_nolock 98615->98620 98618 bafe0b 22 API calls 98616->98618 98617 bafddb 22 API calls 98619 b9363b 98617->98619 98618->98620 98619->98584 98620->98617 98621->98577 98623 bafe0b 22 API calls 98622->98623 98624 bf96ae __fread_nolock 98623->98624 98624->98614 98626 c00b65 98625->98626 98627 bafddb 22 API calls 98626->98627 98628 c00b7c 98627->98628 98629 b99cb3 22 API calls 98628->98629 98630 c00b87 98629->98630 98630->98614 98632 b9a52b 98631->98632 98637 b9a4b1 __fread_nolock 98631->98637 98634 bafe0b 22 API calls 98632->98634 98633 bafddb 22 API calls 98635 b9a4b8 98633->98635 98634->98637 98636 bafddb 22 API calls 98635->98636 98638 b9a4d6 98635->98638 98636->98638 98637->98633 98638->98614 98640 b9400a 98639->98640 98642 b940ae 98639->98642 98641 bafe0b 22 API calls 98640->98641 98644 b9403c 98640->98644 98641->98644 98642->98614 98643 bafddb 22 API calls 98643->98644 98644->98642 98644->98643 98645->98603 98646->98602 98647->98614 98648->98609 98649 b9dee5 98652 b9b710 98649->98652 98653 b9b72b 98652->98653 98654 be00f8 98653->98654 98655 be0146 98653->98655 98663 b9b750 98653->98663 98658 be0102 98654->98658 98661 be010f 98654->98661 98654->98663 98694 c158a2 207 API calls 2 library calls 98655->98694 98692 c15d33 207 API calls 98658->98692 98679 b9ba20 98661->98679 98693 c161d0 207 API calls 2 library calls 98661->98693 98667 b9bbe0 40 API calls 98663->98667 98668 bad336 40 API calls 98663->98668 98671 b9ba4e 98663->98671 98672 be0322 98663->98672 98663->98679 98680 b9ec40 207 API calls 98663->98680 98681 b9a8c7 22 API calls 98663->98681 98683 b9a81b 41 API calls 98663->98683 98684 bad2f0 40 API calls 98663->98684 98685 baa01b 207 API calls 98663->98685 98686 bb0242 5 API calls __Init_thread_wait 98663->98686 98687 baedcd 22 API calls 98663->98687 98688 bb00a3 29 API calls __onexit 98663->98688 98689 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98663->98689 98690 baee53 82 API calls 98663->98690 98691 bae5ca 207 API calls 98663->98691 98695 b9aceb 23 API calls messages 98663->98695 98696 bef6bf 23 API calls 98663->98696 98665 be03d9 98665->98665 98667->98663 98668->98663 98697 c15c0c 82 API calls 98672->98697 98679->98671 98698 c0359c 82 API calls __wsopen_s 98679->98698 98680->98663 98681->98663 98683->98663 98684->98663 98685->98663 98686->98663 98687->98663 98688->98663 98689->98663 98690->98663 98691->98663 98692->98661 98693->98679 98694->98663 98695->98663 98696->98663 98697->98679 98698->98665 98699 b91044 98704 b910f3 98699->98704 98701 b9104a 98740 bb00a3 29 API calls __onexit 98701->98740 98703 b91054 98741 b91398 98704->98741 98708 b9116a 98709 b9a961 22 API calls 98708->98709 98710 b91174 98709->98710 98711 b9a961 22 API calls 98710->98711 98712 b9117e 98711->98712 98713 b9a961 22 API calls 98712->98713 98714 b91188 98713->98714 98715 b9a961 22 API calls 98714->98715 98716 b911c6 98715->98716 98717 b9a961 22 API calls 98716->98717 98718 b91292 98717->98718 98751 b9171c 98718->98751 98722 b912c4 98723 b9a961 22 API calls 98722->98723 98724 b912ce 98723->98724 98725 ba1940 9 API calls 98724->98725 98726 b912f9 98725->98726 98772 b91aab 98726->98772 98728 b91315 98729 b91325 GetStdHandle 98728->98729 98730 b9137a 98729->98730 98731 bd2485 98729->98731 98734 b91387 OleInitialize 98730->98734 98731->98730 98732 bd248e 98731->98732 98733 bafddb 22 API calls 98732->98733 98735 bd2495 98733->98735 98734->98701 98779 c0011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98735->98779 98737 bd249e 98780 c00944 CreateThread 98737->98780 98739 bd24aa CloseHandle 98739->98730 98740->98703 98781 b913f1 98741->98781 98744 b913f1 22 API calls 98745 b913d0 98744->98745 98746 b9a961 22 API calls 98745->98746 98747 b913dc 98746->98747 98748 b96b57 22 API calls 98747->98748 98749 b91129 98748->98749 98750 b91bc3 6 API calls 98749->98750 98750->98708 98752 b9a961 22 API calls 98751->98752 98753 b9172c 98752->98753 98754 b9a961 22 API calls 98753->98754 98755 b91734 98754->98755 98756 b9a961 22 API calls 98755->98756 98757 b9174f 98756->98757 98758 bafddb 22 API calls 98757->98758 98759 b9129c 98758->98759 98760 b91b4a 98759->98760 98761 b91b58 98760->98761 98762 b9a961 22 API calls 98761->98762 98763 b91b63 98762->98763 98764 b9a961 22 API calls 98763->98764 98765 b91b6e 98764->98765 98766 b9a961 22 API calls 98765->98766 98767 b91b79 98766->98767 98768 b9a961 22 API calls 98767->98768 98769 b91b84 98768->98769 98770 bafddb 22 API calls 98769->98770 98771 b91b96 RegisterWindowMessageW 98770->98771 98771->98722 98773 bd272d 98772->98773 98774 b91abb 98772->98774 98788 c03209 23 API calls 98773->98788 98776 bafddb 22 API calls 98774->98776 98778 b91ac3 98776->98778 98777 bd2738 98778->98728 98779->98737 98780->98739 98789 c0092a 28 API calls 98780->98789 98782 b9a961 22 API calls 98781->98782 98783 b913fc 98782->98783 98784 b9a961 22 API calls 98783->98784 98785 b91404 98784->98785 98786 b9a961 22 API calls 98785->98786 98787 b913c6 98786->98787 98787->98744 98788->98777 98790 be2a00 98805 b9d7b0 messages 98790->98805 98791 b9db11 PeekMessageW 98791->98805 98792 b9d807 GetInputState 98792->98791 98792->98805 98793 be1cbe TranslateAcceleratorW 98793->98805 98795 b9db8f PeekMessageW 98795->98805 98796 b9da04 timeGetTime 98796->98805 98797 b9db73 TranslateMessage DispatchMessageW 98797->98795 98798 b9dbaf Sleep 98816 b9dbc0 98798->98816 98799 be2b74 Sleep 98799->98816 98800 bae551 timeGetTime 98800->98816 98801 be1dda timeGetTime 98853 bae300 23 API calls 98801->98853 98804 be2c0b GetExitCodeProcess 98806 be2c37 CloseHandle 98804->98806 98807 be2c21 WaitForSingleObject 98804->98807 98805->98791 98805->98792 98805->98793 98805->98795 98805->98796 98805->98797 98805->98798 98805->98799 98805->98801 98810 b9d9d5 98805->98810 98818 b9ec40 207 API calls 98805->98818 98819 ba1310 207 API calls 98805->98819 98820 b9bf40 207 API calls 98805->98820 98822 b9dd50 98805->98822 98829 b9dfd0 98805->98829 98852 baedf6 IsDialogMessageW GetClassLongW 98805->98852 98854 c03a2a 23 API calls 98805->98854 98855 c0359c 82 API calls __wsopen_s 98805->98855 98806->98816 98807->98805 98807->98806 98808 be2a31 98808->98810 98809 c229bf GetForegroundWindow 98809->98816 98812 be2ca9 Sleep 98812->98805 98816->98800 98816->98804 98816->98805 98816->98808 98816->98809 98816->98810 98816->98812 98856 c15658 23 API calls 98816->98856 98857 bfe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98816->98857 98858 bfd4dc 47 API calls 98816->98858 98818->98805 98819->98805 98820->98805 98823 b9dd6f 98822->98823 98824 b9dd83 98822->98824 98859 b9d260 207 API calls 2 library calls 98823->98859 98860 c0359c 82 API calls __wsopen_s 98824->98860 98827 b9dd7a 98827->98805 98828 be2f75 98828->98828 98830 b9e010 98829->98830 98847 b9e0dc messages 98830->98847 98863 bb0242 5 API calls __Init_thread_wait 98830->98863 98832 c0359c 82 API calls 98832->98847 98834 be2fca 98836 b9a961 22 API calls 98834->98836 98834->98847 98835 b9a961 22 API calls 98835->98847 98839 be2fe4 98836->98839 98864 bb00a3 29 API calls __onexit 98839->98864 98842 be2fee 98865 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98842->98865 98844 b9ec40 207 API calls 98844->98847 98846 b9a8c7 22 API calls 98846->98847 98847->98832 98847->98835 98847->98844 98847->98846 98848 ba04f0 22 API calls 98847->98848 98849 b9e3e1 98847->98849 98861 b9a81b 41 API calls 98847->98861 98862 baa308 207 API calls 98847->98862 98866 bb0242 5 API calls __Init_thread_wait 98847->98866 98867 bb00a3 29 API calls __onexit 98847->98867 98868 bb01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98847->98868 98869 c147d4 207 API calls 98847->98869 98870 c168c1 207 API calls 98847->98870 98848->98847 98849->98805 98852->98805 98853->98805 98854->98805 98855->98805 98856->98816 98857->98816 98858->98816 98859->98827 98860->98828 98861->98847 98862->98847 98863->98834 98864->98842 98865->98847 98866->98847 98867->98847 98868->98847 98869->98847 98870->98847 98871 bc8402 98876 bc81be 98871->98876 98874 bc842a 98881 bc81ef try_get_first_available_module 98876->98881 98878 bc83ee 98895 bc27ec 26 API calls __fread_nolock 98878->98895 98880 bc8343 98880->98874 98888 bd0984 98880->98888 98884 bc8338 98881->98884 98891 bb8e0b 40 API calls 2 library calls 98881->98891 98883 bc838c 98883->98884 98892 bb8e0b 40 API calls 2 library calls 98883->98892 98884->98880 98894 bbf2d9 20 API calls _free 98884->98894 98886 bc83ab 98886->98884 98893 bb8e0b 40 API calls 2 library calls 98886->98893 98896 bd0081 98888->98896 98890 bd099f 98890->98874 98891->98883 98892->98886 98893->98884 98894->98878 98895->98880 98899 bd008d CallCatchBlock 98896->98899 98897 bd009b 98954 bbf2d9 20 API calls _free 98897->98954 98899->98897 98901 bd00d4 98899->98901 98900 bd00a0 98955 bc27ec 26 API calls __fread_nolock 98900->98955 98907 bd065b 98901->98907 98906 bd00aa __fread_nolock 98906->98890 98957 bd042f 98907->98957 98910 bd068d 98989 bbf2c6 20 API calls _free 98910->98989 98911 bd06a6 98975 bc5221 98911->98975 98914 bd0692 98990 bbf2d9 20 API calls _free 98914->98990 98915 bd06ab 98916 bd06cb 98915->98916 98917 bd06b4 98915->98917 98988 bd039a CreateFileW 98916->98988 98991 bbf2c6 20 API calls _free 98917->98991 98921 bd06b9 98992 bbf2d9 20 API calls _free 98921->98992 98922 bd0781 GetFileType 98925 bd078c GetLastError 98922->98925 98926 bd07d3 98922->98926 98924 bd0756 GetLastError 98994 bbf2a3 20 API calls 2 library calls 98924->98994 98995 bbf2a3 20 API calls 2 library calls 98925->98995 98997 bc516a 21 API calls 3 library calls 98926->98997 98927 bd0704 98927->98922 98927->98924 98993 bd039a CreateFileW 98927->98993 98931 bd079a CloseHandle 98931->98914 98934 bd07c3 98931->98934 98933 bd0749 98933->98922 98933->98924 98996 bbf2d9 20 API calls _free 98934->98996 98935 bd07f4 98937 bd0840 98935->98937 98998 bd05ab 72 API calls 4 library calls 98935->98998 98942 bd086d 98937->98942 98999 bd014d 72 API calls 4 library calls 98937->98999 98938 bd07c8 98938->98914 98941 bd0866 98941->98942 98943 bd087e 98941->98943 98944 bc86ae __wsopen_s 29 API calls 98942->98944 98945 bd00f8 98943->98945 98946 bd08fc CloseHandle 98943->98946 98944->98945 98956 bd0121 LeaveCriticalSection __wsopen_s 98945->98956 99000 bd039a CreateFileW 98946->99000 98948 bd0927 98949 bd0931 GetLastError 98948->98949 98950 bd095d 98948->98950 99001 bbf2a3 20 API calls 2 library calls 98949->99001 98950->98945 98952 bd093d 99002 bc5333 21 API calls 3 library calls 98952->99002 98954->98900 98955->98906 98956->98906 98958 bd0450 98957->98958 98963 bd046a 98957->98963 98958->98963 99010 bbf2d9 20 API calls _free 98958->99010 98961 bd045f 99011 bc27ec 26 API calls __fread_nolock 98961->99011 99003 bd03bf 98963->99003 98964 bd04d1 98973 bd0524 98964->98973 99014 bbd70d 26 API calls 2 library calls 98964->99014 98965 bd04a2 98965->98964 99012 bbf2d9 20 API calls _free 98965->99012 98968 bd051f 98970 bd059e 98968->98970 98968->98973 98969 bd04c6 99013 bc27ec 26 API calls __fread_nolock 98969->99013 99015 bc27fc 11 API calls _abort 98970->99015 98973->98910 98973->98911 98974 bd05aa 98976 bc522d CallCatchBlock 98975->98976 99018 bc2f5e EnterCriticalSection 98976->99018 98978 bc5234 98980 bc5259 98978->98980 98984 bc52c7 EnterCriticalSection 98978->98984 98987 bc527b 98978->98987 98981 bc5000 __wsopen_s 21 API calls 98980->98981 98983 bc525e 98981->98983 98982 bc52a4 __fread_nolock 98982->98915 98983->98987 99022 bc5147 EnterCriticalSection 98983->99022 98986 bc52d4 LeaveCriticalSection 98984->98986 98984->98987 98986->98978 99019 bc532a 98987->99019 98988->98927 98989->98914 98990->98945 98991->98921 98992->98914 98993->98933 98994->98914 98995->98931 98996->98938 98997->98935 98998->98937 98999->98941 99000->98948 99001->98952 99002->98950 99005 bd03d7 99003->99005 99004 bd03f2 99004->98965 99005->99004 99016 bbf2d9 20 API calls _free 99005->99016 99007 bd0416 99017 bc27ec 26 API calls __fread_nolock 99007->99017 99009 bd0421 99009->98965 99010->98961 99011->98963 99012->98969 99013->98964 99014->98968 99015->98974 99016->99007 99017->99009 99018->98978 99023 bc2fa6 LeaveCriticalSection 99019->99023 99021 bc5331 99021->98982 99022->98987 99023->99021 99024 be3a41 99028 c010c0 99024->99028 99026 be3a4c 99027 c010c0 53 API calls 99026->99027 99027->99026 99032 c010cd 99028->99032 99038 c010fa 99028->99038 99029 c010fc 99040 bafa11 53 API calls 99029->99040 99030 c01101 99033 b97510 53 API calls 99030->99033 99032->99029 99032->99030 99036 c010f4 99032->99036 99032->99038 99034 c01108 99033->99034 99035 b96350 22 API calls 99034->99035 99035->99038 99039 b9b270 39 API calls 99036->99039 99038->99026 99039->99038 99040->99030

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 234 b942de-b9434d call b9a961 GetVersionExW call b96b57 239 bd3617-bd362a 234->239 240 b94353 234->240 241 bd362b-bd362f 239->241 242 b94355-b94357 240->242 243 bd3631 241->243 244 bd3632-bd363e 241->244 245 b9435d-b943bc call b993b2 call b937a0 242->245 246 bd3656 242->246 243->244 244->241 247 bd3640-bd3642 244->247 263 bd37df-bd37e6 245->263 264 b943c2-b943c4 245->264 250 bd365d-bd3660 246->250 247->242 249 bd3648-bd364f 247->249 249->239 252 bd3651 249->252 253 b9441b-b94435 GetCurrentProcess IsWow64Process 250->253 254 bd3666-bd36a8 250->254 252->246 256 b94494-b9449a 253->256 257 b94437 253->257 254->253 258 bd36ae-bd36b1 254->258 260 b9443d-b94449 256->260 257->260 261 bd36db-bd36e5 258->261 262 bd36b3-bd36bd 258->262 270 b9444f-b9445e LoadLibraryA 260->270 271 bd3824-bd3828 GetSystemInfo 260->271 266 bd36f8-bd3702 261->266 267 bd36e7-bd36f3 261->267 272 bd36bf-bd36c5 262->272 273 bd36ca-bd36d6 262->273 268 bd37e8 263->268 269 bd3806-bd3809 263->269 264->250 265 b943ca-b943dd 264->265 274 b943e3-b943e5 265->274 275 bd3726-bd372f 265->275 277 bd3715-bd3721 266->277 278 bd3704-bd3710 266->278 267->253 276 bd37ee 268->276 279 bd380b-bd381a 269->279 280 bd37f4-bd37fc 269->280 281 b9449c-b944a6 GetSystemInfo 270->281 282 b94460-b9446e GetProcAddress 270->282 272->253 273->253 284 bd374d-bd3762 274->284 285 b943eb-b943ee 274->285 286 bd373c-bd3748 275->286 287 bd3731-bd3737 275->287 276->280 277->253 278->253 279->276 288 bd381c-bd3822 279->288 280->269 283 b94476-b94478 281->283 282->281 289 b94470-b94474 GetNativeSystemInfo 282->289 294 b9447a-b9447b FreeLibrary 283->294 295 b94481-b94493 283->295 292 bd376f-bd377b 284->292 293 bd3764-bd376a 284->293 290 bd3791-bd3794 285->290 291 b943f4-b9440f 285->291 286->253 287->253 288->280 289->283 290->253 298 bd379a-bd37c1 290->298 296 b94415 291->296 297 bd3780-bd378c 291->297 292->253 293->253 294->295 296->253 297->253 299 bd37ce-bd37da 298->299 300 bd37c3-bd37c9 298->300 299->253 300->253
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00B9430D
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                        • GetCurrentProcess.KERNEL32(?,00C2CB64,00000000,?,?), ref: 00B94422
                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 00B94429
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00B94454
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00B94466
                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00B94474
                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B9447B
                        • GetSystemInfo.KERNEL32(?,?,?), ref: 00B944A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                        • API String ID: 3290436268-3101561225
                        • Opcode ID: fb5027e683237ba800bb11721149c52f8e352b7b3a230445a264cba41e52364f
                        • Instruction ID: def125470eb996afcd5bde5407d06639d30d2e87b2a4be8223ad0d79be36d8e5
                        • Opcode Fuzzy Hash: fb5027e683237ba800bb11721149c52f8e352b7b3a230445a264cba41e52364f
                        • Instruction Fuzzy Hash: D4A1626595A2C0DFCB31CB6A788179D7FE4AB36702B1C54F9D84393B32D6A04A05CB62

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 553 b942a2-b942ba CreateStreamOnHGlobal 554 b942da-b942dd 553->554 555 b942bc-b942d3 FindResourceExW 553->555 556 b942d9 555->556 557 bd35ba-bd35c9 LoadResource 555->557 556->554 557->556 558 bd35cf-bd35dd SizeofResource 557->558 558->556 559 bd35e3-bd35ee LockResource 558->559 559->556 560 bd35f4-bd35fc 559->560 561 bd3600-bd3612 560->561 561->556
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00B950AA,?,?,00000000,00000000), ref: 00B942B2
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00B950AA,?,?,00000000,00000000), ref: 00B942C9
                        • LoadResource.KERNEL32(?,00000000,?,?,00B950AA,?,?,00000000,00000000,?,?,?,?,?,?,00B94F20), ref: 00BD35BE
                        • SizeofResource.KERNEL32(?,00000000,?,?,00B950AA,?,?,00000000,00000000,?,?,?,?,?,?,00B94F20), ref: 00BD35D3
                        • LockResource.KERNEL32(00B950AA,?,?,00B950AA,?,?,00000000,00000000,?,?,?,?,?,?,00B94F20,?), ref: 00BD35E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: b8a86ca5f4c35ccf98bba34343f9e7d480f657a5bc51e501732515085bc6c4d5
                        • Instruction ID: 71e23e9f732c553f93c75848d62088e0066d89c141aa5ee89c016c36400e776f
                        • Opcode Fuzzy Hash: b8a86ca5f4c35ccf98bba34343f9e7d480f657a5bc51e501732515085bc6c4d5
                        • Instruction Fuzzy Hash: B5117C70210700BFEB258B65EC88F2B7BB9EFC5B51F2081A9B41296690EB71D8058630

                        Control-flow Graph

                        APIs
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B92B6B
                          • Part of subcall function 00B93A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00C61418,?,00B92E7F,?,?,?,00000000), ref: 00B93A78
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00C52224), ref: 00BD2C10
                        • ShellExecuteW.SHELL32(00000000,?,?,00C52224), ref: 00BD2C17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                        • String ID: runas
                        • API String ID: 448630720-4000483414
                        • Opcode ID: 6c9464ac65bdb36828a5e31839594017c240f8fc7178c13a65a1ce71c5cad165
                        • Instruction ID: c3bfbc0599ac0280daad49c8ea2e004aa356dbfe58455959d7fec00cd208c434
                        • Opcode Fuzzy Hash: 6c9464ac65bdb36828a5e31839594017c240f8fc7178c13a65a1ce71c5cad165
                        • Instruction Fuzzy Hash: BC11B1316083416ACF24FF64D892ABEB7E49FA1752F4844BDF582530A2DF618A4A8712
                        APIs
                        • GetInputState.USER32 ref: 00B9D807
                        • timeGetTime.WINMM ref: 00B9DA07
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B9DB28
                        • TranslateMessage.USER32(?), ref: 00B9DB7B
                        • DispatchMessageW.USER32(?), ref: 00B9DB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B9DB9F
                        • Sleep.KERNEL32(0000000A), ref: 00B9DBB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                        • String ID:
                        • API String ID: 2189390790-0
                        • Opcode ID: af989b264df7ffc2e7365a2196272fada2fa1ae2da5757c2d4b5dced05c41837
                        • Instruction ID: 3988191c9ff279a6650c28c11b67fd8fbf9e97e3a298535a26d305b015a68137
                        • Opcode Fuzzy Hash: af989b264df7ffc2e7365a2196272fada2fa1ae2da5757c2d4b5dced05c41837
                        • Instruction Fuzzy Hash: 0442D030608681EFDB34DF26C884BAAB7E5FF45314F188ABDE55687291D770E844CB92

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00B92D07
                        • RegisterClassExW.USER32(00000030), ref: 00B92D31
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B92D42
                        • InitCommonControlsEx.COMCTL32(?), ref: 00B92D5F
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B92D6F
                        • LoadIconW.USER32(000000A9), ref: 00B92D85
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B92D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: 7ebe64bc972b9345dd7f5c54e15703ade486a8a2935a6f90b16f4bee6af099fe
                        • Instruction ID: de0d987367c6ce6140541692d61a3bb43ab611b700fe77d0cf96303304772037
                        • Opcode Fuzzy Hash: 7ebe64bc972b9345dd7f5c54e15703ade486a8a2935a6f90b16f4bee6af099fe
                        • Instruction Fuzzy Hash: 7C21C3B5911218AFDB20DFA5E889BDDBBB4FB08702F08411AF911A66A0D7B14545CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 302 bd065b-bd068b call bd042f 305 bd068d-bd0698 call bbf2c6 302->305 306 bd06a6-bd06b2 call bc5221 302->306 311 bd069a-bd06a1 call bbf2d9 305->311 312 bd06cb-bd0714 call bd039a 306->312 313 bd06b4-bd06c9 call bbf2c6 call bbf2d9 306->313 322 bd097d-bd0983 311->322 320 bd0716-bd071f 312->320 321 bd0781-bd078a GetFileType 312->321 313->311 324 bd0756-bd077c GetLastError call bbf2a3 320->324 325 bd0721-bd0725 320->325 326 bd078c-bd07bd GetLastError call bbf2a3 CloseHandle 321->326 327 bd07d3-bd07d6 321->327 324->311 325->324 331 bd0727-bd0754 call bd039a 325->331 326->311 341 bd07c3-bd07ce call bbf2d9 326->341 329 bd07df-bd07e5 327->329 330 bd07d8-bd07dd 327->330 334 bd07e9-bd0837 call bc516a 329->334 335 bd07e7 329->335 330->334 331->321 331->324 344 bd0839-bd0845 call bd05ab 334->344 345 bd0847-bd086b call bd014d 334->345 335->334 341->311 344->345 351 bd086f-bd0879 call bc86ae 344->351 352 bd086d 345->352 353 bd087e-bd08c1 345->353 351->322 352->351 354 bd08c3-bd08c7 353->354 355 bd08e2-bd08f0 353->355 354->355 358 bd08c9-bd08dd 354->358 359 bd097b 355->359 360 bd08f6-bd08fa 355->360 358->355 359->322 360->359 361 bd08fc-bd092f CloseHandle call bd039a 360->361 364 bd0931-bd095d GetLastError call bbf2a3 call bc5333 361->364 365 bd0963-bd0977 361->365 364->365 365->359
                        APIs
                          • Part of subcall function 00BD039A: CreateFileW.KERNELBASE(00000000,00000000,?,00BD0704,?,?,00000000,?,00BD0704,00000000,0000000C), ref: 00BD03B7
                        • GetLastError.KERNEL32 ref: 00BD076F
                        • __dosmaperr.LIBCMT ref: 00BD0776
                        • GetFileType.KERNELBASE(00000000), ref: 00BD0782
                        • GetLastError.KERNEL32 ref: 00BD078C
                        • __dosmaperr.LIBCMT ref: 00BD0795
                        • CloseHandle.KERNEL32(00000000), ref: 00BD07B5
                        • CloseHandle.KERNEL32(?), ref: 00BD08FF
                        • GetLastError.KERNEL32 ref: 00BD0931
                        • __dosmaperr.LIBCMT ref: 00BD0938
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID: H
                        • API String ID: 4237864984-2852464175
                        • Opcode ID: 3d09287cb6feef3936fae8bb94e97aec91b3d924b4cbb3fc6e4f184bf9d864b8
                        • Instruction ID: 078def0a972927879128a5505c80cee9fc88cf00354ce546b577b25122cb332a
                        • Opcode Fuzzy Hash: 3d09287cb6feef3936fae8bb94e97aec91b3d924b4cbb3fc6e4f184bf9d864b8
                        • Instruction Fuzzy Hash: 25A106329141059FDF29EF68D891BAEBBE0EB46320F14019AF815AF391E7719C13CB91

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00B93A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00C61418,?,00B92E7F,?,?,?,00000000), ref: 00B93A78
                          • Part of subcall function 00B93357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B93379
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00B9356A
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00BD318D
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00BD31CE
                        • RegCloseKey.ADVAPI32(?), ref: 00BD3210
                        • _wcslen.LIBCMT ref: 00BD3277
                        • _wcslen.LIBCMT ref: 00BD3286
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 98802146-2727554177
                        • Opcode ID: 272ee6d7d1f0492ac39eadbb0c19be73e6bfa48fdd6fbd8158b2b2b73b85e3f3
                        • Instruction ID: 1313adcd1ff82e98a7adb2029601b4244aaa76065b6cf90c4a3cb3a04a80ee8e
                        • Opcode Fuzzy Hash: 272ee6d7d1f0492ac39eadbb0c19be73e6bfa48fdd6fbd8158b2b2b73b85e3f3
                        • Instruction Fuzzy Hash: 57715D715047019EC724EF66DC81AAFBBE8FF95740B40087EF545932B1EBB09A49CB52

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00B92B8E
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00B92B9D
                        • LoadIconW.USER32(00000063), ref: 00B92BB3
                        • LoadIconW.USER32(000000A4), ref: 00B92BC5
                        • LoadIconW.USER32(000000A2), ref: 00B92BD7
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00B92BEF
                        • RegisterClassExW.USER32(?), ref: 00B92C40
                          • Part of subcall function 00B92CD4: GetSysColorBrush.USER32(0000000F), ref: 00B92D07
                          • Part of subcall function 00B92CD4: RegisterClassExW.USER32(00000030), ref: 00B92D31
                          • Part of subcall function 00B92CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B92D42
                          • Part of subcall function 00B92CD4: InitCommonControlsEx.COMCTL32(?), ref: 00B92D5F
                          • Part of subcall function 00B92CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B92D6F
                          • Part of subcall function 00B92CD4: LoadIconW.USER32(000000A9), ref: 00B92D85
                          • Part of subcall function 00B92CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B92D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: 81cad0378b4b496da31352ba1c8271f67349279067c8a795d12309c6c750bb3f
                        • Instruction ID: 8b826056f9cdc966add8587dfb5ea2e70e2b1dfd6ec44025f32f60fef1b83a5b
                        • Opcode Fuzzy Hash: 81cad0378b4b496da31352ba1c8271f67349279067c8a795d12309c6c750bb3f
                        • Instruction Fuzzy Hash: B2210971E10314ABDB209FA6EC95BAD7FB4FB48B51F08006AEA01A67B0D7F14541DF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 443 b93170-b93185 444 b931e5-b931e7 443->444 445 b93187-b9318a 443->445 444->445 446 b931e9 444->446 447 b931eb 445->447 448 b9318c-b93193 445->448 449 b931d0-b931d8 DefWindowProcW 446->449 450 bd2dfb-bd2e23 call b918e2 call bae499 447->450 451 b931f1-b931f6 447->451 452 b93199-b9319e 448->452 453 b93265-b9326d PostQuitMessage 448->453 454 b931de-b931e4 449->454 490 bd2e28-bd2e2f 450->490 456 b931f8-b931fb 451->456 457 b9321d-b93244 SetTimer RegisterWindowMessageW 451->457 459 bd2e7c-bd2e90 call bfbf30 452->459 460 b931a4-b931a8 452->460 455 b93219-b9321b 453->455 455->454 461 bd2d9c-bd2d9f 456->461 462 b93201-b93214 KillTimer call b930f2 call b93c50 456->462 457->455 464 b93246-b93251 CreatePopupMenu I_RpcFreeBuffer 457->464 459->455 485 bd2e96 459->485 465 bd2e68-bd2e77 call bfc161 460->465 466 b931ae-b931b3 460->466 468 bd2dd7-bd2df6 MoveWindow 461->468 469 bd2da1-bd2da5 461->469 462->455 473 b93253-b93263 call b9326f 464->473 465->455 474 bd2e4d-bd2e54 466->474 475 b931b9-b931be 466->475 468->455 477 bd2da7-bd2daa 469->477 478 bd2dc6-bd2dd2 SetFocus 469->478 473->455 474->449 479 bd2e5a-bd2e63 call bf0ad7 474->479 475->473 484 b931c4-b931ca 475->484 477->484 486 bd2db0-bd2dc1 call b918e2 477->486 478->455 479->449 484->449 484->490 485->449 486->455 490->449 491 bd2e35-bd2e48 call b930f2 call b93837 490->491 491->449
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00B9316A,?,?), ref: 00B931D8
                        • KillTimer.USER32(?,00000001,?,?,?,?,?,00B9316A,?,?), ref: 00B93204
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B93227
                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00B9316A,?,?), ref: 00B93232
                        • CreatePopupMenu.USER32 ref: 00B93246
                        • PostQuitMessage.USER32(00000000), ref: 00B93267
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: 4a7df6ab1fd6591ab26d39007163628c81e3469c9a6f2420ee04389fd8e0c780
                        • Instruction ID: fa3c2193aa01566f8248e2d5c46eed42937acb0fbc25a9b902ee43aa649ec4fd
                        • Opcode Fuzzy Hash: 4a7df6ab1fd6591ab26d39007163628c81e3469c9a6f2420ee04389fd8e0c780
                        • Instruction Fuzzy Hash: B6414431214204ABDF342B789D8DB7D3ADAEB05B41F0C41B6F912D62B1DBB18A41E7A1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 499 3f74650-3f746fe call 3f72050 502 3f74705-3f7472b call 3f75560 CreateFileW 499->502 505 3f74732-3f74742 502->505 506 3f7472d 502->506 511 3f74744 505->511 512 3f74749-3f74763 VirtualAlloc 505->512 507 3f7487d-3f74881 506->507 508 3f748c3-3f748c6 507->508 509 3f74883-3f74887 507->509 513 3f748c9-3f748d0 508->513 514 3f74893-3f74897 509->514 515 3f74889-3f7488c 509->515 511->507 516 3f74765 512->516 517 3f7476a-3f74781 ReadFile 512->517 518 3f74925-3f7493a 513->518 519 3f748d2-3f748dd 513->519 520 3f748a7-3f748ab 514->520 521 3f74899-3f748a3 514->521 515->514 516->507 524 3f74783 517->524 525 3f74788-3f747c8 VirtualAlloc 517->525 528 3f7493c-3f74947 VirtualFree 518->528 529 3f7494a-3f74952 518->529 526 3f748e1-3f748ed 519->526 527 3f748df 519->527 522 3f748ad-3f748b7 520->522 523 3f748bb 520->523 521->520 522->523 523->508 524->507 530 3f747cf-3f747ea call 3f757b0 525->530 531 3f747ca 525->531 532 3f74901-3f7490d 526->532 533 3f748ef-3f748ff 526->533 527->518 528->529 539 3f747f5-3f747ff 530->539 531->507 536 3f7490f-3f74918 532->536 537 3f7491a-3f74920 532->537 535 3f74923 533->535 535->513 536->535 537->535 540 3f74832-3f74846 call 3f755c0 539->540 541 3f74801-3f74830 call 3f757b0 539->541 546 3f7484a-3f7484e 540->546 547 3f74848 540->547 541->539 549 3f74850-3f74854 CloseHandle 546->549 550 3f7485a-3f7485e 546->550 547->507 549->550 551 3f74860-3f7486b VirtualFree 550->551 552 3f7486e-3f74877 550->552 551->552 552->502 552->507
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F74721
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F74947
                        Memory Dump Source
                        • Source File: 00000000.00000002.1281015705.0000000003F72000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F72000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3f72000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateFileFreeVirtual
                        • String ID:
                        • API String ID: 204039940-0
                        • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                        • Instruction ID: 146f6570f7b805f6007bd503f62a078848697584c3945796a103d50f3fbe511b
                        • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                        • Instruction Fuzzy Hash: B3A12574E00209EBDB14CFA5C994BEEBBB5FF48305F24819AE115BB280D7759A81CB94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 563 b92c63-b92cd3 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B92C91
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B92CB2
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00B91CAD,?), ref: 00B92CC6
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00B91CAD,?), ref: 00B92CCF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: c94a84a39daa5b4d2ae992adf8ee228ee4bd3630da02826f7b9b775fde629f2b
                        • Instruction ID: a614b59b80c66477c85ff385bd38c4ac132c2df10aea1caa8bfde86f4cd2a4bf
                        • Opcode Fuzzy Hash: c94a84a39daa5b4d2ae992adf8ee228ee4bd3630da02826f7b9b775fde629f2b
                        • Instruction Fuzzy Hash: 5CF0DA755502907AEB711B17AC48F7F2EBDD7CAF51B08006AFD01A26B0C6B15851EAB1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 678 3f74400-3f74547 call 3f72050 call 3f742f0 CreateFileW 685 3f7454e-3f7455e 678->685 686 3f74549 678->686 689 3f74565-3f7457f VirtualAlloc 685->689 690 3f74560 685->690 687 3f745fe-3f74603 686->687 691 3f74583-3f7459a ReadFile 689->691 692 3f74581 689->692 690->687 693 3f7459e-3f745d8 call 3f74330 call 3f732f0 691->693 694 3f7459c 691->694 692->687 699 3f745f4-3f745fc ExitProcess 693->699 700 3f745da-3f745ef call 3f74380 693->700 694->687 699->687 700->699
                        APIs
                          • Part of subcall function 03F742F0: Sleep.KERNELBASE(000001F4), ref: 03F74301
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F7453D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1281015705.0000000003F72000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F72000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3f72000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateFileSleep
                        • String ID: PQE449N69DTO0RYQ3W7JL2G
                        • API String ID: 2694422964-2385341446
                        • Opcode ID: 9de6e907028d0c8ab02b49cb35b767eed0351f5cef6874e893842adbbd5ad8d5
                        • Instruction ID: 8317f4cf7c260d1b29a3f07a63eec08d528cc4cb079cd9c2211144e6c4c02b51
                        • Opcode Fuzzy Hash: 9de6e907028d0c8ab02b49cb35b767eed0351f5cef6874e893842adbbd5ad8d5
                        • Instruction Fuzzy Hash: B351A630D04298EBEF11DBE4C844BEEBB79AF14304F044199E2487B2C1DBB91B45CB66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 738 b93b1c-b93b27 739 b93b99-b93b9b 738->739 740 b93b29-b93b2e 738->740 741 b93b8c-b93b8f 739->741 740->739 742 b93b30-b93b48 RegOpenKeyExW 740->742 742->739 743 b93b4a-b93b69 RegQueryValueExW 742->743 744 b93b6b-b93b76 743->744 745 b93b80-b93b8b RegCloseKey 743->745 746 b93b78-b93b7a 744->746 747 b93b90-b93b97 744->747 745->741 748 b93b7e 746->748 747->748 748->745
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00B93B0F,SwapMouseButtons,00000004,?), ref: 00B93B40
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00B93B0F,SwapMouseButtons,00000004,?), ref: 00B93B61
                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00B93B0F,SwapMouseButtons,00000004,?), ref: 00B93B83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: 8d8053a21714bad78be2ba1bb849f0323125015a1e226bc260b3c026601fd1d9
                        • Instruction ID: 1e41cbde5e926b938d9a843260759a0ba463db13e66b0f8965a59dbd66c01ae6
                        • Opcode Fuzzy Hash: 8d8053a21714bad78be2ba1bb849f0323125015a1e226bc260b3c026601fd1d9
                        • Instruction Fuzzy Hash: 92112AB5520208FFDF208FA5DC84EAEB7F8EF04B44B1044A9A805D7210D2719E4197A0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 749 3f732f0-3f73390 call 3f75790 * 3 756 3f733a7 749->756 757 3f73392-3f7339c 749->757 759 3f733ae-3f733b7 756->759 757->756 758 3f7339e-3f733a5 757->758 758->759 760 3f733be-3f73a70 759->760 761 3f73a83-3f73ab0 760->761 762 3f73a72-3f73a76 760->762 775 3f73ab2-3f73ab5 761->775 776 3f73aba 761->776 763 3f73abc-3f73ae9 762->763 764 3f73a78-3f73a7c 762->764 786 3f73af3 763->786 787 3f73aeb-3f73aee 763->787 765 3f73af5-3f73b22 CreateProcessW 764->765 766 3f73a7e 764->766 769 3f73b2c-3f73b46 Wow64GetThreadContext 765->769 780 3f73b24-3f73b27 765->780 766->769 772 3f73b4d-3f73b68 ReadProcessMemory 769->772 773 3f73b48 769->773 777 3f73b6f-3f73b78 772->777 778 3f73b6a 772->778 774 3f73e5a-3f73e5e 773->774 784 3f73e60-3f73e64 774->784 785 3f73eaf 774->785 781 3f73eb1-3f73eb3 775->781 776->769 782 3f73ba1-3f73bc0 call 3f74e10 777->782 783 3f73b7a-3f73b89 777->783 778->774 780->781 798 3f73bc7-3f73bea call 3f74f50 782->798 799 3f73bc2 782->799 783->782 788 3f73b8b-3f73b9a call 3f74d60 783->788 789 3f73e66-3f73e72 784->789 790 3f73e79-3f73e7d 784->790 785->781 786->769 787->781 788->782 804 3f73b9c 788->804 789->790 794 3f73e7f-3f73e82 790->794 795 3f73e89-3f73e8d 790->795 794->795 800 3f73e8f-3f73e92 795->800 801 3f73e99-3f73e9d 795->801 808 3f73c34-3f73c55 call 3f74f50 798->808 809 3f73bec-3f73bf3 798->809 799->774 800->801 802 3f73e9f-3f73ea5 call 3f74d60 801->802 803 3f73eaa-3f73ead 801->803 802->803 803->781 804->774 816 3f73c57 808->816 817 3f73c5c-3f73c7a call 3f757b0 808->817 810 3f73bf5-3f73c26 call 3f74f50 809->810 811 3f73c2f 809->811 818 3f73c2d 810->818 819 3f73c28 810->819 811->774 816->774 822 3f73c85-3f73c8f 817->822 818->808 819->774 823 3f73cc5-3f73cc9 822->823 824 3f73c91-3f73cc3 call 3f757b0 822->824 826 3f73db4-3f73dd1 call 3f74960 823->826 827 3f73ccf-3f73cdf 823->827 824->822 834 3f73dd3 826->834 835 3f73dd8-3f73df7 Wow64SetThreadContext 826->835 827->826 829 3f73ce5-3f73cf5 827->829 829->826 833 3f73cfb-3f73d1f 829->833 836 3f73d22-3f73d26 833->836 834->774 837 3f73dfb-3f73e06 call 3f74c90 835->837 838 3f73df9 835->838 836->826 839 3f73d2c-3f73d41 836->839 845 3f73e0a-3f73e0e 837->845 846 3f73e08 837->846 838->774 841 3f73d55-3f73d59 839->841 843 3f73d97-3f73daf 841->843 844 3f73d5b-3f73d67 841->844 843->836 847 3f73d95 844->847 848 3f73d69-3f73d93 844->848 849 3f73e10-3f73e13 845->849 850 3f73e1a-3f73e1e 845->850 846->774 847->841 848->847 849->850 852 3f73e20-3f73e23 850->852 853 3f73e2a-3f73e2e 850->853 852->853 854 3f73e30-3f73e33 853->854 855 3f73e3a-3f73e3e 853->855 854->855 856 3f73e40-3f73e46 call 3f74d60 855->856 857 3f73e4b-3f73e54 855->857 856->857 857->760 857->774
                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03F73B1D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F73B41
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F73B63
                        Memory Dump Source
                        • Source File: 00000000.00000002.1281015705.0000000003F72000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F72000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3f72000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                        • Instruction ID: 6de231902423bc5ce4da41eda30c3c4acf91cb3563adb0ee686aadb6c4f65ce0
                        • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                        • Instruction Fuzzy Hash: 6262FA34A14258DBEB24CFA4C850BDEB376EF58300F1091AAD10DEB394E7799E85CB59
                        Strings
                        • Variable must be of type 'Object'., xrefs: 00BE32B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable must be of type 'Object'.
                        • API String ID: 0-109567571
                        • Opcode ID: 54d7d143582f6bf7f8937b6a3672329190ba7d81334cfa6b935e3f9513676e33
                        • Instruction ID: 4b0613c33a705d385eda9fa321c19485c89d9b9cb7a6219c4ecaff1d665e0977
                        • Opcode Fuzzy Hash: 54d7d143582f6bf7f8937b6a3672329190ba7d81334cfa6b935e3f9513676e33
                        • Instruction Fuzzy Hash: 8AC26870A04215CFCF24CF98C885AADB7F1FB19700F2485A9E966AB3A1D375ED41CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1369 b93923-b93939 1370 b9393f-b93954 call b96270 1369->1370 1371 b93a13-b93a17 1369->1371 1374 b9395a-b93976 call b96b57 1370->1374 1375 bd3393-bd33a2 LoadStringW 1370->1375 1381 bd33c9-bd33e5 call b96350 call b93fcf 1374->1381 1382 b9397c-b93980 1374->1382 1377 bd33ad-bd33b6 1375->1377 1379 bd33bc-bd33c4 call b9a8c7 1377->1379 1380 b93994-b93a0e call bb2340 call b93a18 call bb4983 Shell_NotifyIconW call b9988f 1377->1380 1379->1380 1380->1371 1381->1380 1396 bd33eb-bd3409 call b933c6 call b93fcf call b933c6 1381->1396 1382->1377 1384 b93986-b9398f call b96350 1382->1384 1384->1380 1396->1380
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00BD33A2
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B93A04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_wcslen
                        • String ID: Line:
                        • API String ID: 2289894680-1585850449
                        • Opcode ID: 043d7c49bfefd5e8011913cccc066ce998dd39eec93123f2cea1eb12d5b7a6df
                        • Instruction ID: a71346f76c7f81c1207ed4f4a792a8ea25d4377ed288db4457993795de508bd2
                        • Opcode Fuzzy Hash: 043d7c49bfefd5e8011913cccc066ce998dd39eec93123f2cea1eb12d5b7a6df
                        • Instruction Fuzzy Hash: 3C31B671408304AFCB25EB14DC45BEFB7D8AB44B50F0845BEF99A931A1EBB09649C7C6
                        APIs
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00BB0668
                          • Part of subcall function 00BB32A4: RaiseException.KERNEL32(?,?,?,00BB068A,?,00C61444,?,?,?,?,?,?,00BB068A,00B91129,00C58738,00B91129), ref: 00BB3304
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00BB0685
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Exception@8Throw$ExceptionRaise
                        • String ID: Unknown exception
                        • API String ID: 3476068407-410509341
                        • Opcode ID: 7587af0c8a6fee29ad1a36c3469e106d9b4ae5117bc6018f988da212bbe62cb5
                        • Instruction ID: 58be5308451fe24ece9b95d0733573b5f8a4997e663c088240a1de4d4ec77182
                        • Opcode Fuzzy Hash: 7587af0c8a6fee29ad1a36c3469e106d9b4ae5117bc6018f988da212bbe62cb5
                        • Instruction Fuzzy Hash: CCF0C23490020DB78F14BAA4D886CFF77EC9E00750B6041F1B924969A2EFF1EA69C690
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00C182F5
                        • TerminateProcess.KERNEL32(00000000), ref: 00C182FC
                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 00C184DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$CurrentFreeLibraryTerminate
                        • String ID:
                        • API String ID: 146820519-0
                        • Opcode ID: ef0cf6f2fe540f486b23938fbab380fc0475ed1aea7177cb98131a1303dd9a21
                        • Instruction ID: 6e225fe8e14a39c52b0bec4d5b82ae1ef18e72f745ba27fb90a4a6cce7d89fac
                        • Opcode Fuzzy Hash: ef0cf6f2fe540f486b23938fbab380fc0475ed1aea7177cb98131a1303dd9a21
                        • Instruction Fuzzy Hash: 28126B719083419FC714DF28C484B6ABBE5FF89314F14895DE8998B292DB31ED89CF92
                        APIs
                          • Part of subcall function 00B91BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B91BF4
                          • Part of subcall function 00B91BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00B91BFC
                          • Part of subcall function 00B91BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B91C07
                          • Part of subcall function 00B91BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B91C12
                          • Part of subcall function 00B91BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00B91C1A
                          • Part of subcall function 00B91BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00B91C22
                          • Part of subcall function 00B91B4A: RegisterWindowMessageW.USER32(00000004,?,00B912C4), ref: 00B91BA2
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00B9136A
                        • OleInitialize.OLE32 ref: 00B91388
                        • CloseHandle.KERNEL32(00000000,00000000), ref: 00BD24AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: 7907ffc82bbf370e0b2ba1f434828309b6d298100953cd491e5e723d348fbf93
                        • Instruction ID: 0850baa7d9b1f14abb92f30b4c66e9adefc8559e21b8dc60d0f821286d504639
                        • Opcode Fuzzy Hash: 7907ffc82bbf370e0b2ba1f434828309b6d298100953cd491e5e723d348fbf93
                        • Instruction Fuzzy Hash: BD71CDB49152418ECBA4EF7BA88576DBAE0FB8834631D856ADC0BC72A1EBB04441DF45
                        APIs
                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,00BC85CC,?,00C58CC8,0000000C), ref: 00BC8704
                        • GetLastError.KERNEL32(?,00BC85CC,?,00C58CC8,0000000C), ref: 00BC870E
                        • __dosmaperr.LIBCMT ref: 00BC8739
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast__dosmaperr
                        • String ID:
                        • API String ID: 2583163307-0
                        • Opcode ID: 9ef077339b5e90f15c19f9aaaacda62c7edd029f89e3290073d3f4d429242fde
                        • Instruction ID: 23534c35393a77f8f0b11c2064b7c7f65937671dc90ce414315742b91966a29d
                        • Opcode Fuzzy Hash: 9ef077339b5e90f15c19f9aaaacda62c7edd029f89e3290073d3f4d429242fde
                        • Instruction Fuzzy Hash: F1012B3260566027D63463346885F7F67C98BC1778F3902EEF8599B1D2DEA0ACC28194
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00BA17F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: CALL
                        • API String ID: 1385522511-4196123274
                        • Opcode ID: 4fd17362e4157826a32493d233e4cc9d5a3bfa569f3c40b57b619843339cff67
                        • Instruction ID: 21f4aee7281d2f8b278a0d5b3a63ba43b572e124189e58b590545487c6d2795d
                        • Opcode Fuzzy Hash: 4fd17362e4157826a32493d233e4cc9d5a3bfa569f3c40b57b619843339cff67
                        • Instruction Fuzzy Hash: 11229A706082419FC754DF29C490B2ABBF1FF9A354F2489ADF4968B3A1D731E845CB92
                        APIs
                        • GetOpenFileNameW.COMDLG32(?), ref: 00BD2C8C
                          • Part of subcall function 00B93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B93A97,?,?,00B92E7F,?,?,?,00000000), ref: 00B93AC2
                          • Part of subcall function 00B92DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B92DC4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen
                        • String ID: X
                        • API String ID: 779396738-3081909835
                        • Opcode ID: 848e2ffbe592dd2f699b98c2cba03a3d1a0da8bf7c4c7590fc722925c0adc621
                        • Instruction ID: adc5c50fd6277e240a702d8966cffbd0c55eb111692679d291ff8ee2498ab011
                        • Opcode Fuzzy Hash: 848e2ffbe592dd2f699b98c2cba03a3d1a0da8bf7c4c7590fc722925c0adc621
                        • Instruction Fuzzy Hash: 0321C671A10258AFDF01DF94C845BEE7BF8DF48305F4040AAE405A7341EBB459898B61
                        APIs
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B93908
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: IconNotifyShell_
                        • String ID:
                        • API String ID: 1144537725-0
                        • Opcode ID: a28647276030f54b6d48fd9510b6c1a6fdacfe12b7b619c9ac05da62cf9085d0
                        • Instruction ID: 2b9aeb459d0586cc3b0822f6e843de3ed3dd9dc98aae073a74382ba356e71815
                        • Opcode Fuzzy Hash: a28647276030f54b6d48fd9510b6c1a6fdacfe12b7b619c9ac05da62cf9085d0
                        • Instruction Fuzzy Hash: BC3193705043019FD720DF25D8847ABBBE4FB49719F04097EFA9A87350E7B1AA44CB92
                        APIs
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00B9949C,?,00008000), ref: 00B95773
                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00B9949C,?,00008000), ref: 00BD4052
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: abdc433749dfea3a235fd7b37a2faf39be0ffc7663ca2b696e0176f73573c70b
                        • Instruction ID: c7a1b0f39a471e9906a1812aca248a833611614cb4d3c420cb31f54ec65d95c1
                        • Opcode Fuzzy Hash: abdc433749dfea3a235fd7b37a2faf39be0ffc7663ca2b696e0176f73573c70b
                        • Instruction Fuzzy Hash: 52019230185225B6E7310A6ADC4FF9B7F98EF027B0F108351BA9C5A1E0CBB45955CB90
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00B9BB4E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID:
                        • API String ID: 1385522511-0
                        • Opcode ID: 324c80f8466f32561c1fd41742463624c6674c964c712b9380fcbeafb3e06723
                        • Instruction ID: 2886a5b8a5aa5e2536dda316a43ed533a2a2553bd77541658a4f924716c84937
                        • Opcode Fuzzy Hash: 324c80f8466f32561c1fd41742463624c6674c964c712b9380fcbeafb3e06723
                        • Instruction Fuzzy Hash: A3328B70A002499FDF24DF55D994FBEB7F9EB48300F1480A9E915AB261C7B8ED81CB91
                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03F73B1D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F73B41
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F73B63
                        Memory Dump Source
                        • Source File: 00000000.00000002.1281015705.0000000003F72000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F72000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3f72000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                        • Instruction ID: ddc9f54cf002f9150ec9462c560cb8ad3bd7d753ef39c2fa70e7d1d01dcd3071
                        • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                        • Instruction Fuzzy Hash: FC12CE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction ID: c24662316a1f3a6fa519a3a04dbb651c27312c6d28feb6ce9a078079572351ed
                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction Fuzzy Hash: F831E374A0810A9BC719DF99D4C09A9F7E2FB4A350B2486F5E849CB655E731EDC1CBC0
                        APIs
                          • Part of subcall function 00B94E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B94EDD,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94E9C
                          • Part of subcall function 00B94E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B94EAE
                          • Part of subcall function 00B94E90: FreeLibrary.KERNEL32(00000000,?,?,00B94EDD,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94EC0
                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94EFD
                          • Part of subcall function 00B94E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00BD3CDE,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94E62
                          • Part of subcall function 00B94E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B94E74
                          • Part of subcall function 00B94E59: FreeLibrary.KERNEL32(00000000,?,?,00BD3CDE,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94E87
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Library$Load$AddressFreeProc
                        • String ID:
                        • API String ID: 2632591731-0
                        • Opcode ID: 0ecaccadb8eea59935b1c9bbc2abbc3e7ce235138380f492f1feb03fbff5c2ab
                        • Instruction ID: fb4845687d058b1dd3b884449c880c6074a8ab81f95c74cab4355526d36e1040
                        • Opcode Fuzzy Hash: 0ecaccadb8eea59935b1c9bbc2abbc3e7ce235138380f492f1feb03fbff5c2ab
                        • Instruction Fuzzy Hash: 7711C132610206ABCF24AB60DC42FED77E5AF50B50F20847AF546A61D2EF709A069750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: 62ac1ce606520b9897f63cbc471caf214bf617fafac37270619ae1915fe49a30
                        • Instruction ID: bc0c369fdc204c6dd403e65672ce667878983841455971192500af5440a475e1
                        • Opcode Fuzzy Hash: 62ac1ce606520b9897f63cbc471caf214bf617fafac37270619ae1915fe49a30
                        • Instruction Fuzzy Hash: 6111187590410AAFCB19DF58E941E9E7BF5EF48314F1540A9F808AB312DA31DA11CBA5
                        APIs
                          • Part of subcall function 00BC4C7D: RtlAllocateHeap.NTDLL(00000008,00B91129,00000000,?,00BC2E29,00000001,00000364,?,?,?,00BBF2DE,00BC3863,00C61444,?,00BAFDF5,?), ref: 00BC4CBE
                        • _free.LIBCMT ref: 00BC506C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AllocateHeap_free
                        • String ID:
                        • API String ID: 614378929-0
                        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                        • Instruction ID: dab04ea5372d2f12ebb7db0cb6ae94bb4d2be8ee5356cf5944f5452b75a0996a
                        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                        • Instruction Fuzzy Hash: 450126722047046BE3318F659881F5AFBE8FB89370F65056DE58483280EB70A945C6B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction ID: a87889b1333a172c64af22d7d0d1ba42006bb2a93e46d06675a82d8705fcbe1f
                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction Fuzzy Hash: DBF0F432510A149BC6313A699C05FFA37D89F52335F1007E9F872922E2DBF4D80186A6
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID:
                        • API String ID: 176396367-0
                        • Opcode ID: 925dd5c5bacb953470c4b1c403d787b0688307d40fd5fb7636ab76acd22fdb11
                        • Instruction ID: 108faa39b7c41e2a0c58ad80db50c9f5025941193bb25f04d2ca4f6181baceeb
                        • Opcode Fuzzy Hash: 925dd5c5bacb953470c4b1c403d787b0688307d40fd5fb7636ab76acd22fdb11
                        • Instruction Fuzzy Hash: 47F0A4B26016016ED7259F68D806AA7BBD4EB44760F10857AF619CB1D1DB71E51086A0
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,00B91129,00000000,?,00BC2E29,00000001,00000364,?,?,?,00BBF2DE,00BC3863,00C61444,?,00BAFDF5,?), ref: 00BC4CBE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: ef3db1b15c26809cad68453e8e0bbb267f3e3a9518362d13153f57dc604cbb82
                        • Instruction ID: 91022c3c18cd6ed0b068c9786137b8fcc6ae1d00a06eb22056497249138d70d5
                        • Opcode Fuzzy Hash: ef3db1b15c26809cad68453e8e0bbb267f3e3a9518362d13153f57dc604cbb82
                        • Instruction Fuzzy Hash: 4DF0E93160222467DB215F629C15FAF37C8FF417B1B1841A9FC19E72B1CBB0DA1586E0
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,00C61444,?,00BAFDF5,?,?,00B9A976,00000010,00C61440,00B913FC,?,00B913C6,?,00B91129), ref: 00BC3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: ea6e38b10ace09e686b49e083c85ba3a8a6c75c65241c6bd0ca6b87dd3bd7ace
                        • Instruction ID: 0801c4620658e70fa69fc391e2fecd242290bbae66a705c4816939eb485fad12
                        • Opcode Fuzzy Hash: ea6e38b10ace09e686b49e083c85ba3a8a6c75c65241c6bd0ca6b87dd3bd7ace
                        • Instruction Fuzzy Hash: 0BE0E53110422497E6312A679C01FEE36D8EB42FB0F8980A8BC0592591DB50DD0187E0
                        APIs
                        • FreeLibrary.KERNEL32(?,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94F6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 24bf1deeda424aabdcc762b49696f3396460359a725580871e817f47272b42fe
                        • Instruction ID: 0ad88da37b84220441ff94c2f4d3a5530f016fff13b59b159dddac0a17a94f78
                        • Opcode Fuzzy Hash: 24bf1deeda424aabdcc762b49696f3396460359a725580871e817f47272b42fe
                        • Instruction Fuzzy Hash: 8EF01571105752CFDB349F64D494E66BBE4EF143293208ABEE1EE82A21C7319845DB10
                        APIs
                        • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,00BDEE51,00C53630,00000002), ref: 00BFCD26
                          • Part of subcall function 00BFCC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,00BFCD19,?,?,?), ref: 00BFCC59
                          • Part of subcall function 00BFCC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,00BFCD19,?,?,?,?,00BDEE51,00C53630,00000002), ref: 00BFCC6E
                          • Part of subcall function 00BFCC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,00BFCD19,?,?,?,?,00BDEE51,00C53630,00000002), ref: 00BFCC7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: File$Pointer$Write
                        • String ID:
                        • API String ID: 3847668363-0
                        • Opcode ID: a55a81fd1b61daa2079b7a34eed8b6af399163d1242559627010b31f7e1c9e59
                        • Instruction ID: e47aad4acd8337ee5a835ec5edf4d65677a3ef5c6afc5987f34e97315d633346
                        • Opcode Fuzzy Hash: a55a81fd1b61daa2079b7a34eed8b6af399163d1242559627010b31f7e1c9e59
                        • Instruction Fuzzy Hash: 71E0657A400708EFD7219F46DD418AEBBF8FF84354710852FE955C2510D371AA54DB60
                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B92DC4
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LongNamePath_wcslen
                        • String ID:
                        • API String ID: 541455249-0
                        • Opcode ID: 4c76df083db46c182ab53da00ec2638f768d51913c7cedc94e1f27ca96e0dd46
                        • Instruction ID: fc9f65002b34a34781e59c670f4d4dfff30e63bab5653533b8384737bfde4e36
                        • Opcode Fuzzy Hash: 4c76df083db46c182ab53da00ec2638f768d51913c7cedc94e1f27ca96e0dd46
                        • Instruction Fuzzy Hash: E0E0CD726001245BCB209398DC06FDE77DDDFC8790F0400B1FD09D7248ED60AD848550
                        APIs
                          • Part of subcall function 00B93837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B93908
                          • Part of subcall function 00B9D730: GetInputState.USER32 ref: 00B9D807
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B92B6B
                          • Part of subcall function 00B930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00B9314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                        • String ID:
                        • API String ID: 3667716007-0
                        • Opcode ID: c362cecfd3c10c988e354a44610f0626d6dc3f9f203541e5fe0be96a20bc898f
                        • Instruction ID: 73a5d43df5041f8c1eabeb11ab2058c8e351a21c65530cbfe2649be16e14a5d6
                        • Opcode Fuzzy Hash: c362cecfd3c10c988e354a44610f0626d6dc3f9f203541e5fe0be96a20bc898f
                        • Instruction Fuzzy Hash: 39E07D2130024407CE18BB769892BBDB3C9CFD1752F4408BEF24283163CF2449454312
                        APIs
                        • CreateFileW.KERNELBASE(00000000,00000000,?,00BD0704,?,?,00000000,?,00BD0704,00000000,0000000C), ref: 00BD03B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 1761f685fff58728a9f71e3047d0e3c96c00819b2660352f3974b9501eb4ff11
                        • Instruction ID: 71dcacaca1f501af6b107802e3a97b2b874febf55c957a874647f5a2a7e16507
                        • Opcode Fuzzy Hash: 1761f685fff58728a9f71e3047d0e3c96c00819b2660352f3974b9501eb4ff11
                        • Instruction Fuzzy Hash: A2D06C3205010DBBDF128F84DD46EDE3BAAFB48714F014000BE1856020C732E832AB90
                        APIs
                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00B91CBC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: InfoParametersSystem
                        • String ID:
                        • API String ID: 3098949447-0
                        • Opcode ID: 4b5445fb94680359c477b1cf2ad422650efd1b807f6bd2ca1015c2131d6323f9
                        • Instruction ID: 39cccf6fe48e124b151c69863f8da36f6db28876fdb06f4fe925850ea07dc9d4
                        • Opcode Fuzzy Hash: 4b5445fb94680359c477b1cf2ad422650efd1b807f6bd2ca1015c2131d6323f9
                        • Instruction Fuzzy Hash: C3C09B352803049FF2344B81BC4AF1C7754A758B01F084011F60A555F3C3E15410F650
                        APIs
                          • Part of subcall function 00B95745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00B9949C,?,00008000), ref: 00B95773
                        • GetLastError.KERNEL32(00000002,00000000), ref: 00C076DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateErrorFileLast
                        • String ID:
                        • API String ID: 1214770103-0
                        • Opcode ID: 76ac2ec84d0532c329413d26c4a288048846f36cb1209a8b5aac6f5755f93085
                        • Instruction ID: 0cb596db5a8519339379270d7d04e0c0030b560035514a378a3ca035c4a5dcde
                        • Opcode Fuzzy Hash: 76ac2ec84d0532c329413d26c4a288048846f36cb1209a8b5aac6f5755f93085
                        • Instruction Fuzzy Hash: 9B8160306087019FCB19EF28C491BADB7E1BF49354F0446ADF8965B2D2DB30AE45CB92
                        APIs
                        • CloseHandle.KERNELBASE(?,?,00000000,00BD24E0), ref: 00B96266
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 13e7426131457755feb2119e9547551bf2d0912654561b45158e8962bcfd2554
                        • Instruction ID: 33b86f3350b805f39ef37179440ec23e6a5c148fb4a663c27716f39ebd47fb68
                        • Opcode Fuzzy Hash: 13e7426131457755feb2119e9547551bf2d0912654561b45158e8962bcfd2554
                        • Instruction Fuzzy Hash: BDE09275400B01CEC7318F1AE804456FBE5FEE13613204A6ED0E592660D3B058868B50
                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 03F74301
                        Memory Dump Source
                        • Source File: 00000000.00000002.1281015705.0000000003F72000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F72000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3f72000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction ID: 6602565e698a366f30167ec5a91f9104502153a18ef916c8aacda5f71807a46b
                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction Fuzzy Hash: 51E0E67494010DDFDB00EFF8D54969E7FB4EF04301F1001A1FD05D2281D7309D509A62
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00C2961A
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C2965B
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00C2969F
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C296C9
                        • SendMessageW.USER32 ref: 00C296F2
                        • GetKeyState.USER32(00000011), ref: 00C2978B
                        • GetKeyState.USER32(00000009), ref: 00C29798
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C297AE
                        • GetKeyState.USER32(00000010), ref: 00C297B8
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C297E9
                        • SendMessageW.USER32 ref: 00C29810
                        • SendMessageW.USER32(?,00001030,?,00C27E95), ref: 00C29918
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00C2992E
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00C29941
                        • SetCapture.USER32(?), ref: 00C2994A
                        • ClientToScreen.USER32(?,?), ref: 00C299AF
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00C299BC
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C299D6
                        • ReleaseCapture.USER32 ref: 00C299E1
                        • GetCursorPos.USER32(?), ref: 00C29A19
                        • ScreenToClient.USER32(?,?), ref: 00C29A26
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C29A80
                        • SendMessageW.USER32 ref: 00C29AAE
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C29AEB
                        • SendMessageW.USER32 ref: 00C29B1A
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00C29B3B
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00C29B4A
                        • GetCursorPos.USER32(?), ref: 00C29B68
                        • ScreenToClient.USER32(?,?), ref: 00C29B75
                        • GetParent.USER32(?), ref: 00C29B93
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C29BFA
                        • SendMessageW.USER32 ref: 00C29C2B
                        • ClientToScreen.USER32(?,?), ref: 00C29C84
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00C29CB4
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C29CDE
                        • SendMessageW.USER32 ref: 00C29D01
                        • ClientToScreen.USER32(?,?), ref: 00C29D4E
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00C29D82
                          • Part of subcall function 00BA9944: GetWindowLongW.USER32(?,000000EB), ref: 00BA9952
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C29E05
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                        • String ID: @GUI_DRAGID$F
                        • API String ID: 3429851547-4164748364
                        • Opcode ID: 55cd42335d51417b0fb251fd50a5b7729e77e493140037e0c88ea5397cae09e5
                        • Instruction ID: a2bbf98fff7eeb40372baa5b466e2272591a5351f2be18a2cbc1c070c338d6cd
                        • Opcode Fuzzy Hash: 55cd42335d51417b0fb251fd50a5b7729e77e493140037e0c88ea5397cae09e5
                        • Instruction Fuzzy Hash: 5042AC34204610AFDB20CF28DC84BAABBF5FF49720F140619FAA987AA1D771E951DF51
                        APIs
                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00C248F3
                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00C24908
                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00C24927
                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00C2494B
                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00C2495C
                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00C2497B
                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00C249AE
                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00C249D4
                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00C24A0F
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00C24A56
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00C24A7E
                        • IsMenu.USER32(?), ref: 00C24A97
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C24AF2
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C24B20
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C24B94
                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00C24BE3
                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00C24C82
                        • wsprintfW.USER32 ref: 00C24CAE
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C24CC9
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00C24CF1
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00C24D13
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C24D33
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00C24D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                        • String ID: %d/%02d/%02d
                        • API String ID: 4054740463-328681919
                        • Opcode ID: 04010bfacf6668db0b65b231279e6bf4db0b8bde97f4de6af67aeacb1da6ed4b
                        • Instruction ID: cda022ac2d2a6a9affcf9be5b9e965ab091809d1b6430da6f0a0c908adc2b657
                        • Opcode Fuzzy Hash: 04010bfacf6668db0b65b231279e6bf4db0b8bde97f4de6af67aeacb1da6ed4b
                        • Instruction Fuzzy Hash: D5121431500224ABEB288F69EC49FBE7BF8EF85710F104169F525DB6E1DB749A41CB50
                        APIs
                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00BAF998
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BEF474
                        • IsIconic.USER32(00000000), ref: 00BEF47D
                        • ShowWindow.USER32(00000000,00000009), ref: 00BEF48A
                        • SetForegroundWindow.USER32(00000000), ref: 00BEF494
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00BEF4AA
                        • GetCurrentThreadId.KERNEL32 ref: 00BEF4B1
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00BEF4BD
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00BEF4CE
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00BEF4D6
                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00BEF4DE
                        • SetForegroundWindow.USER32(00000000), ref: 00BEF4E1
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BEF4F6
                        • keybd_event.USER32(00000012,00000000), ref: 00BEF501
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BEF50B
                        • keybd_event.USER32(00000012,00000000), ref: 00BEF510
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BEF519
                        • keybd_event.USER32(00000012,00000000), ref: 00BEF51E
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BEF528
                        • keybd_event.USER32(00000012,00000000), ref: 00BEF52D
                        • SetForegroundWindow.USER32(00000000), ref: 00BEF530
                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00BEF557
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: 0499ff6d06abc8d376f71f78588f8be236805485201b9fa3e91fee39e66badbb
                        • Instruction ID: 8c690935c20cfa6acfd83b6563c20d2fbef968d726c27f4fda4da45fdcaeeb25
                        • Opcode Fuzzy Hash: 0499ff6d06abc8d376f71f78588f8be236805485201b9fa3e91fee39e66badbb
                        • Instruction Fuzzy Hash: F7316A71A50219BFEB316BB65C8AFBF7EBCEB44B50F100065F601E61D1C7B19D11AAA0
                        APIs
                          • Part of subcall function 00BF16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BF170D
                          • Part of subcall function 00BF16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BF173A
                          • Part of subcall function 00BF16C3: GetLastError.KERNEL32 ref: 00BF174A
                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00BF1286
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00BF12A8
                        • CloseHandle.KERNEL32(?), ref: 00BF12B9
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00BF12D1
                        • GetProcessWindowStation.USER32 ref: 00BF12EA
                        • SetProcessWindowStation.USER32(00000000), ref: 00BF12F4
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00BF1310
                          • Part of subcall function 00BF10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BF11FC), ref: 00BF10D4
                          • Part of subcall function 00BF10BF: CloseHandle.KERNEL32(?,?,00BF11FC), ref: 00BF10E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                        • String ID: $default$winsta0
                        • API String ID: 22674027-1027155976
                        • Opcode ID: 5b491194285fbe6ba144071cc86eac6060cc03c8f046966e3a64b32d6b3aa9ae
                        • Instruction ID: c4c7374b7b379d340d96e76c6ee99448ab014b7ac2b97663e1cec6ce25f617ee
                        • Opcode Fuzzy Hash: 5b491194285fbe6ba144071cc86eac6060cc03c8f046966e3a64b32d6b3aa9ae
                        • Instruction Fuzzy Hash: 26817D71900209EBDF249FA8DC49BFE7BB9EF44700F1449A9FA11B62A0C7708949CF60
                        APIs
                          • Part of subcall function 00BF10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BF1114
                          • Part of subcall function 00BF10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF1120
                          • Part of subcall function 00BF10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF112F
                          • Part of subcall function 00BF10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF1136
                          • Part of subcall function 00BF10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BF114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BF0BCC
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BF0C00
                        • GetLengthSid.ADVAPI32(?), ref: 00BF0C17
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00BF0C51
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BF0C6D
                        • GetLengthSid.ADVAPI32(?), ref: 00BF0C84
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00BF0C8C
                        • HeapAlloc.KERNEL32(00000000), ref: 00BF0C93
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BF0CB4
                        • CopySid.ADVAPI32(00000000), ref: 00BF0CBB
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BF0CEA
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BF0D0C
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BF0D1E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF0D45
                        • HeapFree.KERNEL32(00000000), ref: 00BF0D4C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF0D55
                        • HeapFree.KERNEL32(00000000), ref: 00BF0D5C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF0D65
                        • HeapFree.KERNEL32(00000000), ref: 00BF0D6C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00BF0D78
                        • HeapFree.KERNEL32(00000000), ref: 00BF0D7F
                          • Part of subcall function 00BF1193: GetProcessHeap.KERNEL32(00000008,00BF0BB1,?,00000000,?,00BF0BB1,?), ref: 00BF11A1
                          • Part of subcall function 00BF1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00BF0BB1,?), ref: 00BF11A8
                          • Part of subcall function 00BF1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00BF0BB1,?), ref: 00BF11B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: 553a0ca27b2e07b0628d2bf9828b8954ed579bf5a8a015708dad84dc67c5ae92
                        • Instruction ID: bfc62ab72f4ff5e3e55da8e52fe0ab1b86263e564432429d56f319613d40a377
                        • Opcode Fuzzy Hash: 553a0ca27b2e07b0628d2bf9828b8954ed579bf5a8a015708dad84dc67c5ae92
                        • Instruction Fuzzy Hash: 86715D7591020AABDF10AFA4DC85FBEBBB9FF04300F1445A5EA14A71A1D771A919CB60
                        APIs
                        • OpenClipboard.USER32(00C2CC08), ref: 00C0EB29
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C0EB37
                        • GetClipboardData.USER32(0000000D), ref: 00C0EB43
                        • CloseClipboard.USER32 ref: 00C0EB4F
                        • GlobalLock.KERNEL32(00000000), ref: 00C0EB87
                        • CloseClipboard.USER32 ref: 00C0EB91
                        • GlobalUnlock.KERNEL32(00000000), ref: 00C0EBBC
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00C0EBC9
                        • GetClipboardData.USER32(00000001), ref: 00C0EBD1
                        • GlobalLock.KERNEL32(00000000), ref: 00C0EBE2
                        • GlobalUnlock.KERNEL32(00000000), ref: 00C0EC22
                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00C0EC38
                        • GetClipboardData.USER32(0000000F), ref: 00C0EC44
                        • GlobalLock.KERNEL32(00000000), ref: 00C0EC55
                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00C0EC77
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00C0EC94
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00C0ECD2
                        • GlobalUnlock.KERNEL32(00000000), ref: 00C0ECF3
                        • CountClipboardFormats.USER32 ref: 00C0ED14
                        • CloseClipboard.USER32 ref: 00C0ED59
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                        • String ID:
                        • API String ID: 420908878-0
                        • Opcode ID: b88166a18b9f20032bc2c9c03a5c2125456a551ed23bb9efaddc5b8cde343fde
                        • Instruction ID: 616634b8e39a6394be185011b64bcc8d7f73dadae5f42e6d98817cdb417da30a
                        • Opcode Fuzzy Hash: b88166a18b9f20032bc2c9c03a5c2125456a551ed23bb9efaddc5b8cde343fde
                        • Instruction Fuzzy Hash: 5D619A35244201AFD710EF24D895F2E77E4EF84704F18496DF866972E2CB31EA06CBA2
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00C069BE
                        • FindClose.KERNEL32(00000000), ref: 00C06A12
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C06A4E
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C06A75
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C06AB2
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C06ADF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                        • API String ID: 3830820486-3289030164
                        • Opcode ID: 3ea93161418c79ea8917f9a64acba4b43c455f2d173ab2a557271663843806bb
                        • Instruction ID: aa469b0f23107704166c84acc99deafd07fc15ffe899295820d48822632bc878
                        • Opcode Fuzzy Hash: 3ea93161418c79ea8917f9a64acba4b43c455f2d173ab2a557271663843806bb
                        • Instruction Fuzzy Hash: 02D14D72508300AFC710EBA4C891EAFB7ECAF98704F44496DF599D7191EB74DA48CB62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00C09663
                        • GetFileAttributesW.KERNEL32(?), ref: 00C096A1
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00C096BB
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C096D3
                        • FindClose.KERNEL32(00000000), ref: 00C096DE
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00C096FA
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0974A
                        • SetCurrentDirectoryW.KERNEL32(00C56B7C), ref: 00C09768
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C09772
                        • FindClose.KERNEL32(00000000), ref: 00C0977F
                        • FindClose.KERNEL32(00000000), ref: 00C0978F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1409584000-438819550
                        • Opcode ID: 085885c7b5be60134cc2a4b38363bc454bf1090c29ea254493498e9cfad9459f
                        • Instruction ID: 984962cab3eb47a0a5215923598dda45e56cd0e1b7fb8a1cdd0a7de30c1dfdc3
                        • Opcode Fuzzy Hash: 085885c7b5be60134cc2a4b38363bc454bf1090c29ea254493498e9cfad9459f
                        • Instruction Fuzzy Hash: 5A31C232541619AFDB24EFB8DC49BEE77ACDF09321F1041A5F825E20E1DB70DA85CA54
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00C097BE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C09819
                        • FindClose.KERNEL32(00000000), ref: 00C09824
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00C09840
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C09890
                        • SetCurrentDirectoryW.KERNEL32(00C56B7C), ref: 00C098AE
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C098B8
                        • FindClose.KERNEL32(00000000), ref: 00C098C5
                        • FindClose.KERNEL32(00000000), ref: 00C098D5
                          • Part of subcall function 00BFDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00BFDB00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 2640511053-438819550
                        • Opcode ID: 5b11f8512b74769858e120c0cb2a82583f6a24f550b49e995e714fe1e3909008
                        • Instruction ID: adcb3069a1bac4c792576ec0e442d5d9c07c01e71770f74cb09e3dbf24f52575
                        • Opcode Fuzzy Hash: 5b11f8512b74769858e120c0cb2a82583f6a24f550b49e995e714fe1e3909008
                        • Instruction Fuzzy Hash: 5831B6315016196FDF20EFB4EC48BDE77ACDF06320F148265E924A31E1DB70DA85CA64
                        APIs
                        • GetLocalTime.KERNEL32(?), ref: 00C08257
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C08267
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C08273
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C08310
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C08324
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C08356
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C0838C
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C08395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CurrentDirectoryTime$File$Local$System
                        • String ID: *.*
                        • API String ID: 1464919966-438819550
                        • Opcode ID: 6ac2dc67fdcfee550c0258ecf0f2ac697c788f081b52d3d408ce149e76653d55
                        • Instruction ID: d2dc37525aac33600aef0e7dec72a65abffd4877ff66058d2ed7279101e34e36
                        • Opcode Fuzzy Hash: 6ac2dc67fdcfee550c0258ecf0f2ac697c788f081b52d3d408ce149e76653d55
                        • Instruction Fuzzy Hash: 8F6171725143059FCB10EF64D840AAEB3E8FF89314F04896DF999D7261DB31E949CB92
                        APIs
                          • Part of subcall function 00B93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B93A97,?,?,00B92E7F,?,?,?,00000000), ref: 00B93AC2
                          • Part of subcall function 00BFE199: GetFileAttributesW.KERNEL32(?,00BFCF95), ref: 00BFE19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00BFD122
                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00BFD1DD
                        • MoveFileW.KERNEL32(?,?), ref: 00BFD1F0
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00BFD20D
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BFD237
                          • Part of subcall function 00BFD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00BFD21C,?,?), ref: 00BFD2B2
                        • FindClose.KERNEL32(00000000,?,?,?), ref: 00BFD253
                        • FindClose.KERNEL32(00000000), ref: 00BFD264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 1946585618-1173974218
                        • Opcode ID: 65f913c7a8d6c10fb61254a2fb4033a62fdac3ff2857c893d9e3e1268dca6596
                        • Instruction ID: 0dd3b760b042304863bc6479fc00704c42beda7df89e1e16d4e11c2a8eae386a
                        • Opcode Fuzzy Hash: 65f913c7a8d6c10fb61254a2fb4033a62fdac3ff2857c893d9e3e1268dca6596
                        • Instruction Fuzzy Hash: 28615C3180510DAACF15EBA4CA92AFDB7F6AF15300F2441A9E50177191EF31AF0DCBA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: 1369c36ab8759347f52a32e3fde8c67278dfeab7cced4a3ec219c354b9c6d990
                        • Instruction ID: 389100605fe16bd63828b0a50f27628adf4fe1e4bde464122bc107ed74676775
                        • Opcode Fuzzy Hash: 1369c36ab8759347f52a32e3fde8c67278dfeab7cced4a3ec219c354b9c6d990
                        • Instruction Fuzzy Hash: C9418D35204611AFE720DF15D888F19BBE5EF44318F19C499E42A8BBA2C775FD42CB90
                        APIs
                          • Part of subcall function 00BF16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BF170D
                          • Part of subcall function 00BF16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BF173A
                          • Part of subcall function 00BF16C3: GetLastError.KERNEL32 ref: 00BF174A
                        • ExitWindowsEx.USER32(?,00000000), ref: 00BFE932
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $ $@$SeShutdownPrivilege
                        • API String ID: 2234035333-3163812486
                        • Opcode ID: 26aa7bd486f67cafb3f13754e6270283560227ef08c437eb703972b80ac1dcd8
                        • Instruction ID: 0682efd52124ac2243a577cabc538cc58f93c09a2b2c8773374aa272b23f3589
                        • Opcode Fuzzy Hash: 26aa7bd486f67cafb3f13754e6270283560227ef08c437eb703972b80ac1dcd8
                        • Instruction Fuzzy Hash: 5D01F732620218ABEB2426749CC9FBE72DCDB04741F148961FA22E30E1DAF09C4881A0
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C11276
                        • WSAGetLastError.WSOCK32 ref: 00C11283
                        • bind.WSOCK32(00000000,?,00000010), ref: 00C112BA
                        • WSAGetLastError.WSOCK32 ref: 00C112C5
                        • closesocket.WSOCK32(00000000), ref: 00C112F4
                        • listen.WSOCK32(00000000,00000005), ref: 00C11303
                        • WSAGetLastError.WSOCK32 ref: 00C1130D
                        • closesocket.WSOCK32(00000000), ref: 00C1133C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast$closesocket$bindlistensocket
                        • String ID:
                        • API String ID: 540024437-0
                        • Opcode ID: 756d67ced2f02f8380e9ccaa8ecbafa499cb84e2fc43e8629899dedbeb5c11fd
                        • Instruction ID: 94550823ef9e0fe1470f45745aab05e7d5718c9a48141186671a1ecc97f1bd77
                        • Opcode Fuzzy Hash: 756d67ced2f02f8380e9ccaa8ecbafa499cb84e2fc43e8629899dedbeb5c11fd
                        • Instruction Fuzzy Hash: 394190316001409FD720DF24C488B69BBE5AF46318F188198E9669F2E6C775ED82DBE1
                        APIs
                        • _free.LIBCMT ref: 00BCB9D4
                        • _free.LIBCMT ref: 00BCB9F8
                        • _free.LIBCMT ref: 00BCBB7F
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00C33700), ref: 00BCBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00C6121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00BCBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00C61270,000000FF,?,0000003F,00000000,?), ref: 00BCBC36
                        • _free.LIBCMT ref: 00BCBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                        • String ID:
                        • API String ID: 314583886-0
                        • Opcode ID: b5244a4993b38cd1b8baa654c476fda7baf6ab1e5ea8fa1aa7f4d2c0387967f0
                        • Instruction ID: 35442755fae052814dc4883cabbda6580aef36b5ee2707e86eace6f2b2b81f7d
                        • Opcode Fuzzy Hash: b5244a4993b38cd1b8baa654c476fda7baf6ab1e5ea8fa1aa7f4d2c0387967f0
                        • Instruction Fuzzy Hash: 3AC10571A04245AFDB249F798C92FAEBBE8EF41310F1841EEE895D7251EB709E41CB50
                        APIs
                          • Part of subcall function 00B93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B93A97,?,?,00B92E7F,?,?,?,00000000), ref: 00B93AC2
                          • Part of subcall function 00BFE199: GetFileAttributesW.KERNEL32(?,00BFCF95), ref: 00BFE19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00BFD420
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00BFD470
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BFD481
                        • FindClose.KERNEL32(00000000), ref: 00BFD498
                        • FindClose.KERNEL32(00000000), ref: 00BFD4A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                        • String ID: \*.*
                        • API String ID: 2649000838-1173974218
                        • Opcode ID: 5aac6344f5a1322a0bd6cce028d31aa265b21a9905b451c2b32d46143df60fbc
                        • Instruction ID: 472e5f9151e16ca48e7bf89ab1c41c55529dc77e816cf90cd11135c42fe967b1
                        • Opcode Fuzzy Hash: 5aac6344f5a1322a0bd6cce028d31aa265b21a9905b451c2b32d46143df60fbc
                        • Instruction Fuzzy Hash: 1A3180310183459BC710EF64C8919BFB7E8BEA1304F444AADF5D593291EB30AA0DD763
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 09bac1721545be20f678d88f238bc3a63530826aba28d211f724444c57eb4cf4
                        • Instruction ID: d0681db5146ac8547dc74d142b287242a99ac5bd744c935cf9ac8011dadd55bb
                        • Opcode Fuzzy Hash: 09bac1721545be20f678d88f238bc3a63530826aba28d211f724444c57eb4cf4
                        • Instruction Fuzzy Hash: 46C20972E046298FDB25CE289D80BEAB7F6EB48305F1541EED45DE7241E774AE818F40
                        APIs
                        • _wcslen.LIBCMT ref: 00C064DC
                        • CoInitialize.OLE32(00000000), ref: 00C06639
                        • CoCreateInstance.OLE32(00C2FCF8,00000000,00000001,00C2FB68,?), ref: 00C06650
                        • CoUninitialize.OLE32 ref: 00C068D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 886957087-24824748
                        • Opcode ID: cee1fce8b120956ab1b2a667c056b14a761b46576126371a02cea5a613e0cfb9
                        • Instruction ID: 939cbf5ff1ed2d2d929fb76e1769ca090b7e821db151f246c1164040b53c69ae
                        • Opcode Fuzzy Hash: cee1fce8b120956ab1b2a667c056b14a761b46576126371a02cea5a613e0cfb9
                        • Instruction Fuzzy Hash: D8D13971508201AFC714EF24C881A6BB7E9FF98704F40496DF5958B291EB71EA49CBA2
                        APIs
                        • GetForegroundWindow.USER32(?,?,00000000), ref: 00C122E8
                          • Part of subcall function 00C0E4EC: GetWindowRect.USER32(?,?), ref: 00C0E504
                        • GetDesktopWindow.USER32 ref: 00C12312
                        • GetWindowRect.USER32(00000000), ref: 00C12319
                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00C12355
                        • GetCursorPos.USER32(?), ref: 00C12381
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C123DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                        • String ID:
                        • API String ID: 2387181109-0
                        • Opcode ID: 4eda3506575c14743b41502db8af8817aebeaa438a4ca84c88a4bb70a493f9ee
                        • Instruction ID: b1958dee85f158e9e031cdecb8373adace1fa740a3a72825a60e4147359c8412
                        • Opcode Fuzzy Hash: 4eda3506575c14743b41502db8af8817aebeaa438a4ca84c88a4bb70a493f9ee
                        • Instruction Fuzzy Hash: 0631ED72104305ABC720DF54C848BAFBBADFF89310F400919F9A4A71A1DB34EA59CB92
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00C09B78
                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00C09C8B
                          • Part of subcall function 00C03874: GetInputState.USER32 ref: 00C038CB
                          • Part of subcall function 00C03874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C03966
                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00C09BA8
                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00C09C75
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                        • String ID: *.*
                        • API String ID: 1972594611-438819550
                        • Opcode ID: db57c1bb1dcebac0c612e9b4ff8f5074d6e3d21594f4cb8e4d6f55d77e082146
                        • Instruction ID: 2ccd8bed7a434947e6ee738f5b973806d49e0fd7d13cce048dd28048b707427f
                        • Opcode Fuzzy Hash: db57c1bb1dcebac0c612e9b4ff8f5074d6e3d21594f4cb8e4d6f55d77e082146
                        • Instruction Fuzzy Hash: A3413C7194420A9BDF14DF64C885BEEBBF8EF05310F2441A6E815A2192EB309F85CB61
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00BA9A4E
                        • GetSysColor.USER32(0000000F), ref: 00BA9B23
                        • SetBkColor.GDI32(?,00000000), ref: 00BA9B36
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Color$LongProcWindow
                        • String ID:
                        • API String ID: 3131106179-0
                        • Opcode ID: 850321ab2ec84d457c8cc1846b5d936dfe3e12f05b1423b0664428a3894ff857
                        • Instruction ID: 8d7ea7782ee1acc94b64eaf2d89e27bc8d79b2b56ae76dbd8c99f47ecb5cc291
                        • Opcode Fuzzy Hash: 850321ab2ec84d457c8cc1846b5d936dfe3e12f05b1423b0664428a3894ff857
                        • Instruction Fuzzy Hash: 70A1E47024C494BEE728AA2EDCC8F7F26DDDB87340B19029AF502C6995CF259D01F271
                        APIs
                          • Part of subcall function 00C1304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C1307A
                          • Part of subcall function 00C1304E: _wcslen.LIBCMT ref: 00C1309B
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C1185D
                        • WSAGetLastError.WSOCK32 ref: 00C11884
                        • bind.WSOCK32(00000000,?,00000010), ref: 00C118DB
                        • WSAGetLastError.WSOCK32 ref: 00C118E6
                        • closesocket.WSOCK32(00000000), ref: 00C11915
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 1601658205-0
                        • Opcode ID: c2fa7fba53cb9c83b742d6251d70ee2cb9e7c22894bdccf232a7674035fe756f
                        • Instruction ID: 1a6e4374add60b445a7c3f235fbf9c83743aae0ef25029ad26c01453d344fee7
                        • Opcode Fuzzy Hash: c2fa7fba53cb9c83b742d6251d70ee2cb9e7c22894bdccf232a7674035fe756f
                        • Instruction Fuzzy Hash: EC51B471A002109FEB10AF24C886F6A7BE5AB49718F49C09CF9195F3D3DB75AD418BA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: 867f0d00b1257449207b5e79e6a5d62de4b6eb35f1cf2e0be17bdbd98752981e
                        • Instruction ID: db03a7f0187c00de79ce3da2ca9db5b5ce9fb186a56c5c7ca00b640f5cc13796
                        • Opcode Fuzzy Hash: 867f0d00b1257449207b5e79e6a5d62de4b6eb35f1cf2e0be17bdbd98752981e
                        • Instruction Fuzzy Hash: 6F21F7357406209FD7218F1AE884B2A7BE5EFA5314F1D8068EC4ACBB51CB71ED42CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-1546025612
                        • Opcode ID: 0556d5be1289007cd565ab86b9896d0029c8f9b8a4b5470dbeafebae54a62cce
                        • Instruction ID: f76965d78aae000ca86b286e3ce5ecbc3d92afbf1b58063518be361d8559884b
                        • Opcode Fuzzy Hash: 0556d5be1289007cd565ab86b9896d0029c8f9b8a4b5470dbeafebae54a62cce
                        • Instruction Fuzzy Hash: A9A23B71A0061ACBDF24CF58C9807AEB7F1FB55314F2485EAE815AB385EB749D81CB90
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00C1A6AC
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00C1A6BA
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • Process32NextW.KERNEL32(00000000,?), ref: 00C1A79C
                        • CloseHandle.KERNEL32(00000000), ref: 00C1A7AB
                          • Part of subcall function 00BACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00BD3303,?), ref: 00BACE8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                        • String ID:
                        • API String ID: 1991900642-0
                        • Opcode ID: 0b572c8aa38b81c44d9b3e297813ad028efedf16bda1181a322a0274cc7e7710
                        • Instruction ID: 20405d28a31d66108c37863a229b97daa17139858819451cf199b9ce6cf1aceb
                        • Opcode Fuzzy Hash: 0b572c8aa38b81c44d9b3e297813ad028efedf16bda1181a322a0274cc7e7710
                        • Instruction Fuzzy Hash: 35514B71508300AFD710EF24C886A6FBBE8FF89754F40896DF599972A1EB30D945CB92
                        APIs
                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00BFAAAC
                        • SetKeyboardState.USER32(00000080), ref: 00BFAAC8
                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00BFAB36
                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00BFAB88
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 58592e2c9631815c78f24f3167ce3918f96bf0d1c8e75f11d716267727139ec1
                        • Instruction ID: 30e252b5a52bd6c9d37eae69bb8d51357e4561e8d43d38601f9a3887e031ea03
                        • Opcode Fuzzy Hash: 58592e2c9631815c78f24f3167ce3918f96bf0d1c8e75f11d716267727139ec1
                        • Instruction Fuzzy Hash: 733105B0A4020CAEFB399A64CC45BFE7BE6EB44310F04429AF289575D2D374899DC762
                        APIs
                        • InternetReadFile.WININET(?,?,00000400,?), ref: 00C0CE89
                        • GetLastError.KERNEL32(?,00000000), ref: 00C0CEEA
                        • SetEvent.KERNEL32(?,?,00000000), ref: 00C0CEFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorEventFileInternetLastRead
                        • String ID:
                        • API String ID: 234945975-0
                        • Opcode ID: 15a29352d2cb4393209bdfb8b7a24776b968da38a15221162662194ec61bcd31
                        • Instruction ID: 69d273c985ebfb2db36d71b6d7944dd98d7ae2fbfc5c51f374b9f72c4284f0e8
                        • Opcode Fuzzy Hash: 15a29352d2cb4393209bdfb8b7a24776b968da38a15221162662194ec61bcd31
                        • Instruction Fuzzy Hash: 0021BD715007059BD730CFA5C988BAB77F8EB10314F20462EE666D2191E770EE05CB50
                        APIs
                        • lstrlenW.KERNEL32(?,00BD5222), ref: 00BFDBCE
                        • GetFileAttributesW.KERNEL32(?), ref: 00BFDBDD
                        • FindFirstFileW.KERNEL32(?,?), ref: 00BFDBEE
                        • FindClose.KERNEL32(00000000), ref: 00BFDBFA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirstlstrlen
                        • String ID:
                        • API String ID: 2695905019-0
                        • Opcode ID: 91c95a6b4c2005706cffd3b9f45e33622d6db361f4d45d9b3019226dc8167706
                        • Instruction ID: fc5e3ae5c88f487ff78b974416dd709ac18f21b46fd1c5ad3d1c539357a508b4
                        • Opcode Fuzzy Hash: 91c95a6b4c2005706cffd3b9f45e33622d6db361f4d45d9b3019226dc8167706
                        • Instruction Fuzzy Hash: A2F0A0308209189783306B7CAC4EABE37ADDE11334B104B42F976C24F0EFB0595A86D5
                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00BF82AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($|
                        • API String ID: 1659193697-1631851259
                        • Opcode ID: f31d258a773b8662acb6428b07e72a8458fc52b5767a73804052775a5fca1164
                        • Instruction ID: 0304d9c5034344d930b40c86e9bd67401e7c29dab2c4c215e0d9f09bf8fd3c9e
                        • Opcode Fuzzy Hash: f31d258a773b8662acb6428b07e72a8458fc52b5767a73804052775a5fca1164
                        • Instruction Fuzzy Hash: 10323675A007099FCB28CF59C481A6AB7F0FF48710B15C5AEE59ADB3A1EB70E941CB44
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00C05CC1
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C05D17
                        • FindClose.KERNEL32(?), ref: 00C05D5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 7120c2914fddb5f83b632f6cbdba8dbf7096fcefc2d5dd9db80229af4ac93590
                        • Instruction ID: c15ba97f742ca3fe27c38b3184f71e559a1a46e7a9bda540aab58a2e9ae91530
                        • Opcode Fuzzy Hash: 7120c2914fddb5f83b632f6cbdba8dbf7096fcefc2d5dd9db80229af4ac93590
                        • Instruction Fuzzy Hash: F0518975604B019FC714CF28C494A9AB7E4FF49314F1485AEE9AA8B3A1DB30ED45CF91
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 00BC271A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BC2724
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00BC2731
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: fdd938c08d22305a27b932931cc200c90f2931d55f57f8f0f0b38a4e960ea717
                        • Instruction ID: e7cf3ce804244338dd2c7378dfaa591348bbc004c3444dd97ddc5c2b3cb52c8d
                        • Opcode Fuzzy Hash: fdd938c08d22305a27b932931cc200c90f2931d55f57f8f0f0b38a4e960ea717
                        • Instruction Fuzzy Hash: 9631B274911218ABCB21DF68DC89BDDBBF8EF08310F5045EAE81CA6261E7709F818F45
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00C051DA
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00C05238
                        • SetErrorMode.KERNEL32(00000000), ref: 00C052A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: d86fef0035d06e3aa37db5a50e199f88e67055f7195d5134ec19dd3aeb348719
                        • Instruction ID: 9132f01c26f04f889c060dd07fc51d7431f5472d7cc22ee79a21517589f1ffbf
                        • Opcode Fuzzy Hash: d86fef0035d06e3aa37db5a50e199f88e67055f7195d5134ec19dd3aeb348719
                        • Instruction Fuzzy Hash: BF313A75A105189FDB00DF54D885BAEBBF4FF49314F058099E809AB3A2DB31E95ACB90
                        APIs
                          • Part of subcall function 00BAFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00BB0668
                          • Part of subcall function 00BAFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00BB0685
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BF170D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BF173A
                        • GetLastError.KERNEL32 ref: 00BF174A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                        • String ID:
                        • API String ID: 577356006-0
                        • Opcode ID: 074a06e071b6d2d40c289ef35970a44f561f11f2f70669d46020275a8ab29f25
                        • Instruction ID: fd5d93f9c5e711cc09af37c2675e522bbdbd165cb0f3b866a0dc53bb988e486d
                        • Opcode Fuzzy Hash: 074a06e071b6d2d40c289ef35970a44f561f11f2f70669d46020275a8ab29f25
                        • Instruction Fuzzy Hash: DC11C4B1414309EFD718AF54DCC6EBEB7F9EB04714B20896EE05653641EB70BC458B60
                        APIs
                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00BFD608
                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00BFD645
                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00BFD650
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle
                        • String ID:
                        • API String ID: 33631002-0
                        • Opcode ID: f4b47fb2f39f833cfd7a2009c551897f7a278c083d28ad58c74b89b95111ba5b
                        • Instruction ID: 95dee7e52b35c394db31deeab239d0f6232ab6cb25e558ffbb2fff264384a4fe
                        • Opcode Fuzzy Hash: f4b47fb2f39f833cfd7a2009c551897f7a278c083d28ad58c74b89b95111ba5b
                        • Instruction Fuzzy Hash: D0115E75E05228BFDB208F95DC85FAFBBBCEB45B60F108155F904E7290D6704A058BA1
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00BF168C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00BF16A1
                        • FreeSid.ADVAPI32(?), ref: 00BF16B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 0e69ceb98245340f636bbda64501a1dfcb1e3a01dfce46d1f55b64db0451d980
                        • Instruction ID: c0995e17277933bbea463571b9d17abef09f841353ee2cf484f46245e21ad9fb
                        • Opcode Fuzzy Hash: 0e69ceb98245340f636bbda64501a1dfcb1e3a01dfce46d1f55b64db0451d980
                        • Instruction Fuzzy Hash: 9FF0F47195030DFBDB00DFE4DC89EAEBBBCFB08644F5049A5E501E2181E774AA448A54
                        APIs
                        • GetCurrentProcess.KERNEL32(00BC28E9,?,00BB4CBE,00BC28E9,00C588B8,0000000C,00BB4E15,00BC28E9,00000002,00000000,?,00BC28E9), ref: 00BB4D09
                        • TerminateProcess.KERNEL32(00000000,?,00BB4CBE,00BC28E9,00C588B8,0000000C,00BB4E15,00BC28E9,00000002,00000000,?,00BC28E9), ref: 00BB4D10
                        • ExitProcess.KERNEL32 ref: 00BB4D22
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 6446e5cb698f4d31924b4cf8ff230098db2f93053efd596c6df8b3b038c993ca
                        • Instruction ID: 5d77379148b2232e906b300f4230ba2e377ca8973beb09758b930981454a9933
                        • Opcode Fuzzy Hash: 6446e5cb698f4d31924b4cf8ff230098db2f93053efd596c6df8b3b038c993ca
                        • Instruction Fuzzy Hash: B9E0B631010548ABCF21AF54DD4ABAC3BA9FB42795B108468FC058A533CB75DD52DB84
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: /
                        • API String ID: 0-2043925204
                        • Opcode ID: 14dd026676d315870975be2c55a960e11758815583eec42563f6e622e0f91fd5
                        • Instruction ID: b56bb89510dd8afeb658e5fbc0a5f0c0e463a9b7c9f0d943da824acfd0c36a50
                        • Opcode Fuzzy Hash: 14dd026676d315870975be2c55a960e11758815583eec42563f6e622e0f91fd5
                        • Instruction Fuzzy Hash: 794126765002196FCB249FB9DC88FAB7BF8EB94314F1042ADF919DB180E6709D818B54
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00BED28C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID: X64
                        • API String ID: 2645101109-893830106
                        • Opcode ID: 1fb18ba4f47693f40f1645b449344921b858fcb322cbc242dd1b8a277160601c
                        • Instruction ID: f8e9805fb3c3e03ec4c78ecbd1aac51e37331ea012818bbbc09e7706c9ff3331
                        • Opcode Fuzzy Hash: 1fb18ba4f47693f40f1645b449344921b858fcb322cbc242dd1b8a277160601c
                        • Instruction Fuzzy Hash: 4DD0CAB481512DEACBA0CBA0ECC8EDEB7BCBB04305F100292F206A2000DB7096498F20
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction ID: d727b36425ecbe8f4abc5820c824c25e4f7df048efddeabbaebf7387e7c8384c
                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction Fuzzy Hash: B9020C71E001199FDF14CFA9C8806EEFBF1EF58314F2581AAD819EB384D771A9458B94
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00C06918
                        • FindClose.KERNEL32(00000000), ref: 00C06961
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 86ad5b7fa49f3436b8cdffc021969782d3fe918dafac40e9b09abbd50133baeb
                        • Instruction ID: 8c11ae4de6527596ba1bb1a023ed843ed1d34c899746a4d45a700e4904ad61f0
                        • Opcode Fuzzy Hash: 86ad5b7fa49f3436b8cdffc021969782d3fe918dafac40e9b09abbd50133baeb
                        • Instruction Fuzzy Hash: EA118E316142019FC710DF29D484B1ABBE5EF85328F15C6A9E4698F6A2CB30EC05CB91
                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00C14891,?,?,00000035,?), ref: 00C037E4
                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00C14891,?,?,00000035,?), ref: 00C037F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: 6bbd03ed5dae8253e6cd0aa793c2bde4e929642c29ef10dc0c0f1358522b5f1e
                        • Instruction ID: 00c3342553f07cecfebead8fb74bfdae5063483245a93447a6e394bcb576b0c6
                        • Opcode Fuzzy Hash: 6bbd03ed5dae8253e6cd0aa793c2bde4e929642c29ef10dc0c0f1358522b5f1e
                        • Instruction Fuzzy Hash: 2BF0E5B06042286AEB2057BA8C8DFEF7AAEEFC8761F000275F509D22D1D9609944C6B0
                        APIs
                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00BFB25D
                        • keybd_event.USER32(?,7707C0D0,?,00000000), ref: 00BFB270
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: InputSendkeybd_event
                        • String ID:
                        • API String ID: 3536248340-0
                        • Opcode ID: 173d0fabb46660974fa45c9739727f78934a54c1f16e467f955b4afaa5b1f03a
                        • Instruction ID: 8020bd9e7d73eef41df7f99ab80cfac5c501663c679ab47013233c8c2e3b8bc5
                        • Opcode Fuzzy Hash: 173d0fabb46660974fa45c9739727f78934a54c1f16e467f955b4afaa5b1f03a
                        • Instruction Fuzzy Hash: 5CF01D7181424DABDF159FA0C845BBE7FB4FF04305F108059F955A6191C379C6159F94
                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BF11FC), ref: 00BF10D4
                        • CloseHandle.KERNEL32(?,?,00BF11FC), ref: 00BF10E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 882d1798ea8624500d564b9701369cb5280ee41febee6025515bfe37e6d16b2c
                        • Instruction ID: 830350ba43b7c40c7e0c7f309069c43daa435e39d7b72e856b3305ee28deb0f6
                        • Opcode Fuzzy Hash: 882d1798ea8624500d564b9701369cb5280ee41febee6025515bfe37e6d16b2c
                        • Instruction Fuzzy Hash: 85E04F32018601EEE7352B61FC05FBB77E9EB04320B20886EF5A5814B1DB626CA1DB54
                        Strings
                        • Variable is not of type 'Object'., xrefs: 00BE0C40
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable is not of type 'Object'.
                        • API String ID: 0-1840281001
                        • Opcode ID: dd4e14472c226ff2203bcb6f0813f5307bca2ccba88f52065d62c81f73c1c90a
                        • Instruction ID: f20c4577eda19b3cd957e84a7cb6c24c54f511c4503fbf7cbf9f440d7122aecd
                        • Opcode Fuzzy Hash: dd4e14472c226ff2203bcb6f0813f5307bca2ccba88f52065d62c81f73c1c90a
                        • Instruction Fuzzy Hash: 7F326A709102189BCF14EF90D995BEDBBF5FF05304F6480B9E806AB292D775AE49CB60
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00BC6766,?,?,00000008,?,?,00BCFEFE,00000000), ref: 00BC6998
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: f2e063475fc78b754e536b299459917d125975eae510ba6e08e7526d6850a6a2
                        • Instruction ID: 7546c84369e80498800b0c83ddb04a8778c425c66bdc4c5a4e59c269f8d02ccd
                        • Opcode Fuzzy Hash: f2e063475fc78b754e536b299459917d125975eae510ba6e08e7526d6850a6a2
                        • Instruction Fuzzy Hash: F2B129316106099FD719CF28C48AF657BE0FF49364F25869DE89ACF2A2C735E991CB40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 08aa7f3188888b76397cea8b86629aaf45897e6fc1ecb2979474cd6aa3e2120a
                        • Instruction ID: 3892c1eccc86f13c6e30fbf418e59f818f5f6e537411976f45da434c0fbd7e44
                        • Opcode Fuzzy Hash: 08aa7f3188888b76397cea8b86629aaf45897e6fc1ecb2979474cd6aa3e2120a
                        • Instruction Fuzzy Hash: 441260719046299FCB14CF59C880AEEB7F5FF49710F1481AAE859EB252DB309E81CF90
                        APIs
                        • BlockInput.USER32(00000001), ref: 00C0EABD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: 30d567fd71c426645236f20d1b0c8f573f4b426578fc330c905bf1763b6cbd66
                        • Instruction ID: d4e79823d86d8b4f9c86c52b5676a9af10fc951c8e301837b6fb96d0eab5f5a2
                        • Opcode Fuzzy Hash: 30d567fd71c426645236f20d1b0c8f573f4b426578fc330c905bf1763b6cbd66
                        • Instruction Fuzzy Hash: 86E04F323102049FC710EF5AD844E9AFBE9AF98760F01846AFC49C73A1DB70E841CBA0
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00BB03EE), ref: 00BB09DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: c152ac2ad09c581ff45f713776ea9ee2ce565c702e752d12e85ba31751d56ea6
                        • Instruction ID: af833f6f3f1922a45162f2aa935bc1d155bb51f107208c2b274d37eff9f7c43f
                        • Opcode Fuzzy Hash: c152ac2ad09c581ff45f713776ea9ee2ce565c702e752d12e85ba31751d56ea6
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction ID: e65e674b17472d443a00f1c5b018174ab8221d1bec4dedbbd8e8d22793b15326
                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction Fuzzy Hash: 875134616CC6056BDB38896A8C9EBFE23D9DBD2340F1805C9D8C6D7282CED5DE01D356
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b21575775a831e4f663d02c85bda6ab922901210b2dfa008131726931b0f296c
                        • Instruction ID: 1db6e9efd6ff72ab8b70766b9c8a5bdd60f650c195c2287b7d205bc2e3747398
                        • Opcode Fuzzy Hash: b21575775a831e4f663d02c85bda6ab922901210b2dfa008131726931b0f296c
                        • Instruction Fuzzy Hash: 66322231E79F014DDB239634D822339A689AFB73D5F15D73BE81AB5AA5EF29C4834100
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4405103641a43a269ceb68236f7fbcbcadf12cc32158c8f259c454aaa7dc2d7b
                        • Instruction ID: 8e6fec4ad74340f6bfb0aa5c2f958a7b5410de8ffe18d15866e7b0f9e11a3e7b
                        • Opcode Fuzzy Hash: 4405103641a43a269ceb68236f7fbcbcadf12cc32158c8f259c454aaa7dc2d7b
                        • Instruction Fuzzy Hash: 2832F831A081958FDF24CF2AC4D467D7FE1EB46310F2885EAD45A9B296E730DD82DB81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6c5f38b9c714d938ffd8eceaa5ae31896a9ab62c1ae272b3b85ec5a6134b02a8
                        • Instruction ID: ebd070070c8159120076428b0aeed97cb6cd81861b8ea940ae76cf25913e8d8b
                        • Opcode Fuzzy Hash: 6c5f38b9c714d938ffd8eceaa5ae31896a9ab62c1ae272b3b85ec5a6134b02a8
                        • Instruction Fuzzy Hash: B8229E70A0460ADFDF14CFA8D881AAEB7F5FF44310F2045BAE816A7391EB35A955CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00992b5c91e4a13218183ad4773484386cf6edc600998d6ed04702a74504a07c
                        • Instruction ID: ca4d3484e0b66ba920fca002b25458f568baf2fcd81323b18e542d883466a0c4
                        • Opcode Fuzzy Hash: 00992b5c91e4a13218183ad4773484386cf6edc600998d6ed04702a74504a07c
                        • Instruction Fuzzy Hash: 540297B0E1020AEBDF05EF54D881AADB7F1FF44340F5181A9E4169B391EB31EA51CB95
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d14760ce7d97bbe591f305e598b4c37113db38e0c38bc054f431485ed25175e8
                        • Instruction ID: c1b8e5153d041f7e91feacc2250589b8934b783499e9becd7f495d5b4e1b40c8
                        • Opcode Fuzzy Hash: d14760ce7d97bbe591f305e598b4c37113db38e0c38bc054f431485ed25175e8
                        • Instruction Fuzzy Hash: A0B1D030D3AF814DD2639639887133AB69CAFBB6D5B91D71BFC1674D62EB2185834140
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction ID: 82405c67f0026d74c8bcbc74bdb9ed677f250fae97c432419381564d541d4ef9
                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction Fuzzy Hash: 019155721090A34BDB69463E85740BEFFE1DB923A135A0FEDD4F2CA1C5EE64C964D620
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction ID: a0d4d74db8017628ecc2c1c8958bf9fe4415cb0347481940f728967e8e9037bb
                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction Fuzzy Hash: 3B9182722090E34BDB29427E85740BEFFE19B923A135A0BDDD4F2CA1C5FE94D564D620
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2414415b84f4bd876da58afe988809b18cd91a7f88bff69b677819e1b1a71951
                        • Instruction ID: 1145b891edeb8cc98dc95a2d3a039ffd26e893c4fe540c971928793b6343a8ce
                        • Opcode Fuzzy Hash: 2414415b84f4bd876da58afe988809b18cd91a7f88bff69b677819e1b1a71951
                        • Instruction Fuzzy Hash: F06137612C870967DE749A2889B5BFE23D8DFC1700F1409D9E882DB2D1DED19E42CB55
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b6cd041076b6fb907a7785937c9366edef88044abbb9c19dcf4fefcd1be3215b
                        • Instruction ID: becbd74bda32b594fdc7c24306f43346ca7a460143bf0970889bc263dfc01cbe
                        • Opcode Fuzzy Hash: b6cd041076b6fb907a7785937c9366edef88044abbb9c19dcf4fefcd1be3215b
                        • Instruction Fuzzy Hash: A96138B16C870957DA389A2888A5BFE23DCDFC2780F1409E9E943DF681DED2DD42C255
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction ID: 565aa89ed6f83514ec6149827765c038d05b39cb3e57f6af6b7477c0d1356437
                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction Fuzzy Hash: 708175726090E34BDB2D463E85744BEFFE1AB923A135A0BDDD4F2CB1C1EE948954D620
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 59064366cf13993a79fe67cf019fd756fe1d93f4d3a38316fcb0d2d5f393a610
                        • Instruction ID: 5a4719893af63d450857615c38777f39f3aa57385bde36c2f1850b78d2640d72
                        • Opcode Fuzzy Hash: 59064366cf13993a79fe67cf019fd756fe1d93f4d3a38316fcb0d2d5f393a610
                        • Instruction Fuzzy Hash: 6921A5326206118BDB38CE79C82677E73E9A754314F15862EE4A7C37D0DE75E904CB80
                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 00C2712F
                        • GetSysColorBrush.USER32(0000000F), ref: 00C27160
                        • GetSysColor.USER32(0000000F), ref: 00C2716C
                        • SetBkColor.GDI32(?,000000FF), ref: 00C27186
                        • SelectObject.GDI32(?,?), ref: 00C27195
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00C271C0
                        • GetSysColor.USER32(00000010), ref: 00C271C8
                        • CreateSolidBrush.GDI32(00000000), ref: 00C271CF
                        • FrameRect.USER32(?,?,00000000), ref: 00C271DE
                        • DeleteObject.GDI32(00000000), ref: 00C271E5
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00C27230
                        • FillRect.USER32(?,?,?), ref: 00C27262
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C27284
                          • Part of subcall function 00C273E8: GetSysColor.USER32(00000012), ref: 00C27421
                          • Part of subcall function 00C273E8: SetTextColor.GDI32(?,?), ref: 00C27425
                          • Part of subcall function 00C273E8: GetSysColorBrush.USER32(0000000F), ref: 00C2743B
                          • Part of subcall function 00C273E8: GetSysColor.USER32(0000000F), ref: 00C27446
                          • Part of subcall function 00C273E8: GetSysColor.USER32(00000011), ref: 00C27463
                          • Part of subcall function 00C273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C27471
                          • Part of subcall function 00C273E8: SelectObject.GDI32(?,00000000), ref: 00C27482
                          • Part of subcall function 00C273E8: SetBkColor.GDI32(?,00000000), ref: 00C2748B
                          • Part of subcall function 00C273E8: SelectObject.GDI32(?,?), ref: 00C27498
                          • Part of subcall function 00C273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00C274B7
                          • Part of subcall function 00C273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C274CE
                          • Part of subcall function 00C273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00C274DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: 573635f972364dba04bda415506c9f85b8886f9137b066a3786f26d1ef6f89eb
                        • Instruction ID: f768c2c52e019e5d441b7136276355b06af64b81f9da3463154c4fd55ed5819d
                        • Opcode Fuzzy Hash: 573635f972364dba04bda415506c9f85b8886f9137b066a3786f26d1ef6f89eb
                        • Instruction Fuzzy Hash: 1DA19D72018311EFDB209F64DC88B6E7BA9FF49320F100B29F962965E1D770E945DB92
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00BA8E14
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00BE6AC5
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00BE6AFE
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00BE6F43
                          • Part of subcall function 00BA8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BA8BE8,?,00000000,?,?,?,?,00BA8BBA,00000000,?), ref: 00BA8FC5
                        • SendMessageW.USER32(?,00001053), ref: 00BE6F7F
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00BE6F96
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00BE6FAC
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00BE6FB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 2760611726-4108050209
                        • Opcode ID: 7eb318b94fb67d1ca1f0d91c84f642863006bfefa993bb25143b0883f029e98a
                        • Instruction ID: d5353db495ac127866c3d20410a3d5c612a72c8d3a9c8971ecb3debb3158c3f4
                        • Opcode Fuzzy Hash: 7eb318b94fb67d1ca1f0d91c84f642863006bfefa993bb25143b0883f029e98a
                        • Instruction Fuzzy Hash: 8712AB30204281DFDB25CF25C894BAAB7E1FF65350F1884A9E5858BA61CB72EC52DF91
                        APIs
                        • DestroyWindow.USER32(00000000), ref: 00C1273E
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00C1286A
                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00C128A9
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00C128B9
                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00C12900
                        • GetClientRect.USER32(00000000,?), ref: 00C1290C
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00C12955
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00C12964
                        • GetStockObject.GDI32(00000011), ref: 00C12974
                        • SelectObject.GDI32(00000000,00000000), ref: 00C12978
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00C12988
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C12991
                        • DeleteDC.GDI32(00000000), ref: 00C1299A
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00C129C6
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00C129DD
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00C12A1D
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00C12A31
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00C12A42
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00C12A77
                        • GetStockObject.GDI32(00000011), ref: 00C12A82
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00C12A8D
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00C12A97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: 997182844294858e2b96e736e9cb700da65f551fde973889478b247a78346eb9
                        • Instruction ID: 32fb6fb058f607b58b0165182842eafafe86379c7530c48eb0711abfd4dae60c
                        • Opcode Fuzzy Hash: 997182844294858e2b96e736e9cb700da65f551fde973889478b247a78346eb9
                        • Instruction Fuzzy Hash: 49B17D75A10205AFEB20DF68DC8AFAE7BA9EB08711F048154F915E72E0D770ED41CB94
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00C04AED
                        • GetDriveTypeW.KERNEL32(?,00C2CB68,?,\\.\,00C2CC08), ref: 00C04BCA
                        • SetErrorMode.KERNEL32(00000000,00C2CB68,?,\\.\,00C2CC08), ref: 00C04D36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: 5a6d78642317cae98c3c47aefc7eaf914168150fafeb140a9abdecf0f604a780
                        • Instruction ID: 401c342b673a0776a3e3e22828f493172e7fd7aa8393ff55224c6ad48a323551
                        • Opcode Fuzzy Hash: 5a6d78642317cae98c3c47aefc7eaf914168150fafeb140a9abdecf0f604a780
                        • Instruction Fuzzy Hash: 9761F2B4205205EBDB0CDF24CA8297E77B0EB04701B648469FE06AB2D1CB31EE85DB45
                        APIs
                        • GetSysColor.USER32(00000012), ref: 00C27421
                        • SetTextColor.GDI32(?,?), ref: 00C27425
                        • GetSysColorBrush.USER32(0000000F), ref: 00C2743B
                        • GetSysColor.USER32(0000000F), ref: 00C27446
                        • CreateSolidBrush.GDI32(?), ref: 00C2744B
                        • GetSysColor.USER32(00000011), ref: 00C27463
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C27471
                        • SelectObject.GDI32(?,00000000), ref: 00C27482
                        • SetBkColor.GDI32(?,00000000), ref: 00C2748B
                        • SelectObject.GDI32(?,?), ref: 00C27498
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00C274B7
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C274CE
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00C274DB
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C2752A
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00C27554
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00C27572
                        • DrawFocusRect.USER32(?,?), ref: 00C2757D
                        • GetSysColor.USER32(00000011), ref: 00C2758E
                        • SetTextColor.GDI32(?,00000000), ref: 00C27596
                        • DrawTextW.USER32(?,00C270F5,000000FF,?,00000000), ref: 00C275A8
                        • SelectObject.GDI32(?,?), ref: 00C275BF
                        • DeleteObject.GDI32(?), ref: 00C275CA
                        • SelectObject.GDI32(?,?), ref: 00C275D0
                        • DeleteObject.GDI32(?), ref: 00C275D5
                        • SetTextColor.GDI32(?,?), ref: 00C275DB
                        • SetBkColor.GDI32(?,?), ref: 00C275E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: e732d61d8ba2a612f85ad70029a2eb888ab0da1018e4c902eac144dcfb7c08e0
                        • Instruction ID: 8bf4ca1c2fc3db4addeb95c166f61cecdb7e4d0499d2be0412a36bcd3d6ef7ee
                        • Opcode Fuzzy Hash: e732d61d8ba2a612f85ad70029a2eb888ab0da1018e4c902eac144dcfb7c08e0
                        • Instruction Fuzzy Hash: 5B616F72900218AFDB119FA4DC89BAEBFB9EF08320F104225F911AB6A1D7749941DF90
                        APIs
                        • GetCursorPos.USER32(?), ref: 00C21128
                        • GetDesktopWindow.USER32 ref: 00C2113D
                        • GetWindowRect.USER32(00000000), ref: 00C21144
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C21199
                        • DestroyWindow.USER32(?), ref: 00C211B9
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00C211ED
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C2120B
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C2121D
                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00C21232
                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00C21245
                        • IsWindowVisible.USER32(00000000), ref: 00C212A1
                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00C212BC
                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00C212D0
                        • GetWindowRect.USER32(00000000,?), ref: 00C212E8
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00C2130E
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00C21328
                        • CopyRect.USER32(?,?), ref: 00C2133F
                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00C213AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: f6259a65920a76486cfeca2d07690e5c20a8bbe44ccabc0bd923074305f66c37
                        • Instruction ID: 8681c79312dabea3c8ab53693c8af9468dd04bf45dc6bc77197e79befae44b88
                        • Opcode Fuzzy Hash: f6259a65920a76486cfeca2d07690e5c20a8bbe44ccabc0bd923074305f66c37
                        • Instruction Fuzzy Hash: C5B1A971608350AFDB10DF64D884B6EBBE5FF98350F04891CF9999B2A1CB31E945CB92
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00C202E5
                        • _wcslen.LIBCMT ref: 00C2031F
                        • _wcslen.LIBCMT ref: 00C20389
                        • _wcslen.LIBCMT ref: 00C203F1
                        • _wcslen.LIBCMT ref: 00C20475
                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00C204C5
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C20504
                          • Part of subcall function 00BAF9F2: _wcslen.LIBCMT ref: 00BAF9FD
                          • Part of subcall function 00BF223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BF2258
                          • Part of subcall function 00BF223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BF228A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                        • API String ID: 1103490817-719923060
                        • Opcode ID: bedef373ee9c18059b22c6947c047e818643578376d2e6f97d0730fdfe619f56
                        • Instruction ID: 3bf6af4aa551db35da4e68429c21a09861eafa663fd6407aaa43e92b5a8b7ad9
                        • Opcode Fuzzy Hash: bedef373ee9c18059b22c6947c047e818643578376d2e6f97d0730fdfe619f56
                        • Instruction Fuzzy Hash: 6EE1C3312182118FCB14DF24D59193EB7E5FF98314B2445AEF8A69BBA2DB30EE45CB41
                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BA8968
                        • GetSystemMetrics.USER32(00000007), ref: 00BA8970
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BA899B
                        • GetSystemMetrics.USER32(00000008), ref: 00BA89A3
                        • GetSystemMetrics.USER32(00000004), ref: 00BA89C8
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00BA89E5
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00BA89F5
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00BA8A28
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00BA8A3C
                        • GetClientRect.USER32(00000000,000000FF), ref: 00BA8A5A
                        • GetStockObject.GDI32(00000011), ref: 00BA8A76
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BA8A81
                          • Part of subcall function 00BA912D: GetCursorPos.USER32(?), ref: 00BA9141
                          • Part of subcall function 00BA912D: ScreenToClient.USER32(00000000,?), ref: 00BA915E
                          • Part of subcall function 00BA912D: GetAsyncKeyState.USER32(00000001), ref: 00BA9183
                          • Part of subcall function 00BA912D: GetAsyncKeyState.USER32(00000002), ref: 00BA919D
                        • SetTimer.USER32(00000000,00000000,00000028,00BA90FC), ref: 00BA8AA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: fb8aa8191d21d112a5c0b4f4961615529eae1da0ec666d48491b11dd3b9b207b
                        • Instruction ID: 8ed374d461e569a7b567b8472653a953c6f6e982a5bf056725cc4a70da2899dd
                        • Opcode Fuzzy Hash: fb8aa8191d21d112a5c0b4f4961615529eae1da0ec666d48491b11dd3b9b207b
                        • Instruction Fuzzy Hash: 7AB16971A002099FDB24DFA9CC85BAE3BF5FB48315F144269FA15E7290DB74E841CB51
                        APIs
                          • Part of subcall function 00BF10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BF1114
                          • Part of subcall function 00BF10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF1120
                          • Part of subcall function 00BF10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF112F
                          • Part of subcall function 00BF10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF1136
                          • Part of subcall function 00BF10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BF114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BF0DF5
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BF0E29
                        • GetLengthSid.ADVAPI32(?), ref: 00BF0E40
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00BF0E7A
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BF0E96
                        • GetLengthSid.ADVAPI32(?), ref: 00BF0EAD
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00BF0EB5
                        • HeapAlloc.KERNEL32(00000000), ref: 00BF0EBC
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BF0EDD
                        • CopySid.ADVAPI32(00000000), ref: 00BF0EE4
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BF0F13
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BF0F35
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BF0F47
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF0F6E
                        • HeapFree.KERNEL32(00000000), ref: 00BF0F75
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF0F7E
                        • HeapFree.KERNEL32(00000000), ref: 00BF0F85
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF0F8E
                        • HeapFree.KERNEL32(00000000), ref: 00BF0F95
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00BF0FA1
                        • HeapFree.KERNEL32(00000000), ref: 00BF0FA8
                          • Part of subcall function 00BF1193: GetProcessHeap.KERNEL32(00000008,00BF0BB1,?,00000000,?,00BF0BB1,?), ref: 00BF11A1
                          • Part of subcall function 00BF1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00BF0BB1,?), ref: 00BF11A8
                          • Part of subcall function 00BF1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00BF0BB1,?), ref: 00BF11B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: 50b0bb2959ede92500b7a2abc0d82637b68b40398be7d1f1d043b76877c51696
                        • Instruction ID: c1b821d5958f4bc1bc87e9e32748f672b90d6c3810afda4764481de6300f81ca
                        • Opcode Fuzzy Hash: 50b0bb2959ede92500b7a2abc0d82637b68b40398be7d1f1d043b76877c51696
                        • Instruction Fuzzy Hash: 6D714D7291020AEBDF20AFA4DC45FBEBBB8FF04310F144555FA19A71A2D771991ACB60
                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C1C4BD
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00C2CC08,00000000,?,00000000,?,?), ref: 00C1C544
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00C1C5A4
                        • _wcslen.LIBCMT ref: 00C1C5F4
                        • _wcslen.LIBCMT ref: 00C1C66F
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00C1C6B2
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00C1C7C1
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00C1C84D
                        • RegCloseKey.ADVAPI32(?), ref: 00C1C881
                        • RegCloseKey.ADVAPI32(00000000), ref: 00C1C88E
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00C1C960
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 9721498-966354055
                        • Opcode ID: fc3aff81fe678dfd679d2c99e9b1e93b8e8fdf426423ed6142b4bae76d10a713
                        • Instruction ID: c91f46d5710a6e726e119d3ca98a72666073079eaec6f14694360acfbe4a5af3
                        • Opcode Fuzzy Hash: fc3aff81fe678dfd679d2c99e9b1e93b8e8fdf426423ed6142b4bae76d10a713
                        • Instruction Fuzzy Hash: E7128B356182009FDB14DF14C891B6AB7E5FF89714F0588ACF85A9B3A2DB31ED41DB81
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00C209C6
                        • _wcslen.LIBCMT ref: 00C20A01
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C20A54
                        • _wcslen.LIBCMT ref: 00C20A8A
                        • _wcslen.LIBCMT ref: 00C20B06
                        • _wcslen.LIBCMT ref: 00C20B81
                          • Part of subcall function 00BAF9F2: _wcslen.LIBCMT ref: 00BAF9FD
                          • Part of subcall function 00BF2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00BF2BFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 1103490817-4258414348
                        • Opcode ID: 741d31f15ad3c65a82c978da5f8b3c2e18fb2a2e2b598206732e8d377aa5e65f
                        • Instruction ID: babc4ed9e0345cffd522f29035ac31e9faec7513796313e086ab88e84c74c00d
                        • Opcode Fuzzy Hash: 741d31f15ad3c65a82c978da5f8b3c2e18fb2a2e2b598206732e8d377aa5e65f
                        • Instruction Fuzzy Hash: 49E1B2352083118FCB14DF25D45092AB7E1FF98314F6589AEF8A65B762DB30EE49CB81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 1256254125-909552448
                        • Opcode ID: 8ddd39f0301f064808725449aae6b1f7ae8f2388f044e31e051ac5283f5f0aac
                        • Instruction ID: b9d915b972ae963984d9fdfa5bebb0dee042fd94699e424f7021bde54d846d2a
                        • Opcode Fuzzy Hash: 8ddd39f0301f064808725449aae6b1f7ae8f2388f044e31e051ac5283f5f0aac
                        • Instruction Fuzzy Hash: 8371E33268412A8BCF21DE68D9D15FF3391AF66754B250268FC7697284E631CEC5E3A0
                        APIs
                        • _wcslen.LIBCMT ref: 00C2835A
                        • _wcslen.LIBCMT ref: 00C2836E
                        • _wcslen.LIBCMT ref: 00C28391
                        • _wcslen.LIBCMT ref: 00C283B4
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00C283F2
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00C25BF2), ref: 00C2844E
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C28487
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00C284CA
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C28501
                        • FreeLibrary.KERNEL32(?), ref: 00C2850D
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C2851D
                        • DestroyIcon.USER32(?,?,?,?,?,00C25BF2), ref: 00C2852C
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00C28549
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00C28555
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                        • String ID: .dll$.exe$.icl
                        • API String ID: 799131459-1154884017
                        • Opcode ID: 365ac7587b12857fb9503c7c3890dceee56cc213d12c2bc0316fc2c54cb607d0
                        • Instruction ID: a98227e8f46ae89e712c1e939c4d674212c64973a8bd451389fc2d3042eec92f
                        • Opcode Fuzzy Hash: 365ac7587b12857fb9503c7c3890dceee56cc213d12c2bc0316fc2c54cb607d0
                        • Instruction Fuzzy Hash: 5D61ED71510225BFEB24DF64EC81BBE77A8BF08B11F104259F825D64D1DBB4EA84CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 0-1645009161
                        • Opcode ID: 8d724f01a719824974e730925dfd8829f742f1d4c360202b2596b0e856f56ba6
                        • Instruction ID: bf6ad9c6cef17ea8dca7754afef4c14f556914f691d2248c889d45c0fe516f2e
                        • Opcode Fuzzy Hash: 8d724f01a719824974e730925dfd8829f742f1d4c360202b2596b0e856f56ba6
                        • Instruction Fuzzy Hash: 6781DF71694605ABDF24AFA0DC82FBE77E9EF15300F0440B5F805AA292EF74DA15C6A1
                        APIs
                        • LoadIconW.USER32(00000063), ref: 00BF5A2E
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00BF5A40
                        • SetWindowTextW.USER32(?,?), ref: 00BF5A57
                        • GetDlgItem.USER32(?,000003EA), ref: 00BF5A6C
                        • SetWindowTextW.USER32(00000000,?), ref: 00BF5A72
                        • GetDlgItem.USER32(?,000003E9), ref: 00BF5A82
                        • SetWindowTextW.USER32(00000000,?), ref: 00BF5A88
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00BF5AA9
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00BF5AC3
                        • GetWindowRect.USER32(?,?), ref: 00BF5ACC
                        • _wcslen.LIBCMT ref: 00BF5B33
                        • SetWindowTextW.USER32(?,?), ref: 00BF5B6F
                        • GetDesktopWindow.USER32 ref: 00BF5B75
                        • GetWindowRect.USER32(00000000), ref: 00BF5B7C
                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00BF5BD3
                        • GetClientRect.USER32(?,?), ref: 00BF5BE0
                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00BF5C05
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00BF5C2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                        • String ID:
                        • API String ID: 895679908-0
                        • Opcode ID: d539819176dd0025fffb454f1cfbf27df11e5519c6c167641cc2f77b31184abd
                        • Instruction ID: 4fc16457c6378824dbc51173c685768041caeba5d32836a5140a3354a393ebaa
                        • Opcode Fuzzy Hash: d539819176dd0025fffb454f1cfbf27df11e5519c6c167641cc2f77b31184abd
                        • Instruction Fuzzy Hash: 4C713A31900B09AFDB30DFA8CE85BAEBBF5FF48705F104558E682A35A0D775A949CB50
                        APIs
                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00BB00C6
                          • Part of subcall function 00BB00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00C6070C,00000FA0,B6BCF633,?,?,?,?,00BD23B3,000000FF), ref: 00BB011C
                          • Part of subcall function 00BB00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00BD23B3,000000FF), ref: 00BB0127
                          • Part of subcall function 00BB00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00BD23B3,000000FF), ref: 00BB0138
                          • Part of subcall function 00BB00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00BB014E
                          • Part of subcall function 00BB00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BB015C
                          • Part of subcall function 00BB00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BB016A
                          • Part of subcall function 00BB00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00BB0195
                          • Part of subcall function 00BB00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00BB01A0
                        • ___scrt_fastfail.LIBCMT ref: 00BB00E7
                          • Part of subcall function 00BB00A3: __onexit.LIBCMT ref: 00BB00A9
                        Strings
                        • SleepConditionVariableCS, xrefs: 00BB0154
                        • WakeAllConditionVariable, xrefs: 00BB0162
                        • InitializeConditionVariable, xrefs: 00BB0148
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00BB0122
                        • kernel32.dll, xrefs: 00BB0133
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 66158676-1714406822
                        • Opcode ID: e8084637911bfb08d710ec22be3db12de3b3c89a4f36d5f208ad10eb055ccdb1
                        • Instruction ID: 4664affe84f8b848aac0f0ecb9aaccb99f449fdfa3e2358b996aac5c50bb4f17
                        • Opcode Fuzzy Hash: e8084637911bfb08d710ec22be3db12de3b3c89a4f36d5f208ad10eb055ccdb1
                        • Instruction Fuzzy Hash: B021F932A647156BD7347BA8AC46BBF73E4EF05B51F10057AF801B2A91DFF098018A90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 176396367-1603158881
                        • Opcode ID: 51aea28a67143d91223270ba196447b06b74cb32b5c2f0f3a2ba0db7cbebfb36
                        • Instruction ID: d2699fdba8e62ed4abe86f81d9bdb8691c3156d7c2d95b96e75f1321dab2f56b
                        • Opcode Fuzzy Hash: 51aea28a67143d91223270ba196447b06b74cb32b5c2f0f3a2ba0db7cbebfb36
                        • Instruction Fuzzy Hash: 79E19432A0051A9BCF14DFB8C4916FDBBF4FF54B50F5481A9EA56A7240DB30AE8D8790
                        APIs
                        • CharLowerBuffW.USER32(00000000,00000000,00C2CC08), ref: 00C04527
                        • _wcslen.LIBCMT ref: 00C0453B
                        • _wcslen.LIBCMT ref: 00C04599
                        • _wcslen.LIBCMT ref: 00C045F4
                        • _wcslen.LIBCMT ref: 00C0463F
                        • _wcslen.LIBCMT ref: 00C046A7
                          • Part of subcall function 00BAF9F2: _wcslen.LIBCMT ref: 00BAF9FD
                        • GetDriveTypeW.KERNEL32(?,00C56BF0,00000061), ref: 00C04743
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharDriveLowerType
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2055661098-1000479233
                        • Opcode ID: e904adec783ade80955d4f8e133c10423befe7c0a506ceb1902ab404cd74f21c
                        • Instruction ID: df2f27bd4efb94d784b0724cca97747938fcc9ae398a09282af5aee5478ddade
                        • Opcode Fuzzy Hash: e904adec783ade80955d4f8e133c10423befe7c0a506ceb1902ab404cd74f21c
                        • Instruction Fuzzy Hash: 5FB1D2B16083029FC718DF28C890A7BB7E5AFA5750F50492DF6A6C72D1E731DA44CB52
                        APIs
                        • _wcslen.LIBCMT ref: 00C1B198
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C1B1B0
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C1B1D4
                        • _wcslen.LIBCMT ref: 00C1B200
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C1B214
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C1B236
                        • _wcslen.LIBCMT ref: 00C1B332
                          • Part of subcall function 00C005A7: GetStdHandle.KERNEL32(000000F6), ref: 00C005C6
                        • _wcslen.LIBCMT ref: 00C1B34B
                        • _wcslen.LIBCMT ref: 00C1B366
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C1B3B6
                        • GetLastError.KERNEL32(00000000), ref: 00C1B407
                        • CloseHandle.KERNEL32(?), ref: 00C1B439
                        • CloseHandle.KERNEL32(00000000), ref: 00C1B44A
                        • CloseHandle.KERNEL32(00000000), ref: 00C1B45C
                        • CloseHandle.KERNEL32(00000000), ref: 00C1B46E
                        • CloseHandle.KERNEL32(?), ref: 00C1B4E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                        • String ID:
                        • API String ID: 2178637699-0
                        • Opcode ID: f40560cd5bafa281c322367517a0302776a4c12ae56a4f02a3ec88b46cf1a34c
                        • Instruction ID: 93a050df4b2c8fd40504d1ed102c533670ca6b12120973ad45a2e1c73b0861a3
                        • Opcode Fuzzy Hash: f40560cd5bafa281c322367517a0302776a4c12ae56a4f02a3ec88b46cf1a34c
                        • Instruction Fuzzy Hash: EBF19D715083409FCB14EF24C891BAEBBE1AF86310F14899DF4999B2A2DB31ED44DF52
                        APIs
                        • GetMenuItemCount.USER32(00C61990), ref: 00BD2F8D
                        • GetMenuItemCount.USER32(00C61990), ref: 00BD303D
                        • GetCursorPos.USER32(?), ref: 00BD3081
                        • SetForegroundWindow.USER32(00000000), ref: 00BD308A
                        • TrackPopupMenuEx.USER32(00C61990,00000000,?,00000000,00000000,00000000), ref: 00BD309D
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00BD30A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                        • String ID: 0
                        • API String ID: 36266755-4108050209
                        • Opcode ID: 978dee74dcac552e8680a84970ed48d80e30a918b0966d5143d99aaad7e91ede
                        • Instruction ID: f55f4025339dbd13fa540c7a2d5b1e8e45891e2c943eb941fc2d97eb2a4e724c
                        • Opcode Fuzzy Hash: 978dee74dcac552e8680a84970ed48d80e30a918b0966d5143d99aaad7e91ede
                        • Instruction Fuzzy Hash: AD710631644245BEEB218F24CC89FAEFFE4FF05724F2402A6F5146A2E1D7B1A910DB90
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00C26DEB
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00C26E5F
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00C26E81
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C26E94
                        • DestroyWindow.USER32(?), ref: 00C26EB5
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00B90000,00000000), ref: 00C26EE4
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C26EFD
                        • GetDesktopWindow.USER32 ref: 00C26F16
                        • GetWindowRect.USER32(00000000), ref: 00C26F1D
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C26F35
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00C26F4D
                          • Part of subcall function 00BA9944: GetWindowLongW.USER32(?,000000EB), ref: 00BA9952
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                        • String ID: 0$tooltips_class32
                        • API String ID: 2429346358-3619404913
                        • Opcode ID: 804d8280c9004a2fe4f4c1e1809a683e6258f54ae8c58d6a79a98954b2e45282
                        • Instruction ID: ff3b26fffd4848922b3f56462345ee00a91c5ca7f43ea7057217e96350e33bd0
                        • Opcode Fuzzy Hash: 804d8280c9004a2fe4f4c1e1809a683e6258f54ae8c58d6a79a98954b2e45282
                        • Instruction Fuzzy Hash: 83716774104244AFDB21CF58EC84FAABBF9FB89304F18041DF99997661C770AA06CF21
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • DragQueryPoint.SHELL32(?,?), ref: 00C29147
                          • Part of subcall function 00C27674: ClientToScreen.USER32(?,?), ref: 00C2769A
                          • Part of subcall function 00C27674: GetWindowRect.USER32(?,?), ref: 00C27710
                          • Part of subcall function 00C27674: PtInRect.USER32(?,?,00C28B89), ref: 00C27720
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00C291B0
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00C291BB
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00C291DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00C29225
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00C2923E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00C29255
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00C29277
                        • DragFinish.SHELL32(?), ref: 00C2927E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00C29371
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                        • API String ID: 221274066-3440237614
                        • Opcode ID: 1cfbff4fdc3a464cdff6c05693e9948b75d7fd54c1fde8972c2c9de8b99347e1
                        • Instruction ID: 28f7468c97a48ebb4b70673779589648bdb9bbe14cbe442129f62fff63aca9fb
                        • Opcode Fuzzy Hash: 1cfbff4fdc3a464cdff6c05693e9948b75d7fd54c1fde8972c2c9de8b99347e1
                        • Instruction Fuzzy Hash: F6616C71108301AFC711EF64DC85EAFBBE8EF89750F400A6EF595931A1DB709A49CB62
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C0C4B0
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00C0C4C3
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00C0C4D7
                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00C0C4F0
                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00C0C533
                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00C0C549
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C0C554
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C0C584
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00C0C5DC
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00C0C5F0
                        • InternetCloseHandle.WININET(00000000), ref: 00C0C5FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                        • String ID:
                        • API String ID: 3800310941-3916222277
                        • Opcode ID: 40ce148013a1c07462eb8b964f0b8c1dff65697bb920ea9194fc0caf0dee956f
                        • Instruction ID: b749b641102367c849470e205f9f8ad2bd6dccdfdd1967de178a1b250a8aac72
                        • Opcode Fuzzy Hash: 40ce148013a1c07462eb8b964f0b8c1dff65697bb920ea9194fc0caf0dee956f
                        • Instruction Fuzzy Hash: 7D514AB4500604AFDB218FA1CDC8BAF7BBCFB08754F004519F95596690DB34EA45EBA0
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00C28592
                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00C285A2
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00C285AD
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00C285BA
                        • GlobalLock.KERNEL32(00000000), ref: 00C285C8
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00C285D7
                        • GlobalUnlock.KERNEL32(00000000), ref: 00C285E0
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00C285E7
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00C285F8
                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00C2FC38,?), ref: 00C28611
                        • GlobalFree.KERNEL32(00000000), ref: 00C28621
                        • GetObjectW.GDI32(?,00000018,?), ref: 00C28641
                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00C28671
                        • DeleteObject.GDI32(?), ref: 00C28699
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00C286AF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3840717409-0
                        • Opcode ID: 55ff38605366c37d70a07ed1dd394a2f3f8492e6d76af66efb6bcb9b482c27ab
                        • Instruction ID: c025fc93925b52d5f1418920fc69a33e898050d0235e8cd247c629b17186a8a6
                        • Opcode Fuzzy Hash: 55ff38605366c37d70a07ed1dd394a2f3f8492e6d76af66efb6bcb9b482c27ab
                        • Instruction Fuzzy Hash: 9C412A75601214EFDB21DFA5DC88FAE7BB8EF89711F104059F915E7660DB30AA06CB60
                        APIs
                        • VariantInit.OLEAUT32(00000000), ref: 00C01502
                        • VariantCopy.OLEAUT32(?,?), ref: 00C0150B
                        • VariantClear.OLEAUT32(?), ref: 00C01517
                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C015FB
                        • VarR8FromDec.OLEAUT32(?,?), ref: 00C01657
                        • VariantInit.OLEAUT32(?), ref: 00C01708
                        • SysFreeString.OLEAUT32(?), ref: 00C0178C
                        • VariantClear.OLEAUT32(?), ref: 00C017D8
                        • VariantClear.OLEAUT32(?), ref: 00C017E7
                        • VariantInit.OLEAUT32(00000000), ref: 00C01823
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                        • API String ID: 1234038744-3931177956
                        • Opcode ID: 6f65a1ec756a328404895540d91e7e89f06fb4335a46a011c7ff22a5549ff244
                        • Instruction ID: bc3e08542857b54d473bd9945ae4e5ad91439f71d2a44c50f7148060d1766b24
                        • Opcode Fuzzy Hash: 6f65a1ec756a328404895540d91e7e89f06fb4335a46a011c7ff22a5549ff244
                        • Instruction Fuzzy Hash: 7BD1CE31A08519DBDB10AF66D885B7DF7F5BF45700F1880AAE846AF1C0DB30E945DBA1
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00C1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C1B6AE,?,?), ref: 00C1C9B5
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1C9F1
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1CA68
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C1B6F4
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C1B772
                        • RegDeleteValueW.ADVAPI32(?,?), ref: 00C1B80A
                        • RegCloseKey.ADVAPI32(?), ref: 00C1B87E
                        • RegCloseKey.ADVAPI32(?), ref: 00C1B89C
                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00C1B8F2
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C1B904
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C1B922
                        • FreeLibrary.KERNEL32(00000000), ref: 00C1B983
                        • RegCloseKey.ADVAPI32(00000000), ref: 00C1B994
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 146587525-4033151799
                        • Opcode ID: 0303323f994fbdffdf35e11e10ebe52ada8f9769502a64fa8b1ec4cf58611d94
                        • Instruction ID: 302e717c8437e04163f57723605f456ff7dda15cc98882570373c37072ad28f2
                        • Opcode Fuzzy Hash: 0303323f994fbdffdf35e11e10ebe52ada8f9769502a64fa8b1ec4cf58611d94
                        • Instruction Fuzzy Hash: BBC18D31208201AFD714DF24C495F6ABBE5BF85318F14859CF4AA4B2A2CB71ED86DF91
                        APIs
                        • GetDC.USER32(00000000), ref: 00C125D8
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00C125E8
                        • CreateCompatibleDC.GDI32(?), ref: 00C125F4
                        • SelectObject.GDI32(00000000,?), ref: 00C12601
                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00C1266D
                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00C126AC
                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00C126D0
                        • SelectObject.GDI32(?,?), ref: 00C126D8
                        • DeleteObject.GDI32(?), ref: 00C126E1
                        • DeleteDC.GDI32(?), ref: 00C126E8
                        • ReleaseDC.USER32(00000000,?), ref: 00C126F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: 2b09878e1433b32ad3cef622ba5092d2c1dac09e3c5f00abe1f1778981bd112e
                        • Instruction ID: cf0f9e6795b0a25ca0e71f9d9ab526db1ef00724f9a1ef1352636d47758ad2ef
                        • Opcode Fuzzy Hash: 2b09878e1433b32ad3cef622ba5092d2c1dac09e3c5f00abe1f1778981bd112e
                        • Instruction Fuzzy Hash: 4661E175D00219EFCF14CFA8D885AAEBBF6FF48310F208529E955A7250D770A951DFA0
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 00BCDAA1
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD659
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD66B
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD67D
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD68F
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD6A1
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD6B3
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD6C5
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD6D7
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD6E9
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD6FB
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD70D
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD71F
                          • Part of subcall function 00BCD63C: _free.LIBCMT ref: 00BCD731
                        • _free.LIBCMT ref: 00BCDA96
                          • Part of subcall function 00BC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000), ref: 00BC29DE
                          • Part of subcall function 00BC29C8: GetLastError.KERNEL32(00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000,00000000), ref: 00BC29F0
                        • _free.LIBCMT ref: 00BCDAB8
                        • _free.LIBCMT ref: 00BCDACD
                        • _free.LIBCMT ref: 00BCDAD8
                        • _free.LIBCMT ref: 00BCDAFA
                        • _free.LIBCMT ref: 00BCDB0D
                        • _free.LIBCMT ref: 00BCDB1B
                        • _free.LIBCMT ref: 00BCDB26
                        • _free.LIBCMT ref: 00BCDB5E
                        • _free.LIBCMT ref: 00BCDB65
                        • _free.LIBCMT ref: 00BCDB82
                        • _free.LIBCMT ref: 00BCDB9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: f260df6e992a66283ab6fd0ad5fd8babe06d98a4c199615df65f564b9b3dc7ff
                        • Instruction ID: c5196cba14ae1c08ce96667cfb7457aaea2dc32b8209a725478a6dd5b784d3c1
                        • Opcode Fuzzy Hash: f260df6e992a66283ab6fd0ad5fd8babe06d98a4c199615df65f564b9b3dc7ff
                        • Instruction Fuzzy Hash: A53136366047059FEB22AB39E845F5AB7E9FF04311F1544BDF489D72A1DA71AC80CB24
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00BF369C
                        • _wcslen.LIBCMT ref: 00BF36A7
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00BF3797
                        • GetClassNameW.USER32(?,?,00000400), ref: 00BF380C
                        • GetDlgCtrlID.USER32(?), ref: 00BF385D
                        • GetWindowRect.USER32(?,?), ref: 00BF3882
                        • GetParent.USER32(?), ref: 00BF38A0
                        • ScreenToClient.USER32(00000000), ref: 00BF38A7
                        • GetClassNameW.USER32(?,?,00000100), ref: 00BF3921
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00BF395D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                        • String ID: %s%u
                        • API String ID: 4010501982-679674701
                        • Opcode ID: 672fecac3a862330a5e84b9e3370a23214419d09acb9a145c820d1830b0cf2a2
                        • Instruction ID: 2c217312f7f345256d03d92a3fec5456fc31f949d9c3ad40aefea3c7f8111c11
                        • Opcode Fuzzy Hash: 672fecac3a862330a5e84b9e3370a23214419d09acb9a145c820d1830b0cf2a2
                        • Instruction Fuzzy Hash: 3F91917120460AAFD715DF24C885FBAF7E8FF44750F008569FA9AC3190DB74AA49CB91
                        APIs
                        • GetClassNameW.USER32(?,?,00000400), ref: 00BF4994
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00BF49DA
                        • _wcslen.LIBCMT ref: 00BF49EB
                        • CharUpperBuffW.USER32(?,00000000), ref: 00BF49F7
                        • _wcsstr.LIBVCRUNTIME ref: 00BF4A2C
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00BF4A64
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00BF4A9D
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00BF4AE6
                        • GetClassNameW.USER32(?,?,00000400), ref: 00BF4B20
                        • GetWindowRect.USER32(?,?), ref: 00BF4B8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                        • String ID: ThumbnailClass
                        • API String ID: 1311036022-1241985126
                        • Opcode ID: ac9b1899c1203985c798817d497d76a48160a61766017a35c41020c300f71144
                        • Instruction ID: d1f11494bfa6779794f446be6de2b0d3be3308a884e8981e379105d614c1e6e5
                        • Opcode Fuzzy Hash: ac9b1899c1203985c798817d497d76a48160a61766017a35c41020c300f71144
                        • Instruction Fuzzy Hash: 47918B311082099FDB14CF14C985BBBB7E8EF84314F0484A9FE859B196DB70ED49CBA1
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00C28D5A
                        • GetFocus.USER32 ref: 00C28D6A
                        • GetDlgCtrlID.USER32(00000000), ref: 00C28D75
                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00C28E1D
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00C28ECF
                        • GetMenuItemCount.USER32(?), ref: 00C28EEC
                        • GetMenuItemID.USER32(?,00000000), ref: 00C28EFC
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00C28F2E
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00C28F70
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C28FA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                        • String ID: 0
                        • API String ID: 1026556194-4108050209
                        • Opcode ID: 3cc2bf9f467c42d338e353472be7d54feb29663c629db7996a24fc331b36c782
                        • Instruction ID: f7a74a8adc503d615f132ecd9eaa415de7c16a6524cad240365afde53d51f742
                        • Opcode Fuzzy Hash: 3cc2bf9f467c42d338e353472be7d54feb29663c629db7996a24fc331b36c782
                        • Instruction Fuzzy Hash: 1581D1715093219FDB20CF14E984AAF7BE9FF88314F040919F99497A91DB70DA09DBA1
                        APIs
                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00BFDC20
                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00BFDC46
                        • _wcslen.LIBCMT ref: 00BFDC50
                        • _wcsstr.LIBVCRUNTIME ref: 00BFDCA0
                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00BFDCBC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                        • API String ID: 1939486746-1459072770
                        • Opcode ID: 3a80c2d7f1a8f94ea1fa51bad3d9d06c25fad655f643d081d72cce8c5b642840
                        • Instruction ID: e72e69ddf67a1151d85933bd84211a993e449f6f37c0574f735337eeae62646a
                        • Opcode Fuzzy Hash: 3a80c2d7f1a8f94ea1fa51bad3d9d06c25fad655f643d081d72cce8c5b642840
                        • Instruction Fuzzy Hash: 0F4102369442057BEB14A7649C83EFF77ECEF56710F5000B9FA00A7182EBB4990597A9
                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00C1CC64
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00C1CC8D
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00C1CD48
                          • Part of subcall function 00C1CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00C1CCAA
                          • Part of subcall function 00C1CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00C1CCBD
                          • Part of subcall function 00C1CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C1CCCF
                          • Part of subcall function 00C1CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00C1CD05
                          • Part of subcall function 00C1CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00C1CD28
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C1CCF3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2734957052-4033151799
                        • Opcode ID: 1871f73aee693ea6e0482ee76eedf477362940eee9c5bee8faa75330a6aa2d06
                        • Instruction ID: c2b86226828ce7e68f114ec5e1b6ff637a39b871f84c4c5f506ebb1a0b87718a
                        • Opcode Fuzzy Hash: 1871f73aee693ea6e0482ee76eedf477362940eee9c5bee8faa75330a6aa2d06
                        • Instruction Fuzzy Hash: 2D317A71941129BBDB209B55ECC8FFFBB7CEF06740F000165F916E2640DA749E86EAA0
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C03D40
                        • _wcslen.LIBCMT ref: 00C03D6D
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C03D9D
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C03DBE
                        • RemoveDirectoryW.KERNEL32(?), ref: 00C03DCE
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C03E55
                        • CloseHandle.KERNEL32(00000000), ref: 00C03E60
                        • CloseHandle.KERNEL32(00000000), ref: 00C03E6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                        • String ID: :$\$\??\%s
                        • API String ID: 1149970189-3457252023
                        • Opcode ID: 3f95dca5d7d9ba7cdde9ef9e7898c31f6d958b4171d288a1f7788c809ecec371
                        • Instruction ID: a5ddf12b891dd18eac5d2ef7b892c4bd62081c0827e192602d86b206f15ec4eb
                        • Opcode Fuzzy Hash: 3f95dca5d7d9ba7cdde9ef9e7898c31f6d958b4171d288a1f7788c809ecec371
                        • Instruction Fuzzy Hash: 5F31A175A20249ABDB219BA0DC89FEF37BCEF88710F1041B6F515D61A0EB749745CB24
                        APIs
                        • timeGetTime.WINMM ref: 00BFE6B4
                          • Part of subcall function 00BAE551: timeGetTime.WINMM(?,?,00BFE6D4), ref: 00BAE555
                        • Sleep.KERNEL32(0000000A), ref: 00BFE6E1
                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00BFE705
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00BFE727
                        • SetActiveWindow.USER32 ref: 00BFE746
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00BFE754
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00BFE773
                        • Sleep.KERNEL32(000000FA), ref: 00BFE77E
                        • IsWindow.USER32 ref: 00BFE78A
                        • EndDialog.USER32(00000000), ref: 00BFE79B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: eb0dd3aac2c8ff3285a36a93186a0e0619c6bdd04ad93d2dd4a29fa227d6eb97
                        • Instruction ID: 07b2eec794906c034d86d4e6d0401b46913411e76aaa3f72a0dec1376b386dea
                        • Opcode Fuzzy Hash: eb0dd3aac2c8ff3285a36a93186a0e0619c6bdd04ad93d2dd4a29fa227d6eb97
                        • Instruction Fuzzy Hash: 92219270210A08AFEB206F66ECCDB3D3BA9F754749B040465FA22835B1DBB1DC199B24
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00BFEA5D
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00BFEA73
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BFEA84
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00BFEA96
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00BFEAA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: SendString$_wcslen
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2420728520-1007645807
                        • Opcode ID: 877fbfbe0539f79c2efe2f9b31c16d93d83217d80e4deb9d70165d81090f0886
                        • Instruction ID: 9de08610f6bdad633028d52ce1d8a4d5ff8b54c4b99e604c113920ec1aa497d0
                        • Opcode Fuzzy Hash: 877fbfbe0539f79c2efe2f9b31c16d93d83217d80e4deb9d70165d81090f0886
                        • Instruction Fuzzy Hash: 8C115175A902197DDB20A7A5DC4AEFFAAFCEBD1F01F400579B911A30E1EAB04949C5B0
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00BF5CE2
                        • GetWindowRect.USER32(00000000,?), ref: 00BF5CFB
                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00BF5D59
                        • GetDlgItem.USER32(?,00000002), ref: 00BF5D69
                        • GetWindowRect.USER32(00000000,?), ref: 00BF5D7B
                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00BF5DCF
                        • GetDlgItem.USER32(?,000003E9), ref: 00BF5DDD
                        • GetWindowRect.USER32(00000000,?), ref: 00BF5DEF
                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00BF5E31
                        • GetDlgItem.USER32(?,000003EA), ref: 00BF5E44
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00BF5E5A
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00BF5E67
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: 6b94eb9b64df10e54091e90627ea65c574a12a525df08b863608249d2297fe3c
                        • Instruction ID: 75af86844b3fa1ff09c296c22cf4900783f0592f97fb08a971fc1f824650bdf7
                        • Opcode Fuzzy Hash: 6b94eb9b64df10e54091e90627ea65c574a12a525df08b863608249d2297fe3c
                        • Instruction Fuzzy Hash: 28512E74A10609AFDB28CF68CD89BAEBBF5FB48300F108169F615E7690D7709E05CB50
                        APIs
                          • Part of subcall function 00BA8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BA8BE8,?,00000000,?,?,?,?,00BA8BBA,00000000,?), ref: 00BA8FC5
                        • DestroyWindow.USER32(?), ref: 00BA8C81
                        • KillTimer.USER32(00000000,?,?,?,?,00BA8BBA,00000000,?), ref: 00BA8D1B
                        • DestroyAcceleratorTable.USER32(00000000), ref: 00BE6973
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00BA8BBA,00000000,?), ref: 00BE69A1
                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00BA8BBA,00000000,?), ref: 00BE69B8
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00BA8BBA,00000000), ref: 00BE69D4
                        • DeleteObject.GDI32(00000000), ref: 00BE69E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: 1fe5f49bf84223bc1c205290914726e7562924f7c51ab481696b9cf259753264
                        • Instruction ID: 953c48b2eff49b9fb7f0881936b53b23cf43adbdb262b2c0c2f1c91334b4aaab
                        • Opcode Fuzzy Hash: 1fe5f49bf84223bc1c205290914726e7562924f7c51ab481696b9cf259753264
                        • Instruction Fuzzy Hash: E461A930406640DFCB359F16C988B2DB7F1FB56362F1845ACE4429B9A0DBB5A891CF90
                        APIs
                          • Part of subcall function 00BA9944: GetWindowLongW.USER32(?,000000EB), ref: 00BA9952
                        • GetSysColor.USER32(0000000F), ref: 00BA9862
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: 13b2b7cc3e676a7962731953950eef8d8f0e49a456215fd6d3f8d38d95b56082
                        • Instruction ID: f5f192f43ba374db49637eb89f5fbb846919cce2e051e3d9e68d95178134465c
                        • Opcode Fuzzy Hash: 13b2b7cc3e676a7962731953950eef8d8f0e49a456215fd6d3f8d38d95b56082
                        • Instruction Fuzzy Hash: 4A418D31148640AADB309B399C85BBE3BE5EB17361F144695E9B28B1E1C7799C42EB10
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00BDF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00BF9717
                        • LoadStringW.USER32(00000000,?,00BDF7F8,00000001), ref: 00BF9720
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00BDF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00BF9742
                        • LoadStringW.USER32(00000000,?,00BDF7F8,00000001), ref: 00BF9745
                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00BF9866
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wcslen
                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                        • API String ID: 747408836-2268648507
                        • Opcode ID: 539e8f7529543e4e8d00437ff53ad6beda03368c6f267b808bee93f666145cb7
                        • Instruction ID: 1de2c3da2ba17839eca5e043671ea32799f2a89a9ffcd22ccbcd5c878eea2605
                        • Opcode Fuzzy Hash: 539e8f7529543e4e8d00437ff53ad6beda03368c6f267b808bee93f666145cb7
                        • Instruction Fuzzy Hash: D2411A72804209AACF14EBE4DD86EFEB7B8AF15740F5040B9F60573092EB656F49CB61
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00C13C5C
                        • CoInitialize.OLE32(00000000), ref: 00C13C8A
                        • CoUninitialize.OLE32 ref: 00C13C94
                        • _wcslen.LIBCMT ref: 00C13D2D
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00C13DB1
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C13ED5
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00C13F0E
                        • CoGetObject.OLE32(?,00000000,00C2FB98,?), ref: 00C13F2D
                        • SetErrorMode.KERNEL32(00000000), ref: 00C13F40
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C13FC4
                        • VariantClear.OLEAUT32(?), ref: 00C13FD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                        • String ID:
                        • API String ID: 429561992-0
                        • Opcode ID: 497195daea1bf4e70389a219d8b91173fcb27e7e0b017f9a26d43c03bb881007
                        • Instruction ID: d8215162291a7a7fa1700bfddb9a774b3dd61d7f9730fe2a1d8d1b7ff0a0fb56
                        • Opcode Fuzzy Hash: 497195daea1bf4e70389a219d8b91173fcb27e7e0b017f9a26d43c03bb881007
                        • Instruction Fuzzy Hash: 7DC168716083459FD700DF68C88496BB7E9FF8A748F00496DF98A9B250D730EE86DB52
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00C07AF3
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C07B8F
                        • SHGetDesktopFolder.SHELL32(?), ref: 00C07BA3
                        • CoCreateInstance.OLE32(00C2FD08,00000000,00000001,00C56E6C,?), ref: 00C07BEF
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C07C74
                        • CoTaskMemFree.OLE32(?,?), ref: 00C07CCC
                        • SHBrowseForFolderW.SHELL32(?), ref: 00C07D57
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C07D7A
                        • CoTaskMemFree.OLE32(00000000), ref: 00C07D81
                        • CoTaskMemFree.OLE32(00000000), ref: 00C07DD6
                        • CoUninitialize.OLE32 ref: 00C07DDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                        • String ID:
                        • API String ID: 2762341140-0
                        • Opcode ID: a88510ed08b1aa0b587c78a6e9c780afb5d5fb8a39de1e35130c05eaa6ee244b
                        • Instruction ID: 9fdfde5f1834ee7047af36279ed040774985a56f8f5e5312ab7228c68360c73b
                        • Opcode Fuzzy Hash: a88510ed08b1aa0b587c78a6e9c780afb5d5fb8a39de1e35130c05eaa6ee244b
                        • Instruction Fuzzy Hash: F8C12C75A04209AFCB14DF64C888EAEBBF9FF48304B1485A9F815DB661D730EE45CB90
                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00C25504
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C25515
                        • CharNextW.USER32(00000158), ref: 00C25544
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00C25585
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00C2559B
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C255AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$CharNext
                        • String ID:
                        • API String ID: 1350042424-0
                        • Opcode ID: acad9be595055620a136dfa7aa60bf7a5c20da1defc2b29e89f11f36b4c3bf24
                        • Instruction ID: 4e3b33fbec8c6ce97aeb4f36ded5c56ae4810814f3700f2bf2ce988b949a4944
                        • Opcode Fuzzy Hash: acad9be595055620a136dfa7aa60bf7a5c20da1defc2b29e89f11f36b4c3bf24
                        • Instruction Fuzzy Hash: 2E61AD74900628AFDF20EF55EC84AFF7BB9EF09720F108155F925A7A90D7708A81DB60
                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00BEFAAF
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00BEFB08
                        • VariantInit.OLEAUT32(?), ref: 00BEFB1A
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00BEFB3A
                        • VariantCopy.OLEAUT32(?,?), ref: 00BEFB8D
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00BEFBA1
                        • VariantClear.OLEAUT32(?), ref: 00BEFBB6
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00BEFBC3
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BEFBCC
                        • VariantClear.OLEAUT32(?), ref: 00BEFBDE
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BEFBE9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: 6acdb23913054691833feaa7937758db888328f86f2c5be4040e3ad85850a001
                        • Instruction ID: 3af932fc5345bbb9fdc50c6733dfec2f5850338912f7323426651122e9cd485a
                        • Opcode Fuzzy Hash: 6acdb23913054691833feaa7937758db888328f86f2c5be4040e3ad85850a001
                        • Instruction Fuzzy Hash: E1415135A1021A9FCF10EF65DC94ABEBBF9EF48344F0080A5E915A7261D734E946CF90
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00BF9CA1
                        • GetAsyncKeyState.USER32(000000A0), ref: 00BF9D22
                        • GetKeyState.USER32(000000A0), ref: 00BF9D3D
                        • GetAsyncKeyState.USER32(000000A1), ref: 00BF9D57
                        • GetKeyState.USER32(000000A1), ref: 00BF9D6C
                        • GetAsyncKeyState.USER32(00000011), ref: 00BF9D84
                        • GetKeyState.USER32(00000011), ref: 00BF9D96
                        • GetAsyncKeyState.USER32(00000012), ref: 00BF9DAE
                        • GetKeyState.USER32(00000012), ref: 00BF9DC0
                        • GetAsyncKeyState.USER32(0000005B), ref: 00BF9DD8
                        • GetKeyState.USER32(0000005B), ref: 00BF9DEA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 346a9d0e1a711b9ce90d07a71a759a9fe321528749c52c7e5d31eb529339a486
                        • Instruction ID: a00684940e8f1b121e858c2ac6b40e7d59afaa66d806786cc4877a33fb312821
                        • Opcode Fuzzy Hash: 346a9d0e1a711b9ce90d07a71a759a9fe321528749c52c7e5d31eb529339a486
                        • Instruction Fuzzy Hash: C941A634504BCD69FF35966488443B9BEE0EF12344F1480EADBC6575C2DBA599CCC7A2
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 00C105BC
                        • inet_addr.WSOCK32(?), ref: 00C1061C
                        • gethostbyname.WSOCK32(?), ref: 00C10628
                        • IcmpCreateFile.IPHLPAPI ref: 00C10636
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C106C6
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C106E5
                        • IcmpCloseHandle.IPHLPAPI(?), ref: 00C107B9
                        • WSACleanup.WSOCK32 ref: 00C107BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: f49069f20467b9593313673249f951e1e250701a76b085bc171cf1cb64c1d0f6
                        • Instruction ID: d295c591d86118c0717d4f08b3e861a1144a2595cb5771f55877ee2a91cec7fc
                        • Opcode Fuzzy Hash: f49069f20467b9593313673249f951e1e250701a76b085bc171cf1cb64c1d0f6
                        • Instruction Fuzzy Hash: 42919C356082019FD720DF15C889F5ABBE0AF45318F2485A9F4698B6A2C7B0EDC1DFD1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharLower
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 707087890-567219261
                        • Opcode ID: f5d56f09935d4ff36984bcd94da399f54ce2c33ef34ab65dcd1ef92cab105f2d
                        • Instruction ID: 51b58bc0675cef08cfe60d13405a8d6368547765831f3d2f0a7b9b9d76a67ed1
                        • Opcode Fuzzy Hash: f5d56f09935d4ff36984bcd94da399f54ce2c33ef34ab65dcd1ef92cab105f2d
                        • Instruction Fuzzy Hash: 1851A335A081169BCF14DF6CC9409FEB7E5BF66724B204269E825E72C5DB30DE88D790
                        APIs
                        • CoInitialize.OLE32 ref: 00C13774
                        • CoUninitialize.OLE32 ref: 00C1377F
                        • CoCreateInstance.OLE32(?,00000000,00000017,00C2FB78,?), ref: 00C137D9
                        • IIDFromString.OLE32(?,?), ref: 00C1384C
                        • VariantInit.OLEAUT32(?), ref: 00C138E4
                        • VariantClear.OLEAUT32(?), ref: 00C13936
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 636576611-1287834457
                        • Opcode ID: 60a8c35a62fae53d0e576801e6b7e82eec601a07c386109727e74f5f0069d42d
                        • Instruction ID: 770816ff6c57cb2e7c84423dd03dff72a25b28dceafca1ac2dc2610e99fd057a
                        • Opcode Fuzzy Hash: 60a8c35a62fae53d0e576801e6b7e82eec601a07c386109727e74f5f0069d42d
                        • Instruction Fuzzy Hash: DA61B2706083419FD711DF54C888BAEB7E4EF46718F10445AF995972D1C770EE88DB92
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C033CF
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C033F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-3080491070
                        • Opcode ID: 049c4f359dd74ecdb830194861d0d41bfd4b2fe7589659c4e7109634b59af70b
                        • Instruction ID: 04dbd063ede44af4d4622066e099aad9bd9d8a305a06c479e554cdd4bd766eb5
                        • Opcode Fuzzy Hash: 049c4f359dd74ecdb830194861d0d41bfd4b2fe7589659c4e7109634b59af70b
                        • Instruction Fuzzy Hash: 79517D31900209AADF15EBE4CD82EFEB7B8AF14741F1441B5F905721A2EB716F98DB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 1256254125-769500911
                        • Opcode ID: 0ca88cf9195decaec63c81ce3dcdef832b7e4b8667572ce46636c7ccee6bfb06
                        • Instruction ID: 1dd5c9be605dd0cc4a17decde5c327cef6554fd99f7ffa1b2f4a6cb52cea6aa8
                        • Opcode Fuzzy Hash: 0ca88cf9195decaec63c81ce3dcdef832b7e4b8667572ce46636c7ccee6bfb06
                        • Instruction Fuzzy Hash: 6641A632A0012AABCB106F7DC8909BEF7E5FF65794B2441A9E661D7284F731CD89C790
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00C053A0
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C05416
                        • GetLastError.KERNEL32 ref: 00C05420
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00C054A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: dfe7741c31336fcb2abdb9a231bd7ca47fef054cbe604be290687f3c36da5ad8
                        • Instruction ID: 699e68a6f6b1819586911ccd234c01fbd5b63f04befd6d20f0d9f05ce3bc91bf
                        • Opcode Fuzzy Hash: dfe7741c31336fcb2abdb9a231bd7ca47fef054cbe604be290687f3c36da5ad8
                        • Instruction Fuzzy Hash: 3C319D75A006059FCB10DFA8C485BEEBBB8EB04305F548069E915CB2D2DB70DE86CF91
                        APIs
                        • CreateMenu.USER32 ref: 00C23C79
                        • SetMenu.USER32(?,00000000), ref: 00C23C88
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C23D10
                        • IsMenu.USER32(?), ref: 00C23D24
                        • CreatePopupMenu.USER32 ref: 00C23D2E
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C23D5B
                        • DrawMenuBar.USER32 ref: 00C23D63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                        • String ID: 0$F
                        • API String ID: 161812096-3044882817
                        • Opcode ID: 813d7820d0ea94a2456f184569d8c4bca540525322d43e277a36a64c57736b79
                        • Instruction ID: 59029beedf726f11cb018bafd15ac4f5423262b18655185b93d451d04c3d02d6
                        • Opcode Fuzzy Hash: 813d7820d0ea94a2456f184569d8c4bca540525322d43e277a36a64c57736b79
                        • Instruction Fuzzy Hash: 4A418778A11219AFDB24CF64E888BAE7BB5FF49350F140028F956A7360D774EA10DF94
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00C23A9D
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00C23AA0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C23AC7
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C23AEA
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00C23B62
                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00C23BAC
                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00C23BC7
                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00C23BE2
                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00C23BF6
                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00C23C13
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: ac8787f9020b374ea882957d6e0aafff42ca669b363221fca753e149704ccf62
                        • Instruction ID: 3b248e23b7ae153c550259469c189349d1725558c04e47439fc66786ff481866
                        • Opcode Fuzzy Hash: ac8787f9020b374ea882957d6e0aafff42ca669b363221fca753e149704ccf62
                        • Instruction Fuzzy Hash: 47616975900258AFDB20DFA8DC81FEE77F8EB09710F140199FA15A72A1D774AE41DB50
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00BFB151
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB165
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00BFB16C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB17B
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BFB18D
                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB1A6
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB1B8
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB1FD
                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB212
                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00BFA1E1,?,00000001), ref: 00BFB21D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: 3ce2b35c3ad96c836d91c1ed08f93a0f8cb2cf62ba13ddfcb4d03b353a7d6ec7
                        • Instruction ID: 3e9fad6cbc756822a4b704e3de521f96b2015f314c427d10e22948020b22371f
                        • Opcode Fuzzy Hash: 3ce2b35c3ad96c836d91c1ed08f93a0f8cb2cf62ba13ddfcb4d03b353a7d6ec7
                        • Instruction Fuzzy Hash: DC316B75520208BFEB209F65DC88FBD7BA9FB61311F104055FA05D7190D7B89A498F60
                        APIs
                        • _free.LIBCMT ref: 00BC2C94
                          • Part of subcall function 00BC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000), ref: 00BC29DE
                          • Part of subcall function 00BC29C8: GetLastError.KERNEL32(00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000,00000000), ref: 00BC29F0
                        • _free.LIBCMT ref: 00BC2CA0
                        • _free.LIBCMT ref: 00BC2CAB
                        • _free.LIBCMT ref: 00BC2CB6
                        • _free.LIBCMT ref: 00BC2CC1
                        • _free.LIBCMT ref: 00BC2CCC
                        • _free.LIBCMT ref: 00BC2CD7
                        • _free.LIBCMT ref: 00BC2CE2
                        • _free.LIBCMT ref: 00BC2CED
                        • _free.LIBCMT ref: 00BC2CFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 19c81468e03af758510858ad8855e8e1c433a7d1dfadbe7982bcebf9b9052770
                        • Instruction ID: b0cb16e32b4f84fb95c9b56d9828c35b3f85410d6db251085702261860eca1d0
                        • Opcode Fuzzy Hash: 19c81468e03af758510858ad8855e8e1c433a7d1dfadbe7982bcebf9b9052770
                        • Instruction Fuzzy Hash: 6C117476510108AFCB02EF54D982EDD3BA5FF05350F5145A9FA889F322DA71EE509B90
                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00B91459
                        • OleUninitialize.OLE32(?,00000000), ref: 00B914F8
                        • UnregisterHotKey.USER32(?), ref: 00B916DD
                        • DestroyWindow.USER32(?), ref: 00BD24B9
                        • FreeLibrary.KERNEL32(?), ref: 00BD251E
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BD254B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: 1025881c572519dec7d583a375249867fc8a7e689c64501dc3eb27671f09904b
                        • Instruction ID: 12219f283077142913c02f17742734975bcfd854f88be45e59e0e6d08ac32865
                        • Opcode Fuzzy Hash: 1025881c572519dec7d583a375249867fc8a7e689c64501dc3eb27671f09904b
                        • Instruction Fuzzy Hash: 24D169316012128FCB29EF58D895A29F7E4BF25700F1546EEE44A6B361DB30EC12DF50
                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C07FAD
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C07FC1
                        • GetFileAttributesW.KERNEL32(?), ref: 00C07FEB
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00C08005
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C08017
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C08060
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C080B0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile
                        • String ID: *.*
                        • API String ID: 769691225-438819550
                        • Opcode ID: 7d72086662c1eebec7bceb885cde5ed5841fd561ad2bf7feb296643d462c7fb2
                        • Instruction ID: af27d65f77b1f3bbdd94955034293990bbb114104208f783d9a45b5d531b64b3
                        • Opcode Fuzzy Hash: 7d72086662c1eebec7bceb885cde5ed5841fd561ad2bf7feb296643d462c7fb2
                        • Instruction Fuzzy Hash: E181B4729082059FCB24DF15C444AAEB7D8BF84314F548D6EF8A5C7290EB35EE49CB52
                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00B95C7A
                          • Part of subcall function 00B95D0A: GetClientRect.USER32(?,?), ref: 00B95D30
                          • Part of subcall function 00B95D0A: GetWindowRect.USER32(?,?), ref: 00B95D71
                          • Part of subcall function 00B95D0A: ScreenToClient.USER32(?,?), ref: 00B95D99
                        • GetDC.USER32 ref: 00BD46F5
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00BD4708
                        • SelectObject.GDI32(00000000,00000000), ref: 00BD4716
                        • SelectObject.GDI32(00000000,00000000), ref: 00BD472B
                        • ReleaseDC.USER32(?,00000000), ref: 00BD4733
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00BD47C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: 58ef6a625b22b31b27170045e644571f1e9497b59cb07af33d835a5b0b9c40f6
                        • Instruction ID: 0263ad69e6e54a83e3969897dc40a749bf342c7c061cd12c04f2f21cef36b087
                        • Opcode Fuzzy Hash: 58ef6a625b22b31b27170045e644571f1e9497b59cb07af33d835a5b0b9c40f6
                        • Instruction Fuzzy Hash: D271AC31500205DFCF228F64C984AAABBF5FF4A361F1842AAED565A2A6E7319C41DF50
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00C035E4
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • LoadStringW.USER32(00C62390,?,00000FFF,?), ref: 00C0360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-2391861430
                        • Opcode ID: 254d837f4c590084ce888d2d23fa49b1c27200a553ba1b6299e762ae43d6ee85
                        • Instruction ID: 65f60a87a65d92565039773c6318fcc8dd0e142e1859e1ad2e06303cf450ae18
                        • Opcode Fuzzy Hash: 254d837f4c590084ce888d2d23fa49b1c27200a553ba1b6299e762ae43d6ee85
                        • Instruction Fuzzy Hash: 29519F71800209BADF14EBA4CC82EEDBBB8EF14741F0841B9F515721A1EB711B99DFA0
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                          • Part of subcall function 00BA912D: GetCursorPos.USER32(?), ref: 00BA9141
                          • Part of subcall function 00BA912D: ScreenToClient.USER32(00000000,?), ref: 00BA915E
                          • Part of subcall function 00BA912D: GetAsyncKeyState.USER32(00000001), ref: 00BA9183
                          • Part of subcall function 00BA912D: GetAsyncKeyState.USER32(00000002), ref: 00BA919D
                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00C28B6B
                        • ImageList_EndDrag.COMCTL32 ref: 00C28B71
                        • ReleaseCapture.USER32 ref: 00C28B77
                        • SetWindowTextW.USER32(?,00000000), ref: 00C28C12
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00C28C25
                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00C28CFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                        • API String ID: 1924731296-2107944366
                        • Opcode ID: 9c7a918f4d37574a450cec2545fa1e7e9d2874e38036f9e09a21eb9aa5839f57
                        • Instruction ID: 768bed810208190d1e78dfc6afed18a034029dfa97214088dd44e390049be2ec
                        • Opcode Fuzzy Hash: 9c7a918f4d37574a450cec2545fa1e7e9d2874e38036f9e09a21eb9aa5839f57
                        • Instruction Fuzzy Hash: 22519A70109310AFDB14DF24DC96BAE77E4FB88711F04066DF996972E1CB709A48CBA2
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C0C272
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C0C29A
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C0C2CA
                        • GetLastError.KERNEL32 ref: 00C0C322
                        • SetEvent.KERNEL32(?), ref: 00C0C336
                        • InternetCloseHandle.WININET(00000000), ref: 00C0C341
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: 47fe89977d842e4bf6c0c97271a4b4e85923d5ee5abf32306a742ff5920db312
                        • Instruction ID: 4ef310b762c3fe27e7b62486f0e2ac8e930c4293a0a412ff6b3221aa4cdadc47
                        • Opcode Fuzzy Hash: 47fe89977d842e4bf6c0c97271a4b4e85923d5ee5abf32306a742ff5920db312
                        • Instruction Fuzzy Hash: 0D318BB1610608AFD7219FA588C8BAF7BFCEB49B44B10861EF456D2690DB34DE05DB60
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00BD3AAF,?,?,Bad directive syntax error,00C2CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00BF98BC
                        • LoadStringW.USER32(00000000,?,00BD3AAF,?), ref: 00BF98C3
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00BF9987
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HandleLoadMessageModuleString_wcslen
                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                        • API String ID: 858772685-4153970271
                        • Opcode ID: 93dcc03593c15e0df669973da6bdf1c5fa0b8fec83edfad76ae0cac034a921dd
                        • Instruction ID: d90c5dcbf8bce6b719d9cd50d5f1047db19553893667c4c96048ae6e4c13d228
                        • Opcode Fuzzy Hash: 93dcc03593c15e0df669973da6bdf1c5fa0b8fec83edfad76ae0cac034a921dd
                        • Instruction Fuzzy Hash: 5E217E3184421EABCF11AF90CC46FFE77B5FF28701F0444AAF915620A2EB719658DB60
                        APIs
                        • GetParent.USER32 ref: 00BF20AB
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00BF20C0
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00BF214D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1290815626-3381328864
                        • Opcode ID: 697d90bc6f2119587f6c4c9c788cc401a6ebaf62ed3f50dfaec1475048634d12
                        • Instruction ID: 207518184cc83db979ebe9cc46f9c321de40645fc8f00286be95d42bf170770a
                        • Opcode Fuzzy Hash: 697d90bc6f2119587f6c4c9c788cc401a6ebaf62ed3f50dfaec1475048634d12
                        • Instruction Fuzzy Hash: D111EB7A58470ABAFA116320DC1BDFA77DCDB05315B2001A5FB04B60D2EBA1994E551D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7bab143d8c0679d38e63ed80b47e076ccb1250166bbc3cbce77bfc50288ea146
                        • Instruction ID: 3a1cc1804ed215231c3be30e582331377ada46ef6a05d839763a7b2941e69001
                        • Opcode Fuzzy Hash: 7bab143d8c0679d38e63ed80b47e076ccb1250166bbc3cbce77bfc50288ea146
                        • Instruction Fuzzy Hash: D5C19D75A04249AFEB21DFA8D885FEDBBF0AF09310F1441DDF915A7292C7B09942CB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                        • String ID:
                        • API String ID: 1282221369-0
                        • Opcode ID: 8809621080fff82a3bbadccdcaa148c6bd5b0dee73411a89637d14aa25666d0d
                        • Instruction ID: db3ada028faad74cb58fce526c1ab2c50472d4644dc846f63fe2b3ecfe5539ca
                        • Opcode Fuzzy Hash: 8809621080fff82a3bbadccdcaa148c6bd5b0dee73411a89637d14aa25666d0d
                        • Instruction Fuzzy Hash: 6E610371904201AFDB21AFB89891F6E7FE9EF15320F1442FDF949E7282D6719D058790
                        APIs
                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00C25186
                        • ShowWindow.USER32(?,00000000), ref: 00C251C7
                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 00C251CD
                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00C251D1
                          • Part of subcall function 00C26FBA: DeleteObject.GDI32(00000000), ref: 00C26FE6
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C2520D
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C2521A
                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00C2524D
                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00C25287
                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00C25296
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                        • String ID:
                        • API String ID: 3210457359-0
                        • Opcode ID: c2fe540b264bfc64bed729f952825d5c78e9c272be5c8dcefda35e635e1f3288
                        • Instruction ID: 8beb03c7ee3430086f6895430aea6ce6ad063c1a0b6b70890d15bc408febe1bf
                        • Opcode Fuzzy Hash: c2fe540b264bfc64bed729f952825d5c78e9c272be5c8dcefda35e635e1f3288
                        • Instruction Fuzzy Hash: 0451C530A50A28FFEF309F25EC49BDE3B65FB05321F144011F62596AE0C775AA94DB50
                        APIs
                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00BE6890
                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00BE68A9
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00BE68B9
                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00BE68D1
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00BE68F2
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00BA8874,00000000,00000000,00000000,000000FF,00000000), ref: 00BE6901
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00BE691E
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00BA8874,00000000,00000000,00000000,000000FF,00000000), ref: 00BE692D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                        • String ID:
                        • API String ID: 1268354404-0
                        • Opcode ID: 0f583e1a7e6af8e30d14c9ee1976055d036ba83201ed7b33dd8616850a248e93
                        • Instruction ID: 635b7964eee6fb3d1a1396ca647334baf21add00fccc52701ce3ef23110386bc
                        • Opcode Fuzzy Hash: 0f583e1a7e6af8e30d14c9ee1976055d036ba83201ed7b33dd8616850a248e93
                        • Instruction Fuzzy Hash: D751B770600209EFDB20CF25CC85BAE3BF5FB58360F140168F902976A0DB71E990DB60
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C0C182
                        • GetLastError.KERNEL32 ref: 00C0C195
                        • SetEvent.KERNEL32(?), ref: 00C0C1A9
                          • Part of subcall function 00C0C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C0C272
                          • Part of subcall function 00C0C253: GetLastError.KERNEL32 ref: 00C0C322
                          • Part of subcall function 00C0C253: SetEvent.KERNEL32(?), ref: 00C0C336
                          • Part of subcall function 00C0C253: InternetCloseHandle.WININET(00000000), ref: 00C0C341
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 337547030-0
                        • Opcode ID: bcfe865b19227dc15c94583e07be3d7e916f8d6bc6a6208396c80bc5352a0d0b
                        • Instruction ID: ad03fe18a71e64b293ce8a890baaa028a265af47b5585b00e3749e6182607fce
                        • Opcode Fuzzy Hash: bcfe865b19227dc15c94583e07be3d7e916f8d6bc6a6208396c80bc5352a0d0b
                        • Instruction Fuzzy Hash: 78318E71600601EFDB259FE5DD84B6ABBF8FF18300B00461DF96682A60DB30E915EBA0
                        APIs
                          • Part of subcall function 00BF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BF3A57
                          • Part of subcall function 00BF3A3D: GetCurrentThreadId.KERNEL32 ref: 00BF3A5E
                          • Part of subcall function 00BF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00BF25B3), ref: 00BF3A65
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BF25BD
                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00BF25DB
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00BF25DF
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BF25E9
                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00BF2601
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00BF2605
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BF260F
                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00BF2623
                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00BF2627
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: 02d15912ce309c829b469a609407797c6aab4e6beeb8529d63eff9a3c1fdb995
                        • Instruction ID: 67bd7bd4099d3cd62a5af29084a09837980a73e1faf8601a7f2568fc52e893c6
                        • Opcode Fuzzy Hash: 02d15912ce309c829b469a609407797c6aab4e6beeb8529d63eff9a3c1fdb995
                        • Instruction Fuzzy Hash: A901D4303A0614BBFB2067699CCAF6D3F99DF4EB12F100001F328AF0D1C9E224598A69
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00BF1449,?,?,00000000), ref: 00BF180C
                        • HeapAlloc.KERNEL32(00000000,?,00BF1449,?,?,00000000), ref: 00BF1813
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00BF1449,?,?,00000000), ref: 00BF1828
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00BF1449,?,?,00000000), ref: 00BF1830
                        • DuplicateHandle.KERNEL32(00000000,?,00BF1449,?,?,00000000), ref: 00BF1833
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00BF1449,?,?,00000000), ref: 00BF1843
                        • GetCurrentProcess.KERNEL32(00BF1449,00000000,?,00BF1449,?,?,00000000), ref: 00BF184B
                        • DuplicateHandle.KERNEL32(00000000,?,00BF1449,?,?,00000000), ref: 00BF184E
                        • CreateThread.KERNEL32(00000000,00000000,00BF1874,00000000,00000000,00000000), ref: 00BF1868
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: 04cd81023571ed22cb5cf925e1c8c92c753b46270a0b892101f313a89c1d2901
                        • Instruction ID: 818289c5270633378a90656c8afbbde70ee7a888ea4e345c45445708170cb84c
                        • Opcode Fuzzy Hash: 04cd81023571ed22cb5cf925e1c8c92c753b46270a0b892101f313a89c1d2901
                        • Instruction Fuzzy Hash: 9D01BBB5650308BFE720ABA5DC8EF6F3BACEB89B11F104411FA05DB5A1CA709815CB60
                        APIs
                          • Part of subcall function 00BFD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00BFD501
                          • Part of subcall function 00BFD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00BFD50F
                          • Part of subcall function 00BFD4DC: CloseHandle.KERNEL32(00000000), ref: 00BFD5DC
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C1A16D
                        • GetLastError.KERNEL32 ref: 00C1A180
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C1A1B3
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00C1A268
                        • GetLastError.KERNEL32(00000000), ref: 00C1A273
                        • CloseHandle.KERNEL32(00000000), ref: 00C1A2C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: 0e24c0b1f14938286b7ae4de81059cf1ef75010601b2ad3055b249c270a4b6eb
                        • Instruction ID: f2294380728399f555aeead87866364e009ad502954e43394c50578b6e734c5c
                        • Opcode Fuzzy Hash: 0e24c0b1f14938286b7ae4de81059cf1ef75010601b2ad3055b249c270a4b6eb
                        • Instruction Fuzzy Hash: 3061C431205241AFD720DF18C494F69BBE1AF45318F54849CE46A8BBA3C772ED89DB92
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00C23925
                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00C2393A
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00C23954
                        • _wcslen.LIBCMT ref: 00C23999
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00C239C6
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00C239F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcslen
                        • String ID: SysListView32
                        • API String ID: 2147712094-78025650
                        • Opcode ID: 4ebe5d05ec445a12f6e37428ea97cfc0ac7524ed46a0f6180d2eea688ff6fc07
                        • Instruction ID: 1581467f7fd6e6796b61dea3beafa1c33b9b364c8b81a40329f04aa2c5c1854e
                        • Opcode Fuzzy Hash: 4ebe5d05ec445a12f6e37428ea97cfc0ac7524ed46a0f6180d2eea688ff6fc07
                        • Instruction Fuzzy Hash: 1A41C571A00228ABDF21DF64DC45BEE7BA9EF08350F100526F954E7681D7759A84CB90
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BFBCFD
                        • IsMenu.USER32(00000000), ref: 00BFBD1D
                        • CreatePopupMenu.USER32 ref: 00BFBD53
                        • GetMenuItemCount.USER32(017F5500), ref: 00BFBDA4
                        • InsertMenuItemW.USER32(017F5500,?,00000001,00000030), ref: 00BFBDCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                        • String ID: 0$2
                        • API String ID: 93392585-3793063076
                        • Opcode ID: 747e4562226f2b4423ceb85d6d6f99987cd819cbd538f64af9a6a8039acecc32
                        • Instruction ID: 335fd69e19f4ef6043416cc2339c938788d9b8efa579f1f0ed92acc6642beb50
                        • Opcode Fuzzy Hash: 747e4562226f2b4423ceb85d6d6f99987cd819cbd538f64af9a6a8039acecc32
                        • Instruction Fuzzy Hash: 75519E74A0020D9BDB20DFA8D8C4FBEBBF4EF45314F1441A9E61197290D7709949CB52
                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 00BFC913
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: f22bf4c9f0e44ca2ad125f09ceb0220ffa06f62028f912a6729664c29256cc2d
                        • Instruction ID: bad570fa28325e93adddd12b916b46716e6a389ec5f23afe16ae9b92bcf82e9f
                        • Opcode Fuzzy Hash: f22bf4c9f0e44ca2ad125f09ceb0220ffa06f62028f912a6729664c29256cc2d
                        • Instruction Fuzzy Hash: 3D115E3568970EBBE7015710DDC2DFE6BDCDF15355B5040BAF600A7182D7F19E885268
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00BED3AD
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00BED3BF
                        • FreeLibrary.KERNEL32(00000000), ref: 00BED3E5
                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00BED3FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Library$AddressDirectoryFreeLoadProcSystem
                        • String ID: GetSystemWow64DirectoryW$X64$kernel32.dll
                        • API String ID: 582185067-2904798639
                        • Opcode ID: 135f090891cbe544519dcb9196b28e9cd07c6162dc32cea2e03b5f47be10dfe1
                        • Instruction ID: 28e8c76da7a23200bb17a0e5693ea245a9b2748160ccee31302619a8ea4062ce
                        • Opcode Fuzzy Hash: 135f090891cbe544519dcb9196b28e9cd07c6162dc32cea2e03b5f47be10dfe1
                        • Instruction Fuzzy Hash: 2AF027319066659BC3319711CCD9BAD73B4AF00B01F8480D1F602F6040DBB0CD448AA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$LocalTime
                        • String ID:
                        • API String ID: 952045576-0
                        • Opcode ID: cb7468467b3c35cc5ccee23b256bc2c2608663ec61a05c54da93faa7e60201ac
                        • Instruction ID: 362a83d023ea8ac42cd91a2ff3e991045e16dd2c73dcf460a43768490c316d3a
                        • Opcode Fuzzy Hash: cb7468467b3c35cc5ccee23b256bc2c2608663ec61a05c54da93faa7e60201ac
                        • Instruction Fuzzy Hash: 8841C665C1011877DB11EBF4CC8A9EFB7E8AF45310F5084A6E614E3122FB78D649C3A5
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00BE682C,00000004,00000000,00000000), ref: 00BAF953
                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00BE682C,00000004,00000000,00000000), ref: 00BEF3D1
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00BE682C,00000004,00000000,00000000), ref: 00BEF454
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: 3f84ed624b434b952ed85a2ce5b0013686ea72dcee736b405bf5757d809d5c1f
                        • Instruction ID: 81d5501a7d940791206112b1c3e712f6e0ee3618830982a87fc61f513fc15110
                        • Opcode Fuzzy Hash: 3f84ed624b434b952ed85a2ce5b0013686ea72dcee736b405bf5757d809d5c1f
                        • Instruction Fuzzy Hash: 7841093160C682BAC7798BAA88C87BF7BE2EF57311F1844BDE04752A60C771E881C751
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00C22D1B
                        • GetDC.USER32(00000000), ref: 00C22D23
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C22D2E
                        • ReleaseDC.USER32(00000000,00000000), ref: 00C22D3A
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00C22D76
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00C22D87
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00C25A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00C22DC2
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00C22DE1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: 97e0589051d226b4dcf2f45dba77375200521d398bfeced641ee27f20b5b237a
                        • Instruction ID: 69107b4df09cbdb4df01ae39226f3866c284c01d6a9fba1c174e1c237e289a74
                        • Opcode Fuzzy Hash: 97e0589051d226b4dcf2f45dba77375200521d398bfeced641ee27f20b5b237a
                        • Instruction Fuzzy Hash: 19319872211224BFEB218F50DC8AFEF3BA9EF09711F044065FE089A691C6759C51CBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: a91bee3187691954f064cef97df32b82703288373873bb00501c3fbf358efe04
                        • Instruction ID: 09a03ddda14a7814ad6419c0b42b467773f9f4b482443481a2157148547f4177
                        • Opcode Fuzzy Hash: a91bee3187691954f064cef97df32b82703288373873bb00501c3fbf358efe04
                        • Instruction Fuzzy Hash: DC21C561644A1D77D6346A249D92FFA23DCEF20384F8400B4FF15DBA81F760ED1982A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: NULL Pointer assignment$Not an Object type
                        • API String ID: 0-572801152
                        • Opcode ID: abc5b474909a980107fc8de186ecca83d6c4d704bbfb25a0c239f4285d599f42
                        • Instruction ID: f338cce49b65cba6a7dfcfa18d376d64cca2f56728909a0b05cc4887e7044731
                        • Opcode Fuzzy Hash: abc5b474909a980107fc8de186ecca83d6c4d704bbfb25a0c239f4285d599f42
                        • Instruction Fuzzy Hash: 14D1B475A0060AEFDF10CF98C880BEEB7B5BF89344F148069E925AB291D770DE85DB50
                        APIs
                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00BD17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00BD15CE
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00BD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00BD1651
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00BD17FB,?,00BD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00BD16E4
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00BD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00BD16FB
                          • Part of subcall function 00BC3820: RtlAllocateHeap.NTDLL(00000000,?,00C61444,?,00BAFDF5,?,?,00B9A976,00000010,00C61440,00B913FC,?,00B913C6,?,00B91129), ref: 00BC3852
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00BD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00BD1777
                        • __freea.LIBCMT ref: 00BD17A2
                        • __freea.LIBCMT ref: 00BD17AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                        • String ID:
                        • API String ID: 2829977744-0
                        • Opcode ID: 94acc2d7c54be0f93cd17088f5b43f99250dfc5127ebe9f71dce4fe88eadfe7d
                        • Instruction ID: 3b488c6dca4f4a94f8cd488146499194aa6a234ca36f2f6c48eaec7b37ffb1c5
                        • Opcode Fuzzy Hash: 94acc2d7c54be0f93cd17088f5b43f99250dfc5127ebe9f71dce4fe88eadfe7d
                        • Instruction Fuzzy Hash: DC91B371E00216BADB208E68D881AEEFBF5EF59714F184A9AE805E7351F739DD40C760
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$ClearInit
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2610073882-625585964
                        • Opcode ID: e3851d83c60f44b83abf7191a0c108eed77ca50301e3b9adf7b2ace3596d58e7
                        • Instruction ID: 4022fa66962fd2d06c797abe4d9813345a5fd947a6c16574a883eb784fca6b84
                        • Opcode Fuzzy Hash: e3851d83c60f44b83abf7191a0c108eed77ca50301e3b9adf7b2ace3596d58e7
                        • Instruction Fuzzy Hash: 8F91A271A00215AFDF24CFA5C844FEEBBB8EF46714F108559F515AB280D7709985DFA0
                        APIs
                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00C0125C
                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00C01284
                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00C012A8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C012D8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C0135F
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C013C4
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C01430
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                        • String ID:
                        • API String ID: 2550207440-0
                        • Opcode ID: 66908f1782da16d653889c8e4aebde1ff330311d7a9fa7731ec2ecfbf0fb9e5c
                        • Instruction ID: 6881d29b594d2fe47b4fc046d6b16cf90e08594eace224b17490371d12fca434
                        • Opcode Fuzzy Hash: 66908f1782da16d653889c8e4aebde1ff330311d7a9fa7731ec2ecfbf0fb9e5c
                        • Instruction Fuzzy Hash: B191CE71A00219AFEB00DFA4C884BBEB7F5FF45724F294069E951EB2E1D774A941CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: dfa3c618c25b3bcf4eecc6337ee7026ea79145ed51025fb72e23439358b74d3f
                        • Instruction ID: a08f7290d3590082616abde7ac733ba9cd7e7a83639b3c1d921a4701ad7e5080
                        • Opcode Fuzzy Hash: dfa3c618c25b3bcf4eecc6337ee7026ea79145ed51025fb72e23439358b74d3f
                        • Instruction Fuzzy Hash: C7914471D44219EFCB14CFA9C885AEEBBF8FF4A320F148089E515B7251D734AA42DB60
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00C1396B
                        • CharUpperBuffW.USER32(?,?), ref: 00C13A7A
                        • _wcslen.LIBCMT ref: 00C13A8A
                        • VariantClear.OLEAUT32(?), ref: 00C13C1F
                          • Part of subcall function 00C00CDF: VariantInit.OLEAUT32(00000000), ref: 00C00D1F
                          • Part of subcall function 00C00CDF: VariantCopy.OLEAUT32(?,?), ref: 00C00D28
                          • Part of subcall function 00C00CDF: VariantClear.OLEAUT32(?), ref: 00C00D34
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4137639002-1221869570
                        • Opcode ID: 9dbbd6e2651b4fc4f9b24b0d484243b2939fd73a7f18d01f261990901b6bd60e
                        • Instruction ID: aeb212077f384805778174ab6e1848df173822ae85a2cb599ca018832493b632
                        • Opcode Fuzzy Hash: 9dbbd6e2651b4fc4f9b24b0d484243b2939fd73a7f18d01f261990901b6bd60e
                        • Instruction Fuzzy Hash: 57918E746083459FCB04DF64C4909AAB7E4FF89318F14896DF89997351DB30EE45DB82
                        APIs
                          • Part of subcall function 00BF000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?,?,00BF035E), ref: 00BF002B
                          • Part of subcall function 00BF000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?), ref: 00BF0046
                          • Part of subcall function 00BF000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?), ref: 00BF0054
                          • Part of subcall function 00BF000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?), ref: 00BF0064
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00C14C51
                        • _wcslen.LIBCMT ref: 00C14D59
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00C14DCF
                        • CoTaskMemFree.OLE32(?), ref: 00C14DDA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 614568839-2785691316
                        • Opcode ID: 41612fba3be0a14d159a5fabf8c0dcbe49ecaf26fab93d6a4e226d678cabada2
                        • Instruction ID: a9f339ca26310278a0d6c2a662fb1810ebcbca56a762c3a0f592832efd5bcf08
                        • Opcode Fuzzy Hash: 41612fba3be0a14d159a5fabf8c0dcbe49ecaf26fab93d6a4e226d678cabada2
                        • Instruction Fuzzy Hash: F5912A71D0021DEFDF14DFA4D891AEEB7B9BF09310F108169E915A7291DB309A85DFA0
                        APIs
                        • GetMenu.USER32(?), ref: 00C22183
                        • GetMenuItemCount.USER32(00000000), ref: 00C221B5
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00C221DD
                        • _wcslen.LIBCMT ref: 00C22213
                        • GetMenuItemID.USER32(?,?), ref: 00C2224D
                        • GetSubMenu.USER32(?,?), ref: 00C2225B
                          • Part of subcall function 00BF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BF3A57
                          • Part of subcall function 00BF3A3D: GetCurrentThreadId.KERNEL32 ref: 00BF3A5E
                          • Part of subcall function 00BF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00BF25B3), ref: 00BF3A65
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00C222E3
                          • Part of subcall function 00BFE97B: Sleep.KERNEL32 ref: 00BFE9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                        • String ID:
                        • API String ID: 4196846111-0
                        • Opcode ID: d00d4d9848d6e3785cd37be048cabf432ad2a43ff99fe3559f871a4cce6b58a9
                        • Instruction ID: ab3aeb6b89534e05eef7ebadfe13fa8b903c9e375212fde4279075e146622ffb
                        • Opcode Fuzzy Hash: d00d4d9848d6e3785cd37be048cabf432ad2a43ff99fe3559f871a4cce6b58a9
                        • Instruction Fuzzy Hash: 7271B235A00215EFCB10DFA5D881AAEB7F1EF48320F1184A9E826EB751D735EE418B90
                        APIs
                        • IsWindow.USER32(017F55A0), ref: 00C27F37
                        • IsWindowEnabled.USER32(017F55A0), ref: 00C27F43
                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00C2801E
                        • SendMessageW.USER32(017F55A0,000000B0,?,?), ref: 00C28051
                        • IsDlgButtonChecked.USER32(?,?), ref: 00C28089
                        • GetWindowLongW.USER32(017F55A0,000000EC), ref: 00C280AB
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00C280C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: 990bb1e51c8eff99a48e3fb08bf9009741a1fef783ac37db37476041fe92c352
                        • Instruction ID: a13ce990df17ed75d597d6ba105af579aa40c8de2636d4750dce1b512c69852b
                        • Opcode Fuzzy Hash: 990bb1e51c8eff99a48e3fb08bf9009741a1fef783ac37db37476041fe92c352
                        • Instruction Fuzzy Hash: 4571B03460D224AFEB30DF94E9C4FAE7BB5EF09300F140159F96593AA1CB31AA45DB20
                        APIs
                        • GetParent.USER32(?), ref: 00BFAEF9
                        • GetKeyboardState.USER32(?), ref: 00BFAF0E
                        • SetKeyboardState.USER32(?), ref: 00BFAF6F
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00BFAF9D
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00BFAFBC
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00BFAFFD
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00BFB020
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 2c1a6291f3f9f1981ae851a2f368923babb506f41861bb39b51c8694ca5f9f2d
                        • Instruction ID: f41b7f06abb17b4f6180c04aa6bf2c3f66252e40758d8030aa1e75495a216f38
                        • Opcode Fuzzy Hash: 2c1a6291f3f9f1981ae851a2f368923babb506f41861bb39b51c8694ca5f9f2d
                        • Instruction Fuzzy Hash: 7651B4E06147D93DFB364234CC45BBA7EE99B06304F0885C9E2D99A8C2C798A8CCD751
                        APIs
                        • GetParent.USER32(00000000), ref: 00BFAD19
                        • GetKeyboardState.USER32(?), ref: 00BFAD2E
                        • SetKeyboardState.USER32(?), ref: 00BFAD8F
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00BFADBB
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00BFADD8
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00BFAE17
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00BFAE38
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 7a638c63a224676e7ac167f52e69f67fe648db8449e2e4b59fe4101841a3f1b0
                        • Instruction ID: 4ba0b17b3fdadadb91cfe0a3b9c31a9ffd0313cff35889563e57abc673693f30
                        • Opcode Fuzzy Hash: 7a638c63a224676e7ac167f52e69f67fe648db8449e2e4b59fe4101841a3f1b0
                        • Instruction Fuzzy Hash: 0551D3E15047D93DFB3A8224CC85B7ABEE9AB46300F0884D8E2D9578C2C294EC8CD752
                        APIs
                        • GetConsoleCP.KERNEL32(00BD3CD6,?,?,?,?,?,?,?,?,00BC5BA3,?,?,00BD3CD6,?,?), ref: 00BC5470
                        • __fassign.LIBCMT ref: 00BC54EB
                        • __fassign.LIBCMT ref: 00BC5506
                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00BD3CD6,00000005,00000000,00000000), ref: 00BC552C
                        • WriteFile.KERNEL32(?,00BD3CD6,00000000,00BC5BA3,00000000,?,?,?,?,?,?,?,?,?,00BC5BA3,?), ref: 00BC554B
                        • WriteFile.KERNEL32(?,?,00000001,00BC5BA3,00000000,?,?,?,?,?,?,?,?,?,00BC5BA3,?), ref: 00BC5584
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: 4358f30a991ac3c346f084c258e32c1dfd51e08c7314a36bbade3732888772c5
                        • Instruction ID: 41fab33328469cb149b5552aaed6ff30d1b56c7d140b15be42aff347304f49b4
                        • Opcode Fuzzy Hash: 4358f30a991ac3c346f084c258e32c1dfd51e08c7314a36bbade3732888772c5
                        • Instruction Fuzzy Hash: 0351B571A006099FDB20CFA8D885FEEBBF5EF18300F14455EE555E7291D670AA81CB60
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00BB2D4B
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00BB2D53
                        • _ValidateLocalCookies.LIBCMT ref: 00BB2DE1
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00BB2E0C
                        • _ValidateLocalCookies.LIBCMT ref: 00BB2E61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: 3dc68b1c62fff48ed33d1c6ba48bbe7b425a4fe7b4ed42b0ef20de3ae9efd847
                        • Instruction ID: adbfe197067139e97f84f742061b23f7b99f05d7f31d671f90f12f124ed34c8e
                        • Opcode Fuzzy Hash: 3dc68b1c62fff48ed33d1c6ba48bbe7b425a4fe7b4ed42b0ef20de3ae9efd847
                        • Instruction Fuzzy Hash: EE419334A00209ABCF10DF68CC85AEEBBF5FF45324F1481A5E8156B392D7B1EA55CB91
                        APIs
                          • Part of subcall function 00C1304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C1307A
                          • Part of subcall function 00C1304E: _wcslen.LIBCMT ref: 00C1309B
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C11112
                        • WSAGetLastError.WSOCK32 ref: 00C11121
                        • WSAGetLastError.WSOCK32 ref: 00C111C9
                        • closesocket.WSOCK32(00000000), ref: 00C111F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 2675159561-0
                        • Opcode ID: 34e71193165c04f9636a74cd9e124e94b787e4ff2f65f84d8adc9f2aaebc5a0c
                        • Instruction ID: fe0f0f6c7bebd645e5c8497a2d436564b701d3fb5c700b76a5b4497ce032bc87
                        • Opcode Fuzzy Hash: 34e71193165c04f9636a74cd9e124e94b787e4ff2f65f84d8adc9f2aaebc5a0c
                        • Instruction Fuzzy Hash: 7341D631600204AFDB109F14C884BEDBBE9EF46324F288059FE199B291D774EE85DBE1
                        APIs
                          • Part of subcall function 00BFDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BFCF22,?), ref: 00BFDDFD
                          • Part of subcall function 00BFDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BFCF22,?), ref: 00BFDE16
                        • lstrcmpiW.KERNEL32(?,?), ref: 00BFCF45
                        • MoveFileW.KERNEL32(?,?), ref: 00BFCF7F
                        • _wcslen.LIBCMT ref: 00BFD005
                        • _wcslen.LIBCMT ref: 00BFD01B
                        • SHFileOperationW.SHELL32(?), ref: 00BFD061
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                        • String ID: \*.*
                        • API String ID: 3164238972-1173974218
                        • Opcode ID: aac9c87185f483bbccf3a2b1e13cbddcc64e32b3a886c5f1f0244f7c6b5699e5
                        • Instruction ID: 2d220250545192251878ee6edd536edd69abe22b35ede4926d4c29ab27a89e6d
                        • Opcode Fuzzy Hash: aac9c87185f483bbccf3a2b1e13cbddcc64e32b3a886c5f1f0244f7c6b5699e5
                        • Instruction Fuzzy Hash: EE41247194521D5FDF12EBA4CA81AFDB7F9EF08340F1000E6E605E7151EA34A68DCB50
                        APIs
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00C22E1C
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00C22E4F
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00C22E84
                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00C22EB6
                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00C22EE0
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00C22EF1
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00C22F0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: a98a00ba94b1538486a5dbf820e27ce0612489b2559688bd0a7a9502342aceca
                        • Instruction ID: f1118e5641dcce325a5a75291df76183e5021317bbed51a2e4dba01ed74376a8
                        • Opcode Fuzzy Hash: a98a00ba94b1538486a5dbf820e27ce0612489b2559688bd0a7a9502342aceca
                        • Instruction Fuzzy Hash: D1310730614160AFDB21CF59EC84F6937E1EB5A722F1A0164F9118F6B1CBB1AD41EF41
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BF7769
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BF778F
                        • SysAllocString.OLEAUT32(00000000), ref: 00BF7792
                        • SysAllocString.OLEAUT32(?), ref: 00BF77B0
                        • SysFreeString.OLEAUT32(?), ref: 00BF77B9
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00BF77DE
                        • SysAllocString.OLEAUT32(?), ref: 00BF77EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: bf14b676ef69dfe03d0105cf754f98a7d4f7e19647f18af0c9e79022d8e2d86e
                        • Instruction ID: c3922882b0ca5ce88b7d1b96933c99775a2ced329b8961344bd48b9441117721
                        • Opcode Fuzzy Hash: bf14b676ef69dfe03d0105cf754f98a7d4f7e19647f18af0c9e79022d8e2d86e
                        • Instruction Fuzzy Hash: 9D219176618219AFDB10AFA8CC88EFF73ECEB0936471080A5FA04DB150DA709C458BA0
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BF7842
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BF7868
                        • SysAllocString.OLEAUT32(00000000), ref: 00BF786B
                        • SysAllocString.OLEAUT32 ref: 00BF788C
                        • SysFreeString.OLEAUT32 ref: 00BF7895
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00BF78AF
                        • SysAllocString.OLEAUT32(?), ref: 00BF78BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 9b017b61623651cab082482134787a9ccaf9dbfc33d4dbd1dd8d2cc6bc14a42e
                        • Instruction ID: 58c91919384e973fe2bf8cff9d260b6b4512c1dd3cdae6c1157fd3c7838a197b
                        • Opcode Fuzzy Hash: 9b017b61623651cab082482134787a9ccaf9dbfc33d4dbd1dd8d2cc6bc14a42e
                        • Instruction Fuzzy Hash: A2216531608108AFDB10AFA9DCCDEBE77ECEB0976071081A5FA15CB1A1DA74DC45CB64
                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00C004F2
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C0052E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: 064882ea09933d741811e3ef71521292f1c4084cfaa7d9ddd556bc07f4d9cd06
                        • Instruction ID: bf3e6ad87fbd92a36479ad3ae5ff3254335337130461569c6582c78341eb7e86
                        • Opcode Fuzzy Hash: 064882ea09933d741811e3ef71521292f1c4084cfaa7d9ddd556bc07f4d9cd06
                        • Instruction Fuzzy Hash: A4218975600305ABDB208F29DC45B9E7BB4AF44724F314A29F8B1E72E0E7709A41CF24
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00C005C6
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C00601
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: 3cdd04386e2fdad167e18e7f1157dbe1e6f34608445506c717cafe2157527c12
                        • Instruction ID: 41a15f8a8f4f3ddf9d00e87a60eb565b2d2ec045bb2ed22ee3a49f058193bb32
                        • Opcode Fuzzy Hash: 3cdd04386e2fdad167e18e7f1157dbe1e6f34608445506c717cafe2157527c12
                        • Instruction Fuzzy Hash: 93219C35500305DBDB208F699C44B9E77A9AF85721F310A19FCB1E32E0DBB19A61CB20
                        APIs
                          • Part of subcall function 00B9600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00B9604C
                          • Part of subcall function 00B9600E: GetStockObject.GDI32(00000011), ref: 00B96060
                          • Part of subcall function 00B9600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B9606A
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00C24112
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00C2411F
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00C2412A
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00C24139
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00C24145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: 8af7d1786a8d3aa6fe6c945260deb022558baba4288ca64b1a0d1ba3833df837
                        • Instruction ID: 755df8cea8ec303fd693ce208237bb67282974b989ac53a50980b5fd87621127
                        • Opcode Fuzzy Hash: 8af7d1786a8d3aa6fe6c945260deb022558baba4288ca64b1a0d1ba3833df837
                        • Instruction Fuzzy Hash: 6411B6B11502297FEF218F64DC85EEB7F5DEF09798F014110FA18A2090C7729C61DBA4
                        APIs
                          • Part of subcall function 00BCD7A3: _free.LIBCMT ref: 00BCD7CC
                        • _free.LIBCMT ref: 00BCD82D
                          • Part of subcall function 00BC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000), ref: 00BC29DE
                          • Part of subcall function 00BC29C8: GetLastError.KERNEL32(00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000,00000000), ref: 00BC29F0
                        • _free.LIBCMT ref: 00BCD838
                        • _free.LIBCMT ref: 00BCD843
                        • _free.LIBCMT ref: 00BCD897
                        • _free.LIBCMT ref: 00BCD8A2
                        • _free.LIBCMT ref: 00BCD8AD
                        • _free.LIBCMT ref: 00BCD8B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction ID: ee21a4db04849bb884b43d00282d0704cdb3e9cd92275e43dac9d32a70570e54
                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction Fuzzy Hash: E6112E75640B04AAD621BFB0CC47FCB7BDCAF04700F40587EB29DA6992DA75B9058660
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00BFDA74
                        • LoadStringW.USER32(00000000), ref: 00BFDA7B
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00BFDA91
                        • LoadStringW.USER32(00000000), ref: 00BFDA98
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00BFDADC
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00BFDAB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 4072794657-3128320259
                        • Opcode ID: e3c37b718f3c327c836ad7cf4b7f09d9ee9e473bdfc34aec08adf9a7e9752026
                        • Instruction ID: b823ba0f75378217d343907cbd64bfbd5b24df155e43f8c9fa85a4a2d50f782a
                        • Opcode Fuzzy Hash: e3c37b718f3c327c836ad7cf4b7f09d9ee9e473bdfc34aec08adf9a7e9752026
                        • Instruction Fuzzy Hash: 2E0162F65002087FE7109BA49DC9FFF326CEB08701F4004A6B706E2041EA749E854F74
                        APIs
                        • InterlockedExchange.KERNEL32(017EE608,017EE608), ref: 00C0097B
                        • EnterCriticalSection.KERNEL32(017EE5E8,00000000), ref: 00C0098D
                        • TerminateThread.KERNEL32(00000007,000001F6), ref: 00C0099B
                        • WaitForSingleObject.KERNEL32(00000007,000003E8), ref: 00C009A9
                        • CloseHandle.KERNEL32(00000007), ref: 00C009B8
                        • InterlockedExchange.KERNEL32(017EE608,000001F6), ref: 00C009C8
                        • LeaveCriticalSection.KERNEL32(017EE5E8), ref: 00C009CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: a46f6440fdddd6191287ee63341d11ef9ba5ce9c9c00f9357ed8730354aaf81a
                        • Instruction ID: eaf20f2f5ea8a6fc0de0361839271467a05f6e87f0327043466275ef98f8e670
                        • Opcode Fuzzy Hash: a46f6440fdddd6191287ee63341d11ef9ba5ce9c9c00f9357ed8730354aaf81a
                        • Instruction Fuzzy Hash: FCF01D31452902EBD7615B94EEC9BDE7A25BF01702F501015F10150CA1CB749576CF90
                        APIs
                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00C11DC0
                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00C11DE1
                        • WSAGetLastError.WSOCK32 ref: 00C11DF2
                        • htons.WSOCK32(?,?,?,?,?), ref: 00C11EDB
                        • inet_ntoa.WSOCK32(?), ref: 00C11E8C
                          • Part of subcall function 00BF39E8: _strlen.LIBCMT ref: 00BF39F2
                          • Part of subcall function 00C13224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00C0EC0C), ref: 00C13240
                        • _strlen.LIBCMT ref: 00C11F35
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                        • String ID:
                        • API String ID: 3203458085-0
                        • Opcode ID: 9db565fa44b8f0dbb1ce1a8e0da3a8f7a980de13d6b5f2b280cd9cf9239d2364
                        • Instruction ID: fbd57037166f0d59859a6f86f84e2f2b44a3cccac8401af45466f4e3854af844
                        • Opcode Fuzzy Hash: 9db565fa44b8f0dbb1ce1a8e0da3a8f7a980de13d6b5f2b280cd9cf9239d2364
                        • Instruction Fuzzy Hash: B1B12931104340AFC724DF64C895F6A77E5AF86318F58859CF9664B2E2CB31EE86CB91
                        APIs
                        • GetClientRect.USER32(?,?), ref: 00B95D30
                        • GetWindowRect.USER32(?,?), ref: 00B95D71
                        • ScreenToClient.USER32(?,?), ref: 00B95D99
                        • GetClientRect.USER32(?,?), ref: 00B95ED7
                        • GetWindowRect.USER32(?,?), ref: 00B95EF8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Rect$Client$Window$Screen
                        • String ID:
                        • API String ID: 1296646539-0
                        • Opcode ID: 900bf379277dca205fa54074bbdb8a370b8b3010313ba279577d7981a555dc20
                        • Instruction ID: dce414ac288cb92e99739109736439724624a13c9c62bc562dbe66fc36cecb3b
                        • Opcode Fuzzy Hash: 900bf379277dca205fa54074bbdb8a370b8b3010313ba279577d7981a555dc20
                        • Instruction Fuzzy Hash: 02B16D35A00A4ADBDF24CFA9C4807EEB7F1FF48310F14846AE8A9D7250E734AA51DB50
                        APIs
                        • __allrem.LIBCMT ref: 00BC00BA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BC00D6
                        • __allrem.LIBCMT ref: 00BC00ED
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BC010B
                        • __allrem.LIBCMT ref: 00BC0122
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BC0140
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 1992179935-0
                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction ID: 5d51b83895bbd1a40ddc650a86e1b8ea11c823ef1893808d86209ed3800c8ebe
                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction Fuzzy Hash: FC81C671601706DBE724AF68CC82FBAB3E9EF41764F2445BEF551D6681E7B0D9008750
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00BB82D9,00BB82D9,?,?,?,00BC644F,00000001,00000001,8BE85006), ref: 00BC6258
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00BC644F,00000001,00000001,8BE85006,?,?,?), ref: 00BC62DE
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00BC63D8
                        • __freea.LIBCMT ref: 00BC63E5
                          • Part of subcall function 00BC3820: RtlAllocateHeap.NTDLL(00000000,?,00C61444,?,00BAFDF5,?,?,00B9A976,00000010,00C61440,00B913FC,?,00B913C6,?,00B91129), ref: 00BC3852
                        • __freea.LIBCMT ref: 00BC63EE
                        • __freea.LIBCMT ref: 00BC6413
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 927abd99e43436ad00ccdb55967fc0f587c4f166218af4fb6fd8b933379cd6df
                        • Instruction ID: 59ff2982ec3c3ee37bc1081259fc0653cf5ea3a26ea6655c1c903561935501f1
                        • Opcode Fuzzy Hash: 927abd99e43436ad00ccdb55967fc0f587c4f166218af4fb6fd8b933379cd6df
                        • Instruction Fuzzy Hash: 8651AF72A10256ABEB258F68CC81FAF77E9EF84750F1546ADFC05DA181EB34DC40C664
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00C1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C1B6AE,?,?), ref: 00C1C9B5
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1C9F1
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1CA68
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C1BCCA
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C1BD25
                        • RegCloseKey.ADVAPI32(00000000), ref: 00C1BD6A
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00C1BD99
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C1BDF3
                        • RegCloseKey.ADVAPI32(?), ref: 00C1BDFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                        • String ID:
                        • API String ID: 1120388591-0
                        • Opcode ID: 70ccdbf4ea83e6861a47c5672c711b711bd9bcc8347b9d3cbb521a69999c0a08
                        • Instruction ID: ba10ba7e1b8488c9148e9b7da0d27ec692efccf02029ce2d55e16dc6f7408a8a
                        • Opcode Fuzzy Hash: 70ccdbf4ea83e6861a47c5672c711b711bd9bcc8347b9d3cbb521a69999c0a08
                        • Instruction Fuzzy Hash: A6815D30218241AFD714DF24C895E6ABBE5FF85308F1485ACF4554B2A2DB31ED45DF92
                        APIs
                        • VariantInit.OLEAUT32(00000035), ref: 00BEF7B9
                        • SysAllocString.OLEAUT32(00000001), ref: 00BEF860
                        • VariantCopy.OLEAUT32(00BEFA64,00000000), ref: 00BEF889
                        • VariantClear.OLEAUT32(00BEFA64), ref: 00BEF8AD
                        • VariantCopy.OLEAUT32(00BEFA64,00000000), ref: 00BEF8B1
                        • VariantClear.OLEAUT32(?), ref: 00BEF8BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$ClearCopy$AllocInitString
                        • String ID:
                        • API String ID: 3859894641-0
                        • Opcode ID: 4011aafbf3690c840e436bcf37c9e32ed01b4ffce6e1615d9dfb151a0d2874b2
                        • Instruction ID: ca28fd79656d062224d2ab79ebbc4142f441b7c9c7a1e2e2c3dae9aeebf8b400
                        • Opcode Fuzzy Hash: 4011aafbf3690c840e436bcf37c9e32ed01b4ffce6e1615d9dfb151a0d2874b2
                        • Instruction Fuzzy Hash: D351B435510352EADF20AB66D8D5B39B3E8EF45310B2494F6E806DF292DB70CC40CB96
                        APIs
                          • Part of subcall function 00B97620: _wcslen.LIBCMT ref: 00B97625
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00C094E5
                        • _wcslen.LIBCMT ref: 00C09506
                        • _wcslen.LIBCMT ref: 00C0952D
                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00C09585
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$FileName$OpenSave
                        • String ID: X
                        • API String ID: 83654149-3081909835
                        • Opcode ID: ac48a8ab1e9a2f9c51f0f7d3fc579161a43f2185d4f8b15ea348c1f0978f27d2
                        • Instruction ID: 6cf4ec2571625900f173dd9e1f91293205dd9f6063d49262eccfaf3748ae83c8
                        • Opcode Fuzzy Hash: ac48a8ab1e9a2f9c51f0f7d3fc579161a43f2185d4f8b15ea348c1f0978f27d2
                        • Instruction Fuzzy Hash: 66E17D715083019FDB24DF25C881B6AB7E4FF85314F1489ADF8999B2A2DB31DE05CB92
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • BeginPaint.USER32(?,?,?), ref: 00BA9241
                        • GetWindowRect.USER32(?,?), ref: 00BA92A5
                        • ScreenToClient.USER32(?,?), ref: 00BA92C2
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00BA92D3
                        • EndPaint.USER32(?,?,?,?,?), ref: 00BA9321
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00BE71EA
                          • Part of subcall function 00BA9339: BeginPath.GDI32(00000000), ref: 00BA9357
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                        • String ID:
                        • API String ID: 3050599898-0
                        • Opcode ID: 82c67db3aa03dbecca526d3a3e3d543853680aa56b6266cdbc12fb3aef93266f
                        • Instruction ID: 7cef895a7425d662b0b68926518569bd9fe58623d8935ab654c2d7195fdcb16a
                        • Opcode Fuzzy Hash: 82c67db3aa03dbecca526d3a3e3d543853680aa56b6266cdbc12fb3aef93266f
                        • Instruction Fuzzy Hash: D041A070108300AFDB20DF25D8C5FAA7BF8EF46721F1802A9F954971A1CB719845EB62
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C0080C
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00C00847
                        • EnterCriticalSection.KERNEL32(?), ref: 00C00863
                        • LeaveCriticalSection.KERNEL32(?), ref: 00C008DC
                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00C008F3
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C00921
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                        • String ID:
                        • API String ID: 3368777196-0
                        • Opcode ID: 5bad6b028f38b0b521a483c79f5b0f51ed262defc6bc19a9d3c00219d3109909
                        • Instruction ID: e099e91953c5e838dd631f6643ed74f99c8f7eee1476bd42a7afd190c4e965bd
                        • Opcode Fuzzy Hash: 5bad6b028f38b0b521a483c79f5b0f51ed262defc6bc19a9d3c00219d3109909
                        • Instruction Fuzzy Hash: 87414A71900205EBDF14AF94DC85BAE77B9FF04310F1580A5ED00AA29BDB30EE65DBA4
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00BEF3AB,00000000,?,?,00000000,?,00BE682C,00000004,00000000,00000000), ref: 00C2824C
                        • EnableWindow.USER32(00000000,00000000), ref: 00C28272
                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00C282D1
                        • ShowWindow.USER32(00000000,00000004), ref: 00C282E5
                        • EnableWindow.USER32(00000000,00000001), ref: 00C2830B
                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00C2832F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: a8f60df052547d4da34e3d00242687ac385d3a7a3edd1049cee6c299be1baf32
                        • Instruction ID: d722211cd657fcb80eedbcc95a54c22f337281a0401dd91ae22e9dbec53ca3f5
                        • Opcode Fuzzy Hash: a8f60df052547d4da34e3d00242687ac385d3a7a3edd1049cee6c299be1baf32
                        • Instruction Fuzzy Hash: 6441C530602654EFDF21CF15E899BE87BE0FB0A715F1C4169E9184B672CB71A949CF50
                        APIs
                        • IsWindowVisible.USER32(?), ref: 00BF4C95
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00BF4CB2
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00BF4CEA
                        • _wcslen.LIBCMT ref: 00BF4D08
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00BF4D10
                        • _wcsstr.LIBVCRUNTIME ref: 00BF4D1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                        • String ID:
                        • API String ID: 72514467-0
                        • Opcode ID: d5373abbf5b3a3878ec58a50ab863c8e140616bf6aa32bf72c68fe25556c6645
                        • Instruction ID: 19cd65ad9bbcaa888b5a784bb0108c4be37a7db8beaa25fe5cb55aed6cf42cea
                        • Opcode Fuzzy Hash: d5373abbf5b3a3878ec58a50ab863c8e140616bf6aa32bf72c68fe25556c6645
                        • Instruction Fuzzy Hash: E021D7352042057BEB255B699C89F7F7BD8DF45750F1040B9F905CB191DB61DC0596A0
                        APIs
                          • Part of subcall function 00B93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B93A97,?,?,00B92E7F,?,?,?,00000000), ref: 00B93AC2
                        • _wcslen.LIBCMT ref: 00C0587B
                        • CoInitialize.OLE32(00000000), ref: 00C05995
                        • CoCreateInstance.OLE32(00C2FCF8,00000000,00000001,00C2FB68,?), ref: 00C059AE
                        • CoUninitialize.OLE32 ref: 00C059CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 3172280962-24824748
                        • Opcode ID: 03cedcdb9a0a72f3379bf0bfefb723ad561112abe36b602b312054bb9c6b4d66
                        • Instruction ID: 46b9d230d46bf2bf60252bff5aa2c1a9a6c1c61893e056e30df2bdad8c7b3ae8
                        • Opcode Fuzzy Hash: 03cedcdb9a0a72f3379bf0bfefb723ad561112abe36b602b312054bb9c6b4d66
                        • Instruction Fuzzy Hash: 44D165756086019FCB14DF14C480A2BBBE5EF89710F1588ADF8999B3A1DB31ED46CF92
                        APIs
                          • Part of subcall function 00BF0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BF0FCA
                          • Part of subcall function 00BF0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BF0FD6
                          • Part of subcall function 00BF0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BF0FE5
                          • Part of subcall function 00BF0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BF0FEC
                          • Part of subcall function 00BF0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BF1002
                        • GetLengthSid.ADVAPI32(?,00000000,00BF1335), ref: 00BF17AE
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00BF17BA
                        • HeapAlloc.KERNEL32(00000000), ref: 00BF17C1
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00BF17DA
                        • GetProcessHeap.KERNEL32(00000000,00000000,00BF1335), ref: 00BF17EE
                        • HeapFree.KERNEL32(00000000), ref: 00BF17F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: e8c9c6b86a6ca3fa8ff6a44caf83b982ed78fa4c1cbb3110d84ae7e85ee2fc1f
                        • Instruction ID: 85dee16ccf0dc1b96752017a76f06da7d87870b3be015ea319f11683f359b818
                        • Opcode Fuzzy Hash: e8c9c6b86a6ca3fa8ff6a44caf83b982ed78fa4c1cbb3110d84ae7e85ee2fc1f
                        • Instruction Fuzzy Hash: 8211ACB1910209EFDB20EFA8CC8ABBF7BE9EB41355F104898F54597210C735AD59CB60
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00BF14FF
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00BF1506
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00BF1515
                        • CloseHandle.KERNEL32(00000004), ref: 00BF1520
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00BF154F
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00BF1563
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 10540ef2914ecda91a79d7928356ecf07d140f2c2a4556e09fc93bd1faacb04a
                        • Instruction ID: c9385f4dcc80ff5e6c010dea30dfb361dfbc42d844b952c90370915def3e1683
                        • Opcode Fuzzy Hash: 10540ef2914ecda91a79d7928356ecf07d140f2c2a4556e09fc93bd1faacb04a
                        • Instruction Fuzzy Hash: 8B11597250020DEBDF21CF98DD89BEE7BA9EF48704F144854FA05A2160C375CE65DB60
                        APIs
                        • GetLastError.KERNEL32(?,?,00BB3379,00BB2FE5), ref: 00BB3390
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BB339E
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BB33B7
                        • SetLastError.KERNEL32(00000000,?,00BB3379,00BB2FE5), ref: 00BB3409
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 7c58b6e5d76f3be2036cad6afb3f750822eb5a7551bdd78a4c7aec6bc13e4c6c
                        • Instruction ID: 44337e336a49a9ef44909f32da2fd90a2ce27ddec4ef911003c79beec198b185
                        • Opcode Fuzzy Hash: 7c58b6e5d76f3be2036cad6afb3f750822eb5a7551bdd78a4c7aec6bc13e4c6c
                        • Instruction Fuzzy Hash: C701243220C311BFAA2427B4BCC6BFF2BD4EB45B7A72002A9F411912F0EFD14D429148
                        APIs
                        • GetLastError.KERNEL32(?,?,00BC5686,00BD3CD6,?,00000000,?,00BC5B6A,?,?,?,?,?,00BBE6D1,?,00C58A48), ref: 00BC2D78
                        • _free.LIBCMT ref: 00BC2DAB
                        • _free.LIBCMT ref: 00BC2DD3
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00BBE6D1,?,00C58A48,00000010,00B94F4A,?,?,00000000,00BD3CD6), ref: 00BC2DE0
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00BBE6D1,?,00C58A48,00000010,00B94F4A,?,?,00000000,00BD3CD6), ref: 00BC2DEC
                        • _abort.LIBCMT ref: 00BC2DF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: a775cfe556fd0b8ee8c15dc33d7c08c0b1dfec846998eec7d569d6003c528b92
                        • Instruction ID: d61267e94f845a159b69a2b699585041ae9572f5513d7b98f2768fc09cf5f129
                        • Opcode Fuzzy Hash: a775cfe556fd0b8ee8c15dc33d7c08c0b1dfec846998eec7d569d6003c528b92
                        • Instruction Fuzzy Hash: DBF0C835504B006BD6227734BC46F5F26D9EFD17A1F2445BCF825A22E2EF348C424160
                        APIs
                          • Part of subcall function 00BA9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BA9693
                          • Part of subcall function 00BA9639: SelectObject.GDI32(?,00000000), ref: 00BA96A2
                          • Part of subcall function 00BA9639: BeginPath.GDI32(?), ref: 00BA96B9
                          • Part of subcall function 00BA9639: SelectObject.GDI32(?,00000000), ref: 00BA96E2
                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00C28A4E
                        • LineTo.GDI32(?,00000003,00000000), ref: 00C28A62
                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00C28A70
                        • LineTo.GDI32(?,00000000,00000003), ref: 00C28A80
                        • EndPath.GDI32(?), ref: 00C28A90
                        • StrokePath.GDI32(?), ref: 00C28AA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: 8193864039fb3df7ffe6c4f7ce6d1532d517e0d31960ed9606d9d2db8deae954
                        • Instruction ID: 995df57ddb48ed7ce4de961b97953b1bbcbbc9087013b713e29635ca00d1e6cd
                        • Opcode Fuzzy Hash: 8193864039fb3df7ffe6c4f7ce6d1532d517e0d31960ed9606d9d2db8deae954
                        • Instruction Fuzzy Hash: 85110976000118FFEF229F94DC88FAE7F6CEB08350F048012FA199A5A1C771AE55DBA0
                        APIs
                        • GetDC.USER32(00000000), ref: 00BF5218
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00BF5229
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BF5230
                        • ReleaseDC.USER32(00000000,00000000), ref: 00BF5238
                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00BF524F
                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00BF5261
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: d37a3d483c084f76d03b89e583899b5869abce1e309fae0eb0feb555252e6953
                        • Instruction ID: 773745748f1801c18513408017cca4b39e07a0f4bf4062048595038db310bf77
                        • Opcode Fuzzy Hash: d37a3d483c084f76d03b89e583899b5869abce1e309fae0eb0feb555252e6953
                        • Instruction Fuzzy Hash: F5018F75E00708BBEB209BA69C89B5EBFB8EF48751F044165FB04A7681D6709801CBA0
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B91BF4
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B91BFC
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B91C07
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B91C12
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B91C1A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B91C22
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 6cf09841d197cb1d1fc95896cda4abdd21fd2f9df675327bad80e966ac43d492
                        • Instruction ID: 28dc1c9649149a529a8732fc01372f1aec07989258bb663523ff7b2d38084cac
                        • Opcode Fuzzy Hash: 6cf09841d197cb1d1fc95896cda4abdd21fd2f9df675327bad80e966ac43d492
                        • Instruction Fuzzy Hash: 9C0167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00BFEB30
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00BFEB46
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00BFEB55
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BFEB64
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BFEB6E
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BFEB75
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: a4a7fae5c1879b26b6b2d5749399e60b801c8c5e52e8f4df11d52dec3bad964f
                        • Instruction ID: dfed716b31fdd692133546ea5585f8c0d82d95ea0e7ee0559192c1a90deade60
                        • Opcode Fuzzy Hash: a4a7fae5c1879b26b6b2d5749399e60b801c8c5e52e8f4df11d52dec3bad964f
                        • Instruction Fuzzy Hash: 60F05E72250558BBE7315B629C8EFEF3E7CEFCAB11F000158F611E1491D7A05A02C6B5
                        APIs
                        • GetClientRect.USER32(?), ref: 00BE7452
                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00BE7469
                        • GetWindowDC.USER32(?), ref: 00BE7475
                        • GetPixel.GDI32(00000000,?,?), ref: 00BE7484
                        • ReleaseDC.USER32(?,00000000), ref: 00BE7496
                        • GetSysColor.USER32(00000005), ref: 00BE74B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                        • String ID:
                        • API String ID: 272304278-0
                        • Opcode ID: 399181c16d4233bf599dbf04a28483797f11624ac51bf3c766266d6108220591
                        • Instruction ID: c4805b69105149dfab02a91d1491eb6d9e0d1c61270704b3702ca713e4ce162f
                        • Opcode Fuzzy Hash: 399181c16d4233bf599dbf04a28483797f11624ac51bf3c766266d6108220591
                        • Instruction Fuzzy Hash: 3B018631410205EFEB319FA4DC88BAE7BB5FF04321F2400A0F926A26A0CF751E52AB50
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00BF187F
                        • UnloadUserProfile.USERENV(?,?), ref: 00BF188B
                        • CloseHandle.KERNEL32(?), ref: 00BF1894
                        • CloseHandle.KERNEL32(?), ref: 00BF189C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00BF18A5
                        • HeapFree.KERNEL32(00000000), ref: 00BF18AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 215ca75715a18138f10ace5cb9f4a5a701e295357da0b1e6a4154fcd4d683092
                        • Instruction ID: f30185df724a8abb556281d5a5921e0c74d77a3f6923c86d3c66038131366f14
                        • Opcode Fuzzy Hash: 215ca75715a18138f10ace5cb9f4a5a701e295357da0b1e6a4154fcd4d683092
                        • Instruction Fuzzy Hash: C7E0E536014501BBDB115FA1ED4DB4EBF39FF49B22B208620F22581874CB329432DF50
                        APIs
                          • Part of subcall function 00B97620: _wcslen.LIBCMT ref: 00B97625
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BFC6EE
                        • _wcslen.LIBCMT ref: 00BFC735
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BFC79C
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00BFC7CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ItemMenu$Info_wcslen$Default
                        • String ID: 0
                        • API String ID: 1227352736-4108050209
                        • Opcode ID: 735387c15adcbab37c1d56c896ccb5550789db2307b0a0bcbe4784b8cebbb02f
                        • Instruction ID: cd68173f7f2b7773d6baa7fb5c5c58513365d290a11e4f29ffb756bc781d9992
                        • Opcode Fuzzy Hash: 735387c15adcbab37c1d56c896ccb5550789db2307b0a0bcbe4784b8cebbb02f
                        • Instruction Fuzzy Hash: E851D17160830D9BD725AF28CA85B7B7BE4EF85310F0809A9FA95D3190DB70DD88CB52
                        APIs
                        • ShellExecuteExW.SHELL32(0000003C), ref: 00C1AEA3
                          • Part of subcall function 00B97620: _wcslen.LIBCMT ref: 00B97625
                        • GetProcessId.KERNEL32(00000000), ref: 00C1AF38
                        • CloseHandle.KERNEL32(00000000), ref: 00C1AF67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseExecuteHandleProcessShell_wcslen
                        • String ID: <$@
                        • API String ID: 146682121-1426351568
                        • Opcode ID: 4f0cc8a45ce825fc18252e7385854cac6b0ed9578e1f50706639c7a707afc434
                        • Instruction ID: 4cf50e851cb2458a07a82eea78ce704dfb1a96d9f5ed270653a1ded2915546a1
                        • Opcode Fuzzy Hash: 4f0cc8a45ce825fc18252e7385854cac6b0ed9578e1f50706639c7a707afc434
                        • Instruction Fuzzy Hash: 62714A71A00615DFCF14DF54C494A9EBBF0EF09314F0584A9E81AAB3A1CB74ED85CB91
                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00BF7206
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00BF723C
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00BF724D
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00BF72CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: f709ce333cde6dceff513b3ca79fa718eda60bedafcaf5f8c7b738bd2cfc20a1
                        • Instruction ID: 19f0f423d865d3c50a047b24561a98619f1c5f41d77770548acaf4745fa9ba10
                        • Opcode Fuzzy Hash: f709ce333cde6dceff513b3ca79fa718eda60bedafcaf5f8c7b738bd2cfc20a1
                        • Instruction Fuzzy Hash: 1E415E71644208AFDF15CF54C885BAA7BE9EF45310F1480EDBE059F24ADBB1D949CBA0
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C23E35
                        • IsMenu.USER32(?), ref: 00C23E4A
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C23E92
                        • DrawMenuBar.USER32 ref: 00C23EA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert
                        • String ID: 0
                        • API String ID: 3076010158-4108050209
                        • Opcode ID: 19762c7c9396255efb15b3846248e92ce522da64dede7d8e839256aaacb768fc
                        • Instruction ID: 703c5d4e3618da7f79a65c81e998263a49b6b48b88a325d3b8a6f2522708a334
                        • Opcode Fuzzy Hash: 19762c7c9396255efb15b3846248e92ce522da64dede7d8e839256aaacb768fc
                        • Instruction Fuzzy Hash: 3A418875A10259AFDB20DF50E884AAEBBB9FF49350F054029E911A7650C334EE09CFA0
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00BF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00BF3CCA
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00BF1E66
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00BF1E79
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00BF1EA9
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 2081771294-1403004172
                        • Opcode ID: 53ab373985fd7eb01a486c1542a455dac445a20610de6e40ff230aac063e039f
                        • Instruction ID: 23b1e8b5dfc63050abeb8457ea8ac987c636bd8aa909826db4fa8e4423c6feb6
                        • Opcode Fuzzy Hash: 53ab373985fd7eb01a486c1542a455dac445a20610de6e40ff230aac063e039f
                        • Instruction Fuzzy Hash: 7F210271A00108FADB14ABA9DC96DFFB7F8DF46350B1049A9F925A71E1DB34490E8620
                        APIs
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00C22F8D
                        • LoadLibraryW.KERNEL32(?), ref: 00C22F94
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00C22FA9
                        • DestroyWindow.USER32(?), ref: 00C22FB1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyLibraryLoadWindow
                        • String ID: SysAnimate32
                        • API String ID: 3529120543-1011021900
                        • Opcode ID: 562357211f0df5fe8258aa84aafb7d459fb71e1e302bcd2c364db6ffe47de686
                        • Instruction ID: 72c33bae49533ad4aa91249fa5acc5374609e3355029fddf6327a64cf2a7d2cf
                        • Opcode Fuzzy Hash: 562357211f0df5fe8258aa84aafb7d459fb71e1e302bcd2c364db6ffe47de686
                        • Instruction Fuzzy Hash: 2521AE71200225BBEB208FA4ED80FBB37B9EB59364F100228F960D2990D771DC919760
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00BB4D1E,00BC28E9,?,00BB4CBE,00BC28E9,00C588B8,0000000C,00BB4E15,00BC28E9,00000002), ref: 00BB4D8D
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BB4DA0
                        • FreeLibrary.KERNEL32(00000000,?,?,?,00BB4D1E,00BC28E9,?,00BB4CBE,00BC28E9,00C588B8,0000000C,00BB4E15,00BC28E9,00000002,00000000), ref: 00BB4DC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 095c23f637f67b7161effc6f8b426570f658db54afc54d834b2bfae54108b28b
                        • Instruction ID: 813cb9c81a0e9a7e0ae3d8f03cd90024db8a34dd1dd4ec57bffbd30ec8ae0550
                        • Opcode Fuzzy Hash: 095c23f637f67b7161effc6f8b426570f658db54afc54d834b2bfae54108b28b
                        • Instruction Fuzzy Hash: 5FF06235A50308BBDB219F90DC89BEEBFF5EF44752F0000A4F805A26A1CBB05D51CB90
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B94EDD,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94E9C
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B94EAE
                        • FreeLibrary.KERNEL32(00000000,?,?,00B94EDD,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94EC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-3689287502
                        • Opcode ID: 70ce6a1f1eb83949d6d04f815638156138d71d13ea7c5884532f29c0f47ba2b5
                        • Instruction ID: f671a451980ef58848b903b29a7b730cbcc9a7571fa16567e815428e4043c5a4
                        • Opcode Fuzzy Hash: 70ce6a1f1eb83949d6d04f815638156138d71d13ea7c5884532f29c0f47ba2b5
                        • Instruction Fuzzy Hash: 3BE0CD36A11D325BD63117257C59F6F6594EF81F637050175FC01D2500DB60CD0380E0
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00BD3CDE,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94E62
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B94E74
                        • FreeLibrary.KERNEL32(00000000,?,?,00BD3CDE,?,00C61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B94E87
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-1355242751
                        • Opcode ID: 6faf1a1fdc5a3f58effc16e5b60adcbe8750cb58fc54da0a3ad33887cac7b1ea
                        • Instruction ID: b9826a68d28b59c8b2d319595b60e7cc30b4f9318609b219767e727ac94e1dac
                        • Opcode Fuzzy Hash: 6faf1a1fdc5a3f58effc16e5b60adcbe8750cb58fc54da0a3ad33887cac7b1ea
                        • Instruction Fuzzy Hash: 82D0C236922E31574A321B247C09F8F2A58EF85B513050170BC00A2210CF20CD13C1D0
                        APIs
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C02C05
                        • DeleteFileW.KERNEL32(?), ref: 00C02C87
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C02C9D
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C02CAE
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C02CC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: File$Delete$Copy
                        • String ID:
                        • API String ID: 3226157194-0
                        • Opcode ID: 00634e65285cd36d9cf3fc799c4367a0e53cd831452215dbfe9f63410a047171
                        • Instruction ID: 79b736b5f7a6f3b6814cd89a5ba9fcc317f3c01c01bad92f2e81b93930e5c763
                        • Opcode Fuzzy Hash: 00634e65285cd36d9cf3fc799c4367a0e53cd831452215dbfe9f63410a047171
                        • Instruction Fuzzy Hash: DEB12F71E00119ABDF21DBA4CC89EEEB7BDEF49350F1040A6F909E6191EB709A44DF61
                        APIs
                        • GetCurrentProcessId.KERNEL32 ref: 00C1A427
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00C1A435
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00C1A468
                        • CloseHandle.KERNEL32(?), ref: 00C1A63D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$CloseCountersCurrentHandleOpen
                        • String ID:
                        • API String ID: 3488606520-0
                        • Opcode ID: 1638667bf0f42d3ceafc819d84fff381af13d06151017661848a7e8488cd92c0
                        • Instruction ID: d8600ab9f25b81dc5f19deb11fb99cae21e429514ee07b2f9d5ad69480b4612b
                        • Opcode Fuzzy Hash: 1638667bf0f42d3ceafc819d84fff381af13d06151017661848a7e8488cd92c0
                        • Instruction Fuzzy Hash: 26A1A1716043009FD720DF24D886F2ABBE5AF88714F14885DF56A9B392DBB0ED45CB92
                        APIs
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00C33700), ref: 00BCBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00C6121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00BCBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00C61270,000000FF,?,0000003F,00000000,?), ref: 00BCBC36
                        • _free.LIBCMT ref: 00BCBB7F
                          • Part of subcall function 00BC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000), ref: 00BC29DE
                          • Part of subcall function 00BC29C8: GetLastError.KERNEL32(00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000,00000000), ref: 00BC29F0
                        • _free.LIBCMT ref: 00BCBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 1286116820-0
                        • Opcode ID: d806bdeda2cb8d46ccf0dec27a403304c6f1b62da24355ff3b4dcc3381f81254
                        • Instruction ID: ffde944e15b7e89ff741410eeda699cfede2da8afa4dbbbb860283ab1f223c1d
                        • Opcode Fuzzy Hash: d806bdeda2cb8d46ccf0dec27a403304c6f1b62da24355ff3b4dcc3381f81254
                        • Instruction Fuzzy Hash: 9A51B671900209AFCB24EF659C82FAEB7F8EB41361F1442EEE555E7191EB705E418B50
                        APIs
                          • Part of subcall function 00BFDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BFCF22,?), ref: 00BFDDFD
                          • Part of subcall function 00BFDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BFCF22,?), ref: 00BFDE16
                          • Part of subcall function 00BFE199: GetFileAttributesW.KERNEL32(?,00BFCF95), ref: 00BFE19A
                        • lstrcmpiW.KERNEL32(?,?), ref: 00BFE473
                        • MoveFileW.KERNEL32(?,?), ref: 00BFE4AC
                        • _wcslen.LIBCMT ref: 00BFE5EB
                        • _wcslen.LIBCMT ref: 00BFE603
                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00BFE650
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                        • String ID:
                        • API String ID: 3183298772-0
                        • Opcode ID: edffeb8b66bdf0b31d5738f643cab3df0b7b782992589c924c65061dce1975c3
                        • Instruction ID: e43cc86932e6f35a9851561b51c66268679d44d7995c136bcf27b5959c3324ce
                        • Opcode Fuzzy Hash: edffeb8b66bdf0b31d5738f643cab3df0b7b782992589c924c65061dce1975c3
                        • Instruction Fuzzy Hash: D35131B24083499BC764EB94DC819FFB3ECAF84340F00496EF69993151EE74E68C8766
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00C1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C1B6AE,?,?), ref: 00C1C9B5
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1C9F1
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1CA68
                          • Part of subcall function 00C1C998: _wcslen.LIBCMT ref: 00C1CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C1BAA5
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C1BB00
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00C1BB63
                        • RegCloseKey.ADVAPI32(?,?), ref: 00C1BBA6
                        • RegCloseKey.ADVAPI32(00000000), ref: 00C1BBB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                        • String ID:
                        • API String ID: 826366716-0
                        • Opcode ID: 732310592967781ad66f0fc33a220c2340b55b73611b181f54beb95c36d8a7c5
                        • Instruction ID: 256a23bee890582c35861b0e9dbbc63c427f15cde037144de9b8fc415f9fcb7d
                        • Opcode Fuzzy Hash: 732310592967781ad66f0fc33a220c2340b55b73611b181f54beb95c36d8a7c5
                        • Instruction Fuzzy Hash: 87619131218241AFD714DF24C490E6ABBE5FF85308F1485ACF4994B2A2DB31ED85DF92
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00BF8BCD
                        • VariantClear.OLEAUT32 ref: 00BF8C3E
                        • VariantClear.OLEAUT32 ref: 00BF8C9D
                        • VariantClear.OLEAUT32(?), ref: 00BF8D10
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00BF8D3B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType
                        • String ID:
                        • API String ID: 4136290138-0
                        • Opcode ID: 46bfa9d6b67ee13885cdb3ef799e6af85338e1045f8b327aa472f108aaf26504
                        • Instruction ID: 9fc64197d37410ed28de17941d628cde535efe9a76c375d234817db64f3602eb
                        • Opcode Fuzzy Hash: 46bfa9d6b67ee13885cdb3ef799e6af85338e1045f8b327aa472f108aaf26504
                        • Instruction Fuzzy Hash: 38517BB5A00619EFCB10CF68C884AAAB7F9FF89310B158569F909DB354E730E911CF90
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C08BAE
                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00C08BDA
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C08C32
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C08C57
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C08C5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String
                        • String ID:
                        • API String ID: 2832842796-0
                        • Opcode ID: 320732ca978e6d45c86b5543f03d09944653b9ad76b9c641b3e83ff14a81dbee
                        • Instruction ID: 55109982c7a77c32b959512d0c111949bc7bd9a2526d3989bd6b33e8a27ed334
                        • Opcode Fuzzy Hash: 320732ca978e6d45c86b5543f03d09944653b9ad76b9c641b3e83ff14a81dbee
                        • Instruction Fuzzy Hash: 94512635A10215AFDF11DF64C880A6DBBF5EF49314F09C0A8E849AB3A2DB31ED55CB90
                        APIs
                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00C18F40
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00C18FD0
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00C18FEC
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00C19032
                        • FreeLibrary.KERNEL32(00000000), ref: 00C19052
                          • Part of subcall function 00BAF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00C01043,?,761DE610), ref: 00BAF6E6
                          • Part of subcall function 00BAF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00BEFA64,00000000,00000000,?,?,00C01043,?,761DE610,?,00BEFA64), ref: 00BAF70D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                        • String ID:
                        • API String ID: 666041331-0
                        • Opcode ID: fe8f65ec76695511bfbc5cd4dbc8403c21457082f1fa1299dc892ca6d941ae6e
                        • Instruction ID: e1c79bdb085df8f88bea087fbdd10e4b5cc9f2f41515386b7f4038fd92be4e8b
                        • Opcode Fuzzy Hash: fe8f65ec76695511bfbc5cd4dbc8403c21457082f1fa1299dc892ca6d941ae6e
                        • Instruction Fuzzy Hash: 14512935A04205DFCB15DF58C4949EDBBF1FF4A314B0580A8E81A9B762DB31EE86DB90
                        APIs
                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00C26C33
                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00C26C4A
                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00C26C73
                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00C0AB79,00000000,00000000), ref: 00C26C98
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00C26CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Long$MessageSendShow
                        • String ID:
                        • API String ID: 3688381893-0
                        • Opcode ID: d878042c2efbc3167b06d949bf365392486638505bf07058d328803aaf279580
                        • Instruction ID: ed5181d924245bf95a176ea68744f5f47f3ee6bb548bafdd2809c0bd6c82fb64
                        • Opcode Fuzzy Hash: d878042c2efbc3167b06d949bf365392486638505bf07058d328803aaf279580
                        • Instruction Fuzzy Hash: 51410835604124AFD724EF39DC94FA97BA5EB09360F140268FCA5A76E0C771EE41DA60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 6c7ef695d6c2f0c3f92d4cc3c190d2c490f66b64cfeeba05fcdee68795145836
                        • Instruction ID: 305ecf505da662c70c12c4b030fe1488e6b13dcafc5331f36f92c8f15700353d
                        • Opcode Fuzzy Hash: 6c7ef695d6c2f0c3f92d4cc3c190d2c490f66b64cfeeba05fcdee68795145836
                        • Instruction Fuzzy Hash: 7541AF36A002009FCB24DF78C881F6DB7E5EF89314F1545ADE615EB392DA31AD01CB90
                        APIs
                        • GetCursorPos.USER32(?), ref: 00BA9141
                        • ScreenToClient.USER32(00000000,?), ref: 00BA915E
                        • GetAsyncKeyState.USER32(00000001), ref: 00BA9183
                        • GetAsyncKeyState.USER32(00000002), ref: 00BA919D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: 5f090fa999bc165d1e6da114e3014522206d1480a8f466b6098e0e8120679040
                        • Instruction ID: 292d4d1718090b2f8d32c895127610ff71f8438f03413397e02c547bdb41da2a
                        • Opcode Fuzzy Hash: 5f090fa999bc165d1e6da114e3014522206d1480a8f466b6098e0e8120679040
                        • Instruction Fuzzy Hash: 84414F31A0865AFBDF159F65C884BEEB7B4FF06320F208255E425B7290CB346D54EB91
                        APIs
                        • GetInputState.USER32 ref: 00C038CB
                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00C03922
                        • TranslateMessage.USER32(?), ref: 00C0394B
                        • DispatchMessageW.USER32(?), ref: 00C03955
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C03966
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                        • String ID:
                        • API String ID: 2256411358-0
                        • Opcode ID: 1c9cdba4d25ce4fa82e0359aa6dc6f89e6465b39759158238632fa18bee3cc4b
                        • Instruction ID: 445c3ebb8a752ccf18ef92c7dfe9dd993bf782d7488b064d4dbcd05a0b282093
                        • Opcode Fuzzy Hash: 1c9cdba4d25ce4fa82e0359aa6dc6f89e6465b39759158238632fa18bee3cc4b
                        • Instruction Fuzzy Hash: D031C6709143C19EEB35CB369848BBA37ACAB05305F0C456AE872861E0E3F49785DB51
                        APIs
                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00C0C21E,00000000), ref: 00C0CF38
                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00C0CF6F
                        • GetLastError.KERNEL32(?,00000000,?,?,?,00C0C21E,00000000), ref: 00C0CFB4
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00C0C21E,00000000), ref: 00C0CFC8
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00C0C21E,00000000), ref: 00C0CFF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                        • String ID:
                        • API String ID: 3191363074-0
                        • Opcode ID: 3afbb2fd7be8bcf45a99af3f9a247b201457915132b7f6025be72c2ef7870fb2
                        • Instruction ID: 7ce07e23b22572f24e596680a47fa2e70e6205337b6a9d1f1e0b85cf62f010b0
                        • Opcode Fuzzy Hash: 3afbb2fd7be8bcf45a99af3f9a247b201457915132b7f6025be72c2ef7870fb2
                        • Instruction Fuzzy Hash: F9316971604206EFDB20DFE5C8C4AAEBBF9EB14350B10456EF516D2180DB30AE41DB61
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00BF1915
                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 00BF19C1
                        • Sleep.KERNEL32(00000000,?,?,?), ref: 00BF19C9
                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 00BF19DA
                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00BF19E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: bff4957344e65f9b259a29d3433b0c0e504787805583dafc7fd07f9470b40836
                        • Instruction ID: 8eedab239234b965c825c1e2d08cbceecc2712041d3ed3b2eebf2e695d2e5c28
                        • Opcode Fuzzy Hash: bff4957344e65f9b259a29d3433b0c0e504787805583dafc7fd07f9470b40836
                        • Instruction Fuzzy Hash: 6231C47190021DEFCB14CFACC999BEE3BB5EB04314F008A55FA21A72D0C3B09959CB90
                        APIs
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00C25745
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00C2579D
                        • _wcslen.LIBCMT ref: 00C257AF
                        • _wcslen.LIBCMT ref: 00C257BA
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C25816
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen
                        • String ID:
                        • API String ID: 763830540-0
                        • Opcode ID: 775104417ca5d9eb6bff7f94d4cdc50232ee30155ec141f6e69662023aaa9d57
                        • Instruction ID: d70d7bfa66d3d11df0378b7b7c85056d3bee7818781aa3fe2c35cef6afb1004e
                        • Opcode Fuzzy Hash: 775104417ca5d9eb6bff7f94d4cdc50232ee30155ec141f6e69662023aaa9d57
                        • Instruction Fuzzy Hash: 14218F759146289ADB20DFA5EC84AEEB7B8FF04720F108256F929EA580D7708A85CF50
                        APIs
                        • IsWindow.USER32(00000000), ref: 00C10951
                        • GetForegroundWindow.USER32 ref: 00C10968
                        • GetDC.USER32(00000000), ref: 00C109A4
                        • GetPixel.GDI32(00000000,?,00000003), ref: 00C109B0
                        • ReleaseDC.USER32(00000000,00000003), ref: 00C109E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$ForegroundPixelRelease
                        • String ID:
                        • API String ID: 4156661090-0
                        • Opcode ID: 8a480b3e139533d4f76bade64c848a68017d6ff4df440460fcf8410abc93bf77
                        • Instruction ID: d85246bdced944c1b867d0fe0204dae2cea4d035cd1abba9364df2390e69d9a0
                        • Opcode Fuzzy Hash: 8a480b3e139533d4f76bade64c848a68017d6ff4df440460fcf8410abc93bf77
                        • Instruction Fuzzy Hash: 5321A135600204AFD714EF65D898BAEBBF5EF44700F14806CF85A977A2CB70AD45DB90
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 00BCCDC6
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BCCDE9
                          • Part of subcall function 00BC3820: RtlAllocateHeap.NTDLL(00000000,?,00C61444,?,00BAFDF5,?,?,00B9A976,00000010,00C61440,00B913FC,?,00B913C6,?,00B91129), ref: 00BC3852
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00BCCE0F
                        • _free.LIBCMT ref: 00BCCE22
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BCCE31
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: 1e817f59ec104888371ffbcad656157919e08da7aef05852f25431abf6812b14
                        • Instruction ID: 57e05d201a7a20a759b70808708f24128f979b6fd6b39e5e322401080b2456bd
                        • Opcode Fuzzy Hash: 1e817f59ec104888371ffbcad656157919e08da7aef05852f25431abf6812b14
                        • Instruction Fuzzy Hash: 850184726016167F23215ABA6CC9F7F6DEDDED7BA231501ADF909C7201EA719D0281F0
                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BA9693
                        • SelectObject.GDI32(?,00000000), ref: 00BA96A2
                        • BeginPath.GDI32(?), ref: 00BA96B9
                        • SelectObject.GDI32(?,00000000), ref: 00BA96E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: f37d2d05b9e328933c0a1c0507b6185ec3cfb3bc15f99a276deb8fc48e8b2dae
                        • Instruction ID: 5bd40df4dd3c5ca99af92eca2f3bf0b00bd29f79775e8c3ee6429a539d49002b
                        • Opcode Fuzzy Hash: f37d2d05b9e328933c0a1c0507b6185ec3cfb3bc15f99a276deb8fc48e8b2dae
                        • Instruction Fuzzy Hash: A5217F30816305EBEB219F6AEC557AD3BB8FF02316F1C0256F810A61A0D3B05892EF94
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: fc710c9fec89dddff4653329837e00fba7e6f69a896f13774b47b95a370ac459
                        • Instruction ID: c7aecf678146f9f13690074a919f86924df942864df6592813ff37f02daf4355
                        • Opcode Fuzzy Hash: fc710c9fec89dddff4653329837e00fba7e6f69a896f13774b47b95a370ac459
                        • Instruction Fuzzy Hash: 3E01D272345A1DBB9228A515AD82EFB63DCDB20394B4000B4FF059B641F6A0ED2583A4
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00BBF2DE,00BC3863,00C61444,?,00BAFDF5,?,?,00B9A976,00000010,00C61440,00B913FC,?,00B913C6), ref: 00BC2DFD
                        • _free.LIBCMT ref: 00BC2E32
                        • _free.LIBCMT ref: 00BC2E59
                        • SetLastError.KERNEL32(00000000,00B91129), ref: 00BC2E66
                        • SetLastError.KERNEL32(00000000,00B91129), ref: 00BC2E6F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: 1ced54c0e2e717f16b534d59b9b4dfea93af40055a75d1247dafbe8fa5961c98
                        • Instruction ID: 9edf89e6ce8e8a44fe9b8328c675a9b0c292f93df2df7827d06a1b17e9e05109
                        • Opcode Fuzzy Hash: 1ced54c0e2e717f16b534d59b9b4dfea93af40055a75d1247dafbe8fa5961c98
                        • Instruction Fuzzy Hash: 3A012836205B026BCA2267746CC5F6F26EDEBC17B1B2044ACF421B22E2EF708C014020
                        APIs
                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?,?,00BF035E), ref: 00BF002B
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?), ref: 00BF0046
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?), ref: 00BF0054
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?), ref: 00BF0064
                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BEFF41,80070057,?,?), ref: 00BF0070
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: 84be21546bc35d724039c0642c164b734688b29a7cbd9f4b814b9d76f8bff2d7
                        • Instruction ID: 4eb274e774b612163fa21fad3dd18170ca208d8b2b46855da6b3000b42c57369
                        • Opcode Fuzzy Hash: 84be21546bc35d724039c0642c164b734688b29a7cbd9f4b814b9d76f8bff2d7
                        • Instruction Fuzzy Hash: 98017C7262020CBBDB215F68DC84BAE7BEDEB44751F148164FA05D3221DB75DD458BA0
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00BFE997
                        • QueryPerformanceFrequency.KERNEL32(?), ref: 00BFE9A5
                        • Sleep.KERNEL32(00000000), ref: 00BFE9AD
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00BFE9B7
                        • Sleep.KERNEL32 ref: 00BFE9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: 9bdd116d82a186e0a7a5383c3e9a4d5e7ccb85cb1e11373900fcd6a6623857cf
                        • Instruction ID: 404019d80a8be619a9ceb19a19622084edb42fe823e5761130532f798acbc4b3
                        • Opcode Fuzzy Hash: 9bdd116d82a186e0a7a5383c3e9a4d5e7ccb85cb1e11373900fcd6a6623857cf
                        • Instruction Fuzzy Hash: C5013931C0162DDBCF109BE4D8897FDBBB8FB09700F008586E612B3260CB709569C7A1
                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BF1114
                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF1120
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF112F
                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00BF0B9B,?,?,?), ref: 00BF1136
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BF114D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: 301f915c88f5622e229fcb6f772c6586357b92c3ec73f0a2693425db881631b9
                        • Instruction ID: 580d7c0a0d2ca2a1b8f24c41d9a616e07d61bea266fdc7a792c3694e8ed38ecc
                        • Opcode Fuzzy Hash: 301f915c88f5622e229fcb6f772c6586357b92c3ec73f0a2693425db881631b9
                        • Instruction Fuzzy Hash: 7A016D79100205BFDB214F68DC89B6E3BAEEF85360B100854FA41D3360DB31DD158A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BF0FCA
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BF0FD6
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BF0FE5
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BF0FEC
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BF1002
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: b2a467cd9cd6afa23e32a09241d02efd44df86b5043250bf1d024b7606807c80
                        • Instruction ID: 216fbfe8b3ac0df25bdb8b8b47a7f4a98795a1f1c6b6eb2db871a1e19da00457
                        • Opcode Fuzzy Hash: b2a467cd9cd6afa23e32a09241d02efd44df86b5043250bf1d024b7606807c80
                        • Instruction Fuzzy Hash: 93F04936210305EBDB214FA89C8AF6E3BADEF89762F204864FA45C7251CA70DC558A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BF102A
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BF1036
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF1045
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF104C
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF1062
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 7aa3546fad7d19730f9678e1b0d8110f5ee5350b1ee2f5151ab94c787b629699
                        • Instruction ID: 3b2527065ceb007e2a2af19f2255e73b1f8a72c107e56a030e7bac68fee98b16
                        • Opcode Fuzzy Hash: 7aa3546fad7d19730f9678e1b0d8110f5ee5350b1ee2f5151ab94c787b629699
                        • Instruction Fuzzy Hash: 49F06D35210305FBDB215FA8EC89F6E3BADEF89761F200824FA45C7250CE70D8558A60
                        APIs
                        • CloseHandle.KERNEL32(?,?,?,?,00C0017D,?,00C032FC,?,00000001,00BD2592,?), ref: 00C00324
                        • CloseHandle.KERNEL32(?,?,?,?,00C0017D,?,00C032FC,?,00000001,00BD2592,?), ref: 00C00331
                        • CloseHandle.KERNEL32(?,?,?,?,00C0017D,?,00C032FC,?,00000001,00BD2592,?), ref: 00C0033E
                        • CloseHandle.KERNEL32(?,?,?,?,00C0017D,?,00C032FC,?,00000001,00BD2592,?), ref: 00C0034B
                        • CloseHandle.KERNEL32(?,?,?,?,00C0017D,?,00C032FC,?,00000001,00BD2592,?), ref: 00C00358
                        • CloseHandle.KERNEL32(?,?,?,?,00C0017D,?,00C032FC,?,00000001,00BD2592,?), ref: 00C00365
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: c0d34a3f9d583cae495f9ef69f3456a9d980480d76b65005c5aac1fffe6d297f
                        • Instruction ID: f6b2926208a3786c83c35ad716841e6b93e375f482ced2fbec46002d40608313
                        • Opcode Fuzzy Hash: c0d34a3f9d583cae495f9ef69f3456a9d980480d76b65005c5aac1fffe6d297f
                        • Instruction Fuzzy Hash: 6401A272800B159FC7319F66D880516F7F9BF503157268A3FD1A652971C371AA55CF80
                        APIs
                        • _free.LIBCMT ref: 00BCD752
                          • Part of subcall function 00BC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000), ref: 00BC29DE
                          • Part of subcall function 00BC29C8: GetLastError.KERNEL32(00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000,00000000), ref: 00BC29F0
                        • _free.LIBCMT ref: 00BCD764
                        • _free.LIBCMT ref: 00BCD776
                        • _free.LIBCMT ref: 00BCD788
                        • _free.LIBCMT ref: 00BCD79A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: e272b432b900598d1804badc1dd8b3f17d07dbb9e378141bf9d38a7e55284bb0
                        • Instruction ID: faf0da63d48c75649dca752b0c473092de06503e95bdb40c49e6bbaed5ba6ab8
                        • Opcode Fuzzy Hash: e272b432b900598d1804badc1dd8b3f17d07dbb9e378141bf9d38a7e55284bb0
                        • Instruction Fuzzy Hash: 35F0FF76544304ABC621EB64F9C5F1A77DDFB4471179508AEF089E7641CB70FC808664
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00BF5C58
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00BF5C6F
                        • MessageBeep.USER32(00000000), ref: 00BF5C87
                        • KillTimer.USER32(?,0000040A), ref: 00BF5CA3
                        • EndDialog.USER32(?,00000001), ref: 00BF5CBD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: eacb1c5a5c044d9e3aa147311e2185aa287efbec3971c2235dc57c0d907aa2a5
                        • Instruction ID: 01b7a3a244b747456c113d63c5a457a482c67e65e94877f919a081e08088cf9d
                        • Opcode Fuzzy Hash: eacb1c5a5c044d9e3aa147311e2185aa287efbec3971c2235dc57c0d907aa2a5
                        • Instruction Fuzzy Hash: ED011730510B04ABEB315B14DD8EFA977F8FF04B05F041599F743A14E1D7F459598A91
                        APIs
                        • _free.LIBCMT ref: 00BC22BE
                          • Part of subcall function 00BC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000), ref: 00BC29DE
                          • Part of subcall function 00BC29C8: GetLastError.KERNEL32(00000000,?,00BCD7D1,00000000,00000000,00000000,00000000,?,00BCD7F8,00000000,00000007,00000000,?,00BCDBF5,00000000,00000000), ref: 00BC29F0
                        • _free.LIBCMT ref: 00BC22D0
                        • _free.LIBCMT ref: 00BC22E3
                        • _free.LIBCMT ref: 00BC22F4
                        • _free.LIBCMT ref: 00BC2305
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 0e8e5d417692e7ed38151338f13d2ba622267b6c7c7cbbcb0fd050b4658a0a30
                        • Instruction ID: 2f0c33d3e611fdfe766d97b8ac4e6ec2da53455dbd59f53759905b2a8715f751
                        • Opcode Fuzzy Hash: 0e8e5d417692e7ed38151338f13d2ba622267b6c7c7cbbcb0fd050b4658a0a30
                        • Instruction Fuzzy Hash: 63F03A748402209F8A22AF95BC41F0D3BA4F718762718059EF850EA3B1CBB00952EFA5
                        APIs
                        • EndPath.GDI32(?), ref: 00BA95D4
                        • StrokeAndFillPath.GDI32(?,?,00BE71F7,00000000,?,?,?), ref: 00BA95F0
                        • SelectObject.GDI32(?,00000000), ref: 00BA9603
                        • DeleteObject.GDI32 ref: 00BA9616
                        • StrokePath.GDI32(?), ref: 00BA9631
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: 22a269555317b2579d9cf17734722ad476392628462742f7e710288ed9281500
                        • Instruction ID: 554e1936601713e87e3750fa31c77541d8ae7e0b56faff142cdbf55cc919bd8c
                        • Opcode Fuzzy Hash: 22a269555317b2579d9cf17734722ad476392628462742f7e710288ed9281500
                        • Instruction Fuzzy Hash: 57F01930409304EBEB365F6AED5976C3BA5EB02322F0C8254F825554F0C7B089A6EFA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: __freea$_free
                        • String ID: a/p$am/pm
                        • API String ID: 3432400110-3206640213
                        • Opcode ID: 576b055ba4b23f48e3f96265a97294336456142c0134be9c6a370bde3430b8f3
                        • Instruction ID: fc066244bdd765c76f7807b332b0099261df65f458e53b230c12756cbc5be4eb
                        • Opcode Fuzzy Hash: 576b055ba4b23f48e3f96265a97294336456142c0134be9c6a370bde3430b8f3
                        • Instruction Fuzzy Hash: 34D1F035900246EACB249F6CC895FBAB7F0EF47704F2849DDE901BB642D2359D80CBA5
                        APIs
                          • Part of subcall function 00BB0242: EnterCriticalSection.KERNEL32(00C6070C,00C61884,?,?,00BA198B,00C62518,?,?,?,00B912F9,00000000), ref: 00BB024D
                          • Part of subcall function 00BB0242: LeaveCriticalSection.KERNEL32(00C6070C,?,00BA198B,00C62518,?,?,?,00B912F9,00000000), ref: 00BB028A
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00BB00A3: __onexit.LIBCMT ref: 00BB00A9
                        • __Init_thread_footer.LIBCMT ref: 00C17BFB
                          • Part of subcall function 00BB01F8: EnterCriticalSection.KERNEL32(00C6070C,?,?,00BA8747,00C62514), ref: 00BB0202
                          • Part of subcall function 00BB01F8: LeaveCriticalSection.KERNEL32(00C6070C,?,00BA8747,00C62514), ref: 00BB0235
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                        • String ID: 5$G$Variable must be of type 'Object'.
                        • API String ID: 535116098-3733170431
                        • Opcode ID: 5b6d0d689f88bd9c64ad84befa29bc582717c55decb68154b5ab65882e4cd490
                        • Instruction ID: 53246333011845ac8164ee6d5cbf3b4242ccb0f720f824eef0347e84bdbfd44b
                        • Opcode Fuzzy Hash: 5b6d0d689f88bd9c64ad84befa29bc582717c55decb68154b5ab65882e4cd490
                        • Instruction Fuzzy Hash: DF918C74A08209EFCB14EF94D8919FDB7B1FF4A300F108199F8169B291DB71AE85EB51
                        APIs
                          • Part of subcall function 00BFB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00BF21D0,?,?,00000034,00000800,?,00000034), ref: 00BFB42D
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00BF2760
                          • Part of subcall function 00BFB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00BF21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00BFB3F8
                          • Part of subcall function 00BFB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00BFB355
                          • Part of subcall function 00BFB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00BF2194,00000034,?,?,00001004,00000000,00000000), ref: 00BFB365
                          • Part of subcall function 00BFB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00BF2194,00000034,?,?,00001004,00000000,00000000), ref: 00BFB37B
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00BF27CD
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00BF281A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                        • String ID: @
                        • API String ID: 4150878124-2766056989
                        • Opcode ID: da05396c62024831d5ad6475a4cac3c4411ff10f278d8adf8c08bf215622b82b
                        • Instruction ID: b5d5cbab23133a69c64e5a141db838c74124777942da758bbccd30d0149e2a1e
                        • Opcode Fuzzy Hash: da05396c62024831d5ad6475a4cac3c4411ff10f278d8adf8c08bf215622b82b
                        • Instruction Fuzzy Hash: E741F97690021CAEDB10DBA4C986FEEBBB8EF09740F104095FA55B7191DB706E49CBA1
                        APIs
                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rOrderRequest09-24.exe,00000104), ref: 00BC1769
                        • _free.LIBCMT ref: 00BC1834
                        • _free.LIBCMT ref: 00BC183E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\rOrderRequest09-24.exe
                        • API String ID: 2506810119-2024235326
                        • Opcode ID: 15af6035f7398e35b3c228b08974bf4ea937b83bbb53a4dd42c872499cee7d30
                        • Instruction ID: fd2b06a3b572b43e68df96323075717a8ac8c17f12e7edc4aab8c1c73f927c61
                        • Opcode Fuzzy Hash: 15af6035f7398e35b3c228b08974bf4ea937b83bbb53a4dd42c872499cee7d30
                        • Instruction Fuzzy Hash: 42316475A44218AFDB21DF999C85F9EBBFCEB86310B1445EAF804E7212D6B04E40CB90
                        APIs
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00BFC306
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00BFC34C
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00C61990,017F5500), ref: 00BFC395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem
                        • String ID: 0
                        • API String ID: 135850232-4108050209
                        • Opcode ID: d9593a2a4b83d064a1f7c53439de02d8da21493f194f23baf6908334ef17cf1c
                        • Instruction ID: f1a5992726955d3b49bac26093a641257da823cbdcfcb8e440e0842a9371373e
                        • Opcode Fuzzy Hash: d9593a2a4b83d064a1f7c53439de02d8da21493f194f23baf6908334ef17cf1c
                        • Instruction Fuzzy Hash: 7E41B1312083099FD720DF25D984B6ABFE4EF85350F1086ADFAA5972D1D730E948CB5A
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00C2CC08,00000000,?,?,?,?), ref: 00C244AA
                        • GetWindowLongW.USER32 ref: 00C244C7
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C244D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 77dd91d9b158401ec98141677f015e2c0eb65bcbd5eaaf92dcdd9981f626ac3a
                        • Instruction ID: 14941805b68a802aa13ce11439125bc0b6609864c5020088d59e7dc2c772b6d6
                        • Opcode Fuzzy Hash: 77dd91d9b158401ec98141677f015e2c0eb65bcbd5eaaf92dcdd9981f626ac3a
                        • Instruction Fuzzy Hash: 0D319A31210225ABDB249E38EC85BEA7BA9EB09324F204325F975A25E0DB70ED519B50
                        APIs
                          • Part of subcall function 00C1335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00C13077,?,?), ref: 00C13378
                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C1307A
                        • _wcslen.LIBCMT ref: 00C1309B
                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00C13106
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 946324512-2422070025
                        • Opcode ID: 93b786ee24adc0a7b898923f0fd69621a8b24e6f075bba6338cea1ce8a534d5c
                        • Instruction ID: 365bd91a29c029119b8e6194b8b1f81f6dadfbcc532e1ca26e867840238caadf
                        • Opcode Fuzzy Hash: 93b786ee24adc0a7b898923f0fd69621a8b24e6f075bba6338cea1ce8a534d5c
                        • Instruction Fuzzy Hash: 8331C6356002419FCB10CF69C585EE977E0EF56318F248099E9258B392D771DF85D760
                        APIs
                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00C24705
                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00C24713
                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00C2471A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyWindow
                        • String ID: msctls_updown32
                        • API String ID: 4014797782-2298589950
                        • Opcode ID: b9f2c6f9603ab137a2768542ae578135d8851813560c9040ecc3c600a5dde130
                        • Instruction ID: 02d8fd83b51001a05e34602df614844c89475b01b64ddc476ce1c76f1fb59001
                        • Opcode Fuzzy Hash: b9f2c6f9603ab137a2768542ae578135d8851813560c9040ecc3c600a5dde130
                        • Instruction Fuzzy Hash: 83216DB5600218AFDB14DF68ECC1EBB37EDEF5A7A4B040059FA149B691CB70ED51CA60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 176396367-2734436370
                        • Opcode ID: c9fab2b43f7decc25caf37de9c1c40af510b8aad6c9c71752a646388ad4b0989
                        • Instruction ID: 77d9a88962cfde614e1fe1d82324dec3f799a363f930a47df009346b4949eefc
                        • Opcode Fuzzy Hash: c9fab2b43f7decc25caf37de9c1c40af510b8aad6c9c71752a646388ad4b0989
                        • Instruction Fuzzy Hash: 1421087220462967D731AA249C42FB773D8EF61710F1440BAFA49D7141EBA1DD4AC295
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00C23840
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00C23850
                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00C23876
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: 0369cc1145228656bc4eeaeb63d7c569aa382bfe5f32eb9417dc6eb955c797bf
                        • Instruction ID: 06ad21ddbd3d8b6af1a6229bf62723e6522711d0674c139041e3134ad48e7695
                        • Opcode Fuzzy Hash: 0369cc1145228656bc4eeaeb63d7c569aa382bfe5f32eb9417dc6eb955c797bf
                        • Instruction Fuzzy Hash: 1F21BE72610228BBEF218F54EC85FAB376AEF89B50F118125F9109B590CA75DD528BA0
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00C04A08
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C04A5C
                        • SetErrorMode.KERNEL32(00000000,?,?,00C2CC08), ref: 00C04AD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: %lu
                        • API String ID: 2507767853-685833217
                        • Opcode ID: b0db9a6f19cc78794a187852b7c3717819771333ba838ff1595f7d50110446b2
                        • Instruction ID: 1f1979e3f9084d72f2e9d44188ba288d0ae149f8f6271243c73e045f081e856b
                        • Opcode Fuzzy Hash: b0db9a6f19cc78794a187852b7c3717819771333ba838ff1595f7d50110446b2
                        • Instruction Fuzzy Hash: 96315375A00109AFDB10DF54C885EAE7BF8EF04304F1480A9F905DB252DB71EE46CB61
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00C2424F
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00C24264
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00C24271
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: ffe0f12f271cf4174c0fda7077527fbd4874da381ecb7f25ce097afc4426abe1
                        • Instruction ID: 529b9f9d2bd22f574f0be1cc9771821a42a51dd9d4f10a172ff4339f5812ed59
                        • Opcode Fuzzy Hash: ffe0f12f271cf4174c0fda7077527fbd4874da381ecb7f25ce097afc4426abe1
                        • Instruction Fuzzy Hash: E111E331240218BFEF205E29DC46FAB3BACEF95B54F010124FA55E2090D2B1D8619B20
                        APIs
                          • Part of subcall function 00B96B57: _wcslen.LIBCMT ref: 00B96B6A
                          • Part of subcall function 00BF2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00BF2DC5
                          • Part of subcall function 00BF2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BF2DD6
                          • Part of subcall function 00BF2DA7: GetCurrentThreadId.KERNEL32 ref: 00BF2DDD
                          • Part of subcall function 00BF2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00BF2DE4
                        • GetFocus.USER32 ref: 00BF2F78
                          • Part of subcall function 00BF2DEE: GetParent.USER32(00000000), ref: 00BF2DF9
                        • GetClassNameW.USER32(?,?,00000100), ref: 00BF2FC3
                        • EnumChildWindows.USER32(?,00BF303B), ref: 00BF2FEB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                        • String ID: %s%d
                        • API String ID: 1272988791-1110647743
                        • Opcode ID: 309f144f1b5dc97c2ed3fee0613ca26fd99bfcc519a380759a42c5a580254c7c
                        • Instruction ID: a21a880c61d9a1062612565240dcc9420c5c4a9417856ed085ee1e47b4bda560
                        • Opcode Fuzzy Hash: 309f144f1b5dc97c2ed3fee0613ca26fd99bfcc519a380759a42c5a580254c7c
                        • Instruction Fuzzy Hash: 2011AF756002096BDF157F708CC6FFE77EAAF84304F0480B5BA099B292DE70994E8B60
                        APIs
                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00C258C1
                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00C258EE
                        • DrawMenuBar.USER32(?), ref: 00C258FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Menu$InfoItem$Draw
                        • String ID: 0
                        • API String ID: 3227129158-4108050209
                        • Opcode ID: 03691622dd1d12f6731758b3bef8bc6ba930ad5c4f216ce58f6a9634da634ca7
                        • Instruction ID: 572b62ec84fbf95a032753a4e00448a8059a1be664725404d270a867b6e633fe
                        • Opcode Fuzzy Hash: 03691622dd1d12f6731758b3bef8bc6ba930ad5c4f216ce58f6a9634da634ca7
                        • Instruction Fuzzy Hash: 70018C31514228EFDB21AF51EC44BEFBBB4FF45360F1080AAE849D6151DB308A85EF21
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 35b918d2384d66ddf360cdafba14523846ab4eac1e9dd7c89de7fbce3d3e4b97
                        • Instruction ID: 9a5ee2254eaaa2ffae47e7e929966c1e0e391225a9f4f833746aed5d9613513c
                        • Opcode Fuzzy Hash: 35b918d2384d66ddf360cdafba14523846ab4eac1e9dd7c89de7fbce3d3e4b97
                        • Instruction Fuzzy Hash: 9AC13975A1020AAFDB14DFA4C894ABEB7F5FF48704F108598E605EB262D731EE45CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID:
                        • API String ID: 1036877536-0
                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction ID: 59e67491aa03013542cf34ad6da1d518a9bfc78a7976e257fdb5715e4fe8a73f
                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction Fuzzy Hash: 68A13571E003869FDB21CF18C8A1FAABFE5EF65350F1885EEE5959B281C3348A81C750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Variant$ClearInitInitializeUninitialize
                        • String ID:
                        • API String ID: 1998397398-0
                        • Opcode ID: 4827c7d134f7a352be19f4ae1e93969e966bed125cfe5654969d496132a8b82e
                        • Instruction ID: b211b7de1b5eb41a59ae74fdedfb89a445bce3f738bbc55cb7d98b6d575a99dc
                        • Opcode Fuzzy Hash: 4827c7d134f7a352be19f4ae1e93969e966bed125cfe5654969d496132a8b82e
                        • Instruction Fuzzy Hash: A6A19E752183009FCB00DF24C495A6AB7E5FF89714F05889DF98A9B362DB30EE45DB91
                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00C2FC08,?), ref: 00BF05F0
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00C2FC08,?), ref: 00BF0608
                        • CLSIDFromProgID.OLE32(?,?,00000000,00C2CC40,000000FF,?,00000000,00000800,00000000,?,00C2FC08,?), ref: 00BF062D
                        • _memcmp.LIBVCRUNTIME ref: 00BF064E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: 47a6be3ff3ef736d8d1fe202204e407550aee5aed94a6d384019e65097f53c8c
                        • Instruction ID: cb87660c8f08a37b051d234229cce887fed06080bb7b890e505c4342cf3d3eae
                        • Opcode Fuzzy Hash: 47a6be3ff3ef736d8d1fe202204e407550aee5aed94a6d384019e65097f53c8c
                        • Instruction Fuzzy Hash: 95810C71910109EFCB04DF94C984EEEB7F9FF89315F104598E606AB261DB71AE0ACB60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 84e17144be1c89b3d88510fd80161b6c7686d426f31d46324e1754d7693a4fc9
                        • Instruction ID: 39c60ce0e7d8ea2ce55e51de54dcd808cd74dff938b61ce2ea26ae9ca5a1148a
                        • Opcode Fuzzy Hash: 84e17144be1c89b3d88510fd80161b6c7686d426f31d46324e1754d7693a4fc9
                        • Instruction Fuzzy Hash: 6F414935600501BBDB256FBD9C86BBEBAE4EF41330F144AEBF418D2392F6B448415E61
                        APIs
                        • GetWindowRect.USER32(017FE998,?), ref: 00C262E2
                        • ScreenToClient.USER32(?,?), ref: 00C26315
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00C26382
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: 656b2f1ec8300de0b3646faf00244ff61b3de68b77182ee2581ba3a595cd2bc8
                        • Instruction ID: 36ff27c22fc86120ea120fb418cb762b82604a95f365272b88ce2eccb16d375c
                        • Opcode Fuzzy Hash: 656b2f1ec8300de0b3646faf00244ff61b3de68b77182ee2581ba3a595cd2bc8
                        • Instruction Fuzzy Hash: 78513E74900219EFDF20DF68E880AAE7BB5FF45360F148169F925976A0D730EE41CBA0
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00C11AFD
                        • WSAGetLastError.WSOCK32 ref: 00C11B0B
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00C11B8A
                        • WSAGetLastError.WSOCK32 ref: 00C11B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorLast$socket
                        • String ID:
                        • API String ID: 1881357543-0
                        • Opcode ID: 763fc02ef411bed7965cdce34fac5d22ee29847c4f9eaaff53c0ed5920c64b9a
                        • Instruction ID: 098153d0d0df49dc2172a72353c6c9cd29cc76dca06f15adaedb0cda0ea1e1a5
                        • Opcode Fuzzy Hash: 763fc02ef411bed7965cdce34fac5d22ee29847c4f9eaaff53c0ed5920c64b9a
                        • Instruction Fuzzy Hash: F441E574600200AFDB20AF24C886F697BE5AB45718F54C498FA199F3D3D776ED818B90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0baabd312509e4be4f4e7bfb9cae52e28de860b01cbf0e5f4144ce5de8a65c26
                        • Instruction ID: db473704c02c605ae1e0d2e564b315ebb659ccb11adf864d530a61cde657a702
                        • Opcode Fuzzy Hash: 0baabd312509e4be4f4e7bfb9cae52e28de860b01cbf0e5f4144ce5de8a65c26
                        • Instruction Fuzzy Hash: BC41B075A04704AFD7289F78CC42FAEBBE9EB88710F1045AEF551DB382D77199018790
                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C05783
                        • GetLastError.KERNEL32(?,00000000), ref: 00C057A9
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C057CE
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C057FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 50b8fd7921556580260449359dac0743d16601e37ac3595a024f25f62eb190e7
                        • Instruction ID: b697b5770d798dd125602f1a0ffb8643db4d163e26b69f65f9db805042e65451
                        • Opcode Fuzzy Hash: 50b8fd7921556580260449359dac0743d16601e37ac3595a024f25f62eb190e7
                        • Instruction Fuzzy Hash: 46412935214610DFCB10DF15C594A1EBBE2EF99720B19C498E85AAB3A2CB30FD01CB91
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00BB6D71,00000000,00000000,00BB82D9,?,00BB82D9,?,00000001,00BB6D71,8BE85006,00000001,00BB82D9,00BB82D9), ref: 00BCD910
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BCD999
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00BCD9AB
                        • __freea.LIBCMT ref: 00BCD9B4
                          • Part of subcall function 00BC3820: RtlAllocateHeap.NTDLL(00000000,?,00C61444,?,00BAFDF5,?,?,00B9A976,00000010,00C61440,00B913FC,?,00B913C6,?,00B91129), ref: 00BC3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: 6c50932e719375932ceca5aaa058b88bb7e79643de9aa39044c9a73c185b49d9
                        • Instruction ID: 701294212315e119b6262a08f0b42fad9d679e90ee751eafd7fab6cf93ddb05a
                        • Opcode Fuzzy Hash: 6c50932e719375932ceca5aaa058b88bb7e79643de9aa39044c9a73c185b49d9
                        • Instruction Fuzzy Hash: 97319A76A0020AABDF249F64DC85FEE7BE5EB41710B0542ACFC04D6291EB75CD51CBA0
                        APIs
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00C25352
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C25375
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C25382
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C253A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LongWindow$InvalidateMessageRectSend
                        • String ID:
                        • API String ID: 3340791633-0
                        • Opcode ID: ee771b78d800c11df57dcdcebe929381cbd8d7155093888b66ade8c68124f6e1
                        • Instruction ID: 54ce70d72f30ee0044b9d8d1f5294a7250b435f4ac03ff4a3ccd9ac2f5b3b603
                        • Opcode Fuzzy Hash: ee771b78d800c11df57dcdcebe929381cbd8d7155093888b66ade8c68124f6e1
                        • Instruction Fuzzy Hash: 2D31C534A55A28EFEB30DF14EC45BEA37A5AB04390F586101FA21969F1C7B09E409B51
                        APIs
                        • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 00BFABF1
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00BFAC0D
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00BFAC74
                        • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 00BFACC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 9d8b0856b340fc587a666881ba4a48b6d3710f4ed3826263651ced6013816b78
                        • Instruction ID: ec59327b2ee3e01efed330ab6679bdb77365d5d81d67b5e620614aff42d85633
                        • Opcode Fuzzy Hash: 9d8b0856b340fc587a666881ba4a48b6d3710f4ed3826263651ced6013816b78
                        • Instruction Fuzzy Hash: BB3128B0A0071C6FEF38CB658C447FE7BE5EB49310F04429AE689531D0C375998D8752
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 00C2769A
                        • GetWindowRect.USER32(?,?), ref: 00C27710
                        • PtInRect.USER32(?,?,00C28B89), ref: 00C27720
                        • MessageBeep.USER32(00000000), ref: 00C2778C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: 6cbf68717c2afefc77b98f9a1f6ee0683ce90bad866ca025163462be045d6042
                        • Instruction ID: aac94abe5d78166ce1cc349633c8197b4efb89868be423b7661b42dd48136f88
                        • Opcode Fuzzy Hash: 6cbf68717c2afefc77b98f9a1f6ee0683ce90bad866ca025163462be045d6042
                        • Instruction Fuzzy Hash: D0418D346052259FCB22CF59E8D4FAD77F4BB48B14F1842A8E8249B661C770AA41DF90
                        APIs
                        • GetForegroundWindow.USER32 ref: 00C216EB
                          • Part of subcall function 00BF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BF3A57
                          • Part of subcall function 00BF3A3D: GetCurrentThreadId.KERNEL32 ref: 00BF3A5E
                          • Part of subcall function 00BF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00BF25B3), ref: 00BF3A65
                        • GetCaretPos.USER32(?), ref: 00C216FF
                        • ClientToScreen.USER32(00000000,?), ref: 00C2174C
                        • GetForegroundWindow.USER32 ref: 00C21752
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: e7cfb55d237e615f9fd7b05f1f5ade9b61511e8167964f0bcca97701df8ef444
                        • Instruction ID: 5c55676110ad08bd56ecd1d4a29e4247f4137099f3e72b10342aad9935962f22
                        • Opcode Fuzzy Hash: e7cfb55d237e615f9fd7b05f1f5ade9b61511e8167964f0bcca97701df8ef444
                        • Instruction Fuzzy Hash: 83315475D00149AFCB10DFAAC8C1DAEBBF9EF48304B5480A9E415E7611E731DE45CBA0
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00BFD501
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00BFD50F
                        • Process32NextW.KERNEL32(00000000,?), ref: 00BFD52F
                        • CloseHandle.KERNEL32(00000000), ref: 00BFD5DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: cb033c9e0770c2bae81dcb95fb25b410a1477bd0a5252ab82c54cd74713d6e9f
                        • Instruction ID: bf7869d6de85c23b12a891924f6bfc37df1ea38a56fc453ebbe48da6ca209b43
                        • Opcode Fuzzy Hash: cb033c9e0770c2bae81dcb95fb25b410a1477bd0a5252ab82c54cd74713d6e9f
                        • Instruction Fuzzy Hash: 6231AD310083049FD710EF64C881BBFBBE8EF99354F10096DF581831A1EB719949CBA2
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • GetCursorPos.USER32(?), ref: 00C29001
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00BE7711,?,?,?,?,?), ref: 00C29016
                        • GetCursorPos.USER32(?), ref: 00C2905E
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00BE7711,?,?,?), ref: 00C29094
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: b2b967525c3c67944d639577177c2831193602de57b71052be0336271eda5ad8
                        • Instruction ID: 070857a8237e0ccab6728f81046b50480f804db72a40a854aea555cc51ecd278
                        • Opcode Fuzzy Hash: b2b967525c3c67944d639577177c2831193602de57b71052be0336271eda5ad8
                        • Instruction Fuzzy Hash: 3B21BF31600028EFCB258F95D898FFE3BB9FF89360F044165F91587661C7319A50EB60
                        APIs
                        • GetFileAttributesW.KERNEL32(?,00C2CB68), ref: 00BFD2FB
                        • GetLastError.KERNEL32 ref: 00BFD30A
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00BFD319
                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00C2CB68), ref: 00BFD376
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast
                        • String ID:
                        • API String ID: 2267087916-0
                        • Opcode ID: d70eb67cb1961374943691b40f9b77b26ca750d8a7bfce87b7e4efc485273177
                        • Instruction ID: 42c4af0dafeedc79db95f2ae525a605496bdfb8a5baea9702b5e989099d5a367
                        • Opcode Fuzzy Hash: d70eb67cb1961374943691b40f9b77b26ca750d8a7bfce87b7e4efc485273177
                        • Instruction Fuzzy Hash: 9D21D1705082059F8710DF28C88197E77E5EE5A364F104AADF699C32A1DB30D90ACB97
                        APIs
                          • Part of subcall function 00BF1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BF102A
                          • Part of subcall function 00BF1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BF1036
                          • Part of subcall function 00BF1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF1045
                          • Part of subcall function 00BF1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF104C
                          • Part of subcall function 00BF1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF1062
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00BF15BE
                        • _memcmp.LIBVCRUNTIME ref: 00BF15E1
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF1617
                        • HeapFree.KERNEL32(00000000), ref: 00BF161E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: 025190ad1e9aa9a3ec5b18e89399e72081642779b2bd0a110def9e17b6500cb6
                        • Instruction ID: d83a8b1e704f727af26c9983290790ff63cdd07c5553e5c584828daa957753b6
                        • Opcode Fuzzy Hash: 025190ad1e9aa9a3ec5b18e89399e72081642779b2bd0a110def9e17b6500cb6
                        • Instruction Fuzzy Hash: CE215731E00108EBDB10DFA8C945BFEB7F8EF54344F084899E541AB241E731AA09CBA0
                        APIs
                        • GetWindowLongW.USER32(?,000000EC), ref: 00C2280A
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C22824
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C22832
                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00C22840
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Long$AttributesLayered
                        • String ID:
                        • API String ID: 2169480361-0
                        • Opcode ID: 9b2d4710b7493cda77f1bf1b26f98ac44a7eb464e4f49824ef0691969b4a9fd8
                        • Instruction ID: 7b580f1041428e9b76bd12bf71fcdc600f29b64fae76e23e5a9989ddb1ade0ce
                        • Opcode Fuzzy Hash: 9b2d4710b7493cda77f1bf1b26f98ac44a7eb464e4f49824ef0691969b4a9fd8
                        • Instruction Fuzzy Hash: 1621D335208121BFD7249B24DC84FAA7B95EF45324F148258F4268BAE2CB75FD82CB90
                        APIs
                          • Part of subcall function 00BF8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00BF790A,?,000000FF,?,00BF8754,00000000,?,0000001C,?,?), ref: 00BF8D8C
                          • Part of subcall function 00BF8D7D: lstrcpyW.KERNEL32(00000000,?,?,00BF790A,?,000000FF,?,00BF8754,00000000,?,0000001C,?,?,00000000), ref: 00BF8DB2
                          • Part of subcall function 00BF8D7D: lstrcmpiW.KERNEL32(00000000,?,00BF790A,?,000000FF,?,00BF8754,00000000,?,0000001C,?,?), ref: 00BF8DE3
                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00BF8754,00000000,?,0000001C,?,?,00000000), ref: 00BF7923
                        • lstrcpyW.KERNEL32(00000000,?,?,00BF8754,00000000,?,0000001C,?,?,00000000), ref: 00BF7949
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00BF8754,00000000,?,0000001C,?,?,00000000), ref: 00BF7984
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: 588baefed0a7391af89897c7822b6c873bb1a622dbe727196e9b741213fdb69e
                        • Instruction ID: ab4e1d951d4b9eb9c009f472006b5134e514ce9aa2c35f350f22b0bff04e18da
                        • Opcode Fuzzy Hash: 588baefed0a7391af89897c7822b6c873bb1a622dbe727196e9b741213fdb69e
                        • Instruction Fuzzy Hash: 0211033A200206BBDB259F34CC45E7E77E9FF95350B4080AAFA02C72A4EF719815C7A1
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C27D0B
                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00C27D2A
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00C27D42
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C0B7AD,00000000), ref: 00C27D6B
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID:
                        • API String ID: 847901565-0
                        • Opcode ID: 46bd4bfa5b22e35a6d5f2fecca9d6cccdf2e8ca2b52896285bc8a6aaff9d11da
                        • Instruction ID: 88cb5d5b5c1e40bb104dec26143ca0ebfe2b784830b161148f69d874f6ee1a11
                        • Opcode Fuzzy Hash: 46bd4bfa5b22e35a6d5f2fecca9d6cccdf2e8ca2b52896285bc8a6aaff9d11da
                        • Instruction Fuzzy Hash: 0411DF31214625AFCB208F29EC84BAA3BA5AF45370F294724FC39C76F0D7309A11DB50
                        APIs
                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 00C256BB
                        • _wcslen.LIBCMT ref: 00C256CD
                        • _wcslen.LIBCMT ref: 00C256D8
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C25816
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID:
                        • API String ID: 455545452-0
                        • Opcode ID: 35450aefe4fbd968376f0bef4c900463fbc65c36b0142a0619bb0b3009584549
                        • Instruction ID: b95fca6c36e301dd958870a2a27a70388b8fc15f8d85943f07a4b967dc232b69
                        • Opcode Fuzzy Hash: 35450aefe4fbd968376f0bef4c900463fbc65c36b0142a0619bb0b3009584549
                        • Instruction Fuzzy Hash: 3C11D3716006289ADF20EF66EC85BFF77ACEF10760B504066F925D6581E7B0CA80CB64
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 28a2258fa1fa6c4d2b8646b9670439abbf4b5e16d1c2f52440622476c39abeb5
                        • Instruction ID: 1adb16a0a71406f63db34150a7fc75d557d0b003396830f98cf22e7a698cff83
                        • Opcode Fuzzy Hash: 28a2258fa1fa6c4d2b8646b9670439abbf4b5e16d1c2f52440622476c39abeb5
                        • Instruction Fuzzy Hash: 9B012CB2205A167EF621167C6CC1F6B669DDF423B8B3507BDF532611D6DB708C5051B0
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00BF1A47
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BF1A59
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BF1A6F
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BF1A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: fbae3920d7537b2684180f632b19728b0dfd54a4bb3c8c257d0f659b37ed19d2
                        • Instruction ID: 9ceb8fae89df4f0cff6bc5f06d2f32659bfb3c2df21297e755142070fdc040f9
                        • Opcode Fuzzy Hash: fbae3920d7537b2684180f632b19728b0dfd54a4bb3c8c257d0f659b37ed19d2
                        • Instruction Fuzzy Hash: 4E11393AD01219FFEB10DFA9CD85FADBBB8EB08750F200491EA10B7290D6716E50DB94
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00BFE1FD
                        • MessageBoxW.USER32(?,?,?,?), ref: 00BFE230
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00BFE246
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00BFE24D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                        • String ID:
                        • API String ID: 2880819207-0
                        • Opcode ID: 4eb76c80bde85f0a219f57173fe3c3f8f313ac7f198739a8b0651269729f79f0
                        • Instruction ID: f89fb722459058045167ad635ad287bc112d37e8b50080059acd23c08f04a7db
                        • Opcode Fuzzy Hash: 4eb76c80bde85f0a219f57173fe3c3f8f313ac7f198739a8b0651269729f79f0
                        • Instruction Fuzzy Hash: 74110872904258BBD7119BA9DC45BBE7FECEB45321F184665F925D33A0E6B0C90487A0
                        APIs
                        • CreateThread.KERNEL32(00000000,?,00BBCFF9,00000000,00000004,00000000), ref: 00BBD218
                        • GetLastError.KERNEL32 ref: 00BBD224
                        • __dosmaperr.LIBCMT ref: 00BBD22B
                        • ResumeThread.KERNEL32(00000000), ref: 00BBD249
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                        • String ID:
                        • API String ID: 173952441-0
                        • Opcode ID: 33305cd9056e9859503658d79dc11d15f3a349aee2929b7dd18cd364e9d5e3c7
                        • Instruction ID: 9e32554524b0241fcfeb6409a66c03617625da72d9012c0f4bc2f5997eeac38f
                        • Opcode Fuzzy Hash: 33305cd9056e9859503658d79dc11d15f3a349aee2929b7dd18cd364e9d5e3c7
                        • Instruction Fuzzy Hash: AB01D6364052057BCB215BA5DC45BFE7AE9DF81330F100299F925921E0EBB58901C7A0
                        APIs
                          • Part of subcall function 00BA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BA9BB2
                        • GetClientRect.USER32(?,?), ref: 00C29F31
                        • GetCursorPos.USER32(?), ref: 00C29F3B
                        • ScreenToClient.USER32(?,?), ref: 00C29F46
                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00C29F7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: b8add116e7b85ae823282f7f7d73080c2a95073148f42ac584df1ea93aef7911
                        • Instruction ID: 0b28d71ac28376b0d3f05d04d396f9848e9975fdf0b4cc99100f02f62b25c8a0
                        • Opcode Fuzzy Hash: b8add116e7b85ae823282f7f7d73080c2a95073148f42ac584df1ea93aef7911
                        • Instruction Fuzzy Hash: 10115E3190012AABDB60DF98E985AEE77B8FF05311F000451F921E3950D734BB92DBA1
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00B9604C
                        • GetStockObject.GDI32(00000011), ref: 00B96060
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B9606A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CreateMessageObjectSendStockWindow
                        • String ID:
                        • API String ID: 3970641297-0
                        • Opcode ID: 5f67a6c09e6f377080c4bea8a0681a0349bd81117a28c99a1d2a681d4f3958a8
                        • Instruction ID: 0bc174717c794602be2f267b11eab5de0d211994264c96b6f04ee094f13870c2
                        • Opcode Fuzzy Hash: 5f67a6c09e6f377080c4bea8a0681a0349bd81117a28c99a1d2a681d4f3958a8
                        • Instruction Fuzzy Hash: 2E116172501508BFEF264F949CD4FEEBBA9EF18794F040155FA1452120D7329C60DB90
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 00BB3B56
                          • Part of subcall function 00BB3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00BB3AD2
                          • Part of subcall function 00BB3AA3: ___AdjustPointer.LIBCMT ref: 00BB3AED
                        • _UnwindNestedFrames.LIBCMT ref: 00BB3B6B
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00BB3B7C
                        • CallCatchBlock.LIBVCRUNTIME ref: 00BB3BA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction ID: 00af5686bcfaf775c2a3ce53718c40c7171a09d2adea251486a865479ac2f2d0
                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction Fuzzy Hash: E6012932100148BBDF126E95CC42EFB7BE9FF48B54F044094FE4856121C772E961EBA0
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00B913C6,00000000,00000000,?,00BC301A,00B913C6,00000000,00000000,00000000,?,00BC328B,00000006,FlsSetValue), ref: 00BC30A5
                        • GetLastError.KERNEL32(?,00BC301A,00B913C6,00000000,00000000,00000000,?,00BC328B,00000006,FlsSetValue,00C32290,FlsSetValue,00000000,00000364,?,00BC2E46), ref: 00BC30B1
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00BC301A,00B913C6,00000000,00000000,00000000,?,00BC328B,00000006,FlsSetValue,00C32290,FlsSetValue,00000000), ref: 00BC30BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: 22a98468e9ab2925c81d8351371185ceee32624f969214be949e7a737310b100
                        • Instruction ID: d2e289c2ac9441fc4afa68e3f3ec735ea213aca0a43dbe63c4fcb2a1f9d016cf
                        • Opcode Fuzzy Hash: 22a98468e9ab2925c81d8351371185ceee32624f969214be949e7a737310b100
                        • Instruction Fuzzy Hash: C501FC33311622ABC7314B79AC84F6F77D8EF05F61B548668F956E3140C721D901C6D0
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00BF747F
                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00BF7497
                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00BF74AC
                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00BF74CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Type$Register$FileLoadModuleNameUser
                        • String ID:
                        • API String ID: 1352324309-0
                        • Opcode ID: eea32a155257a2ca89f2e540ff1bd29426e1dacb2d1fa9189daad099271857e2
                        • Instruction ID: 3a6bde8ad3336e1ad8fb118b8610ec3916a09a60257fd3e423a98597a810eb2d
                        • Opcode Fuzzy Hash: eea32a155257a2ca89f2e540ff1bd29426e1dacb2d1fa9189daad099271857e2
                        • Instruction Fuzzy Hash: 29118EB12453199BE7309F14EC49BAA7BFCEB00B00F1085E9A616D7691DB70E908DB90
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00BFACD3,?,00008000), ref: 00BFB0C4
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BFACD3,?,00008000), ref: 00BFB0E9
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00BFACD3,?,00008000), ref: 00BFB0F3
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BFACD3,?,00008000), ref: 00BFB126
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: ccd563167d51f58107006604eafe5a8aecf9cc0c078c8723b50ab866e5d9d1b8
                        • Instruction ID: abb5ba49c82264e6f54ad5baf78ebad9305b6fdd6d141a4dbd4dfa45545ed979
                        • Opcode Fuzzy Hash: ccd563167d51f58107006604eafe5a8aecf9cc0c078c8723b50ab866e5d9d1b8
                        • Instruction Fuzzy Hash: 0D113931C11A2CE7CF10AFA4E9A9BFEBBB8FF09711F104085DA41B3581CB3096698B51
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00BF2DC5
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BF2DD6
                        • GetCurrentThreadId.KERNEL32 ref: 00BF2DDD
                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00BF2DE4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: 4e2201af38eae128f74cf6ff992467fffbc94ddc56686d6df44289c2dce44df0
                        • Instruction ID: 9cfed1fb0c2625757101b28ebf80b1199216b94de2f92edd6ea85f217d3b508e
                        • Opcode Fuzzy Hash: 4e2201af38eae128f74cf6ff992467fffbc94ddc56686d6df44289c2dce44df0
                        • Instruction Fuzzy Hash: 1CE09271111628BBE7301B729C8EFFF7EACEF42BA1F400165F605D24809AA4C846C6F0
                        APIs
                          • Part of subcall function 00BA9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BA9693
                          • Part of subcall function 00BA9639: SelectObject.GDI32(?,00000000), ref: 00BA96A2
                          • Part of subcall function 00BA9639: BeginPath.GDI32(?), ref: 00BA96B9
                          • Part of subcall function 00BA9639: SelectObject.GDI32(?,00000000), ref: 00BA96E2
                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00C28887
                        • LineTo.GDI32(?,?,?), ref: 00C28894
                        • EndPath.GDI32(?), ref: 00C288A4
                        • StrokePath.GDI32(?), ref: 00C288B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: 7d13ad17a1e525de4dfa96f11872406eb02b1b95c5fa03e8a33989eaa877c22a
                        • Instruction ID: 39c3afb5d22c765a0e4da14f979a2b446c5c0fca1c40f5612407468acf5122ee
                        • Opcode Fuzzy Hash: 7d13ad17a1e525de4dfa96f11872406eb02b1b95c5fa03e8a33989eaa877c22a
                        • Instruction Fuzzy Hash: 50F05E36046668FAEB225F94AC0AFCE3F59AF06711F088000FA11654E1C7B55622DFE5
                        APIs
                        • GetSysColor.USER32(00000008), ref: 00BA98CC
                        • SetTextColor.GDI32(?,?), ref: 00BA98D6
                        • SetBkMode.GDI32(?,00000001), ref: 00BA98E9
                        • GetStockObject.GDI32(00000005), ref: 00BA98F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Color$ModeObjectStockText
                        • String ID:
                        • API String ID: 4037423528-0
                        • Opcode ID: dfc11b0847e847ced0fc1550c6358a81c112c382dca7ee9ee8b0037f6ba497d9
                        • Instruction ID: 3206dd5ca1fb8cd4ddd87ab9e157be324eda02abeb7d88a999d4f09b38a0f536
                        • Opcode Fuzzy Hash: dfc11b0847e847ced0fc1550c6358a81c112c382dca7ee9ee8b0037f6ba497d9
                        • Instruction Fuzzy Hash: 13E09B31254680BEDB315B79FC49BDD3F60EB12336F048259F6F5544E1C7714651AB11
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00BF1634
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00BF11D9), ref: 00BF163B
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00BF11D9), ref: 00BF1648
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00BF11D9), ref: 00BF164F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: a72f42eb8d440480b87ac639136aab6008c2d45080fe11f7fea8915575122e33
                        • Instruction ID: f96597f2fbed797ec6e0a7116386adee3547c758d388d69ae50bc1d98fb10b85
                        • Opcode Fuzzy Hash: a72f42eb8d440480b87ac639136aab6008c2d45080fe11f7fea8915575122e33
                        • Instruction Fuzzy Hash: B6E08631611211EBD7301FA49D4DB9E3BBCEF44791F144C48F345CA090D6344446C754
                        APIs
                        • GetDesktopWindow.USER32 ref: 00BED858
                        • GetDC.USER32(00000000), ref: 00BED862
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BED882
                        • ReleaseDC.USER32(?), ref: 00BED8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: ead80dc47653dd0f20bba9c9ef9ed3090db6ae6c720976978baa051314bc7371
                        • Instruction ID: 00f4fde927e780548967ff18cd04085514e1aae76e4d94372d3862962fb4811e
                        • Opcode Fuzzy Hash: ead80dc47653dd0f20bba9c9ef9ed3090db6ae6c720976978baa051314bc7371
                        • Instruction Fuzzy Hash: 44E01AB5810204DFCF619FA0D88876DBBF1FB08710F108059F81AE7650C7384902AF40
                        APIs
                        • GetDesktopWindow.USER32 ref: 00BED86C
                        • GetDC.USER32(00000000), ref: 00BED876
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BED882
                        • ReleaseDC.USER32(?), ref: 00BED8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: c63b2c0fddd20979527a9f3fbae1fdbdbafdd12548a5ac2b0e8f7c82e556882d
                        • Instruction ID: 1c30e495ad11ec13535eabedaa2edbf386000340c98aa7ea4748cb5a9bbf3906
                        • Opcode Fuzzy Hash: c63b2c0fddd20979527a9f3fbae1fdbdbafdd12548a5ac2b0e8f7c82e556882d
                        • Instruction Fuzzy Hash: C6E012B5C10200EFCF60AFA0D88876DBBF1FB08710B108049F81AE7A50CB385902AF80
                        APIs
                          • Part of subcall function 00B97620: _wcslen.LIBCMT ref: 00B97625
                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00C04ED4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Connection_wcslen
                        • String ID: *$LPT
                        • API String ID: 1725874428-3443410124
                        • Opcode ID: cbaf63e1e084dae27bbbd5de8a96e4c4c0edac4f82bc141fd0a96473da9d0ba8
                        • Instruction ID: a42d8ffe18f4e2ff9c53f9e8332980509c04c087694f31c2f34704cb7c58e84b
                        • Opcode Fuzzy Hash: cbaf63e1e084dae27bbbd5de8a96e4c4c0edac4f82bc141fd0a96473da9d0ba8
                        • Instruction Fuzzy Hash: 259182B5A042059FCB18DF98C484EAABBF1FF44304F158099E51A9F3A2C731EE85CB90
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 00BBE30D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ErrorHandling__start
                        • String ID: pow
                        • API String ID: 3213639722-2276729525
                        • Opcode ID: ebdab6ca711e2183ea04c92a23009ac4ad340a9d30f9c1481300689eff813a69
                        • Instruction ID: f728110e329872580a9802bc3f9c6d63c8a49cc579c1c6c5dbfaaf55bb8c6ca6
                        • Opcode Fuzzy Hash: ebdab6ca711e2183ea04c92a23009ac4ad340a9d30f9c1481300689eff813a69
                        • Instruction Fuzzy Hash: 93514BB1A5C10297CB127714C941BFE2BE8EB40741F3489ECE4A6822B9DF74CC959E86
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID:
                        • String ID: #
                        • API String ID: 0-1885708031
                        • Opcode ID: dde52f816dbbeca0171a2184c69a757997b97943753ac4d2e91eb930ee5c01e9
                        • Instruction ID: 326f62e52febf6ebc7863063281b53bc7030665f2a25bfed6c40919db8961454
                        • Opcode Fuzzy Hash: dde52f816dbbeca0171a2184c69a757997b97943753ac4d2e91eb930ee5c01e9
                        • Instruction Fuzzy Hash: 3A51EF755043869FDB25DF69C481ABE7BE4EF66310F244099ECA19B290DB34DD42CBA0
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00BAF2A2
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00BAF2BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: 14034d88396d86c4dc415a5d6e10d52b6a12363e151db0f27b2215d4a46fc2fb
                        • Instruction ID: af403ac4e002d351b63519ca75f71c56f3e479a51a8bfe237977e4e12e474c95
                        • Opcode Fuzzy Hash: 14034d88396d86c4dc415a5d6e10d52b6a12363e151db0f27b2215d4a46fc2fb
                        • Instruction Fuzzy Hash: 035137724187449BD720AF21DC86BAFBBF8FB85300F81889DF1D941195EB708569CB66
                        APIs
                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00C157E0
                        • _wcslen.LIBCMT ref: 00C157EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: BuffCharUpper_wcslen
                        • String ID: CALLARGARRAY
                        • API String ID: 157775604-1150593374
                        • Opcode ID: 88eee079cd43b4faefb55d078c969da7df89f8a2c462951f325d8ae02f47f8c2
                        • Instruction ID: 002f1908e43e29954f39a908d599aa0ff559cc2e7224bb89c61e2ebf32dc4ffa
                        • Opcode Fuzzy Hash: 88eee079cd43b4faefb55d078c969da7df89f8a2c462951f325d8ae02f47f8c2
                        • Instruction Fuzzy Hash: 66418C71A40209DFDB14DFA9C8819FEBBF5FF9A324F104069E515A7291EB309E81DB90
                        APIs
                        • _wcslen.LIBCMT ref: 00C0D130
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C0D13A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CrackInternet_wcslen
                        • String ID: |
                        • API String ID: 596671847-2343686810
                        • Opcode ID: 96be5f2024dbdee6a12144ff8c2b84baef0d332ff13290d844a6a3ead53a7cf0
                        • Instruction ID: 3d3b1de9259ba2a8b4e79f2c6952b4368db3d3d19bfbc272d2c098136fcc2cda
                        • Opcode Fuzzy Hash: 96be5f2024dbdee6a12144ff8c2b84baef0d332ff13290d844a6a3ead53a7cf0
                        • Instruction Fuzzy Hash: 74311D71D00219ABCF15EFA5CC85AEE7FB9FF04350F100069F815A6166DB31AA56DB50
                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 00C23621
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00C2365C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: fa1d2c7b6ea2f8f18d98a71fbbe1150047cf159e2d1ccc5704e7eb0e2a031adb
                        • Instruction ID: 51fc62df71d5106e049267137e8e85dfbd73eea927d5f82e817b54ed334e51d1
                        • Opcode Fuzzy Hash: fa1d2c7b6ea2f8f18d98a71fbbe1150047cf159e2d1ccc5704e7eb0e2a031adb
                        • Instruction Fuzzy Hash: 56319071110654AEDB20DF28EC80FFB73ADFF48720F108619F9A997290DA35AD91D760
                        APIs
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00C2461F
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C24634
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: 05b3da2e4537f0f3c8e75e0491fa6a397fe0d04cd120d1f84004e080e1c6be96
                        • Instruction ID: afa0af8052c960a02420d673d60f4e05a9e97965203ca11f913a361674c40629
                        • Opcode Fuzzy Hash: 05b3da2e4537f0f3c8e75e0491fa6a397fe0d04cd120d1f84004e080e1c6be96
                        • Instruction Fuzzy Hash: B93139B4A003199FDF18CFA9D980BDA7BB5FF09300F14406AE904AB741D770AA41CF90
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00C2327C
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C23287
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: 22decc1cb3c33d4cacb2057db9014f57b046d676013e503a54c906f96b306872
                        • Instruction ID: 3280ec928110c0edf743311519a15827876cc9e7ff13957699183402eea837bd
                        • Opcode Fuzzy Hash: 22decc1cb3c33d4cacb2057db9014f57b046d676013e503a54c906f96b306872
                        • Instruction Fuzzy Hash: 3211E271300258BFEF21DE54EC80FBB3B6AEB98364F100124F928A7692D6759E518760
                        APIs
                          • Part of subcall function 00B9600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00B9604C
                          • Part of subcall function 00B9600E: GetStockObject.GDI32(00000011), ref: 00B96060
                          • Part of subcall function 00B9600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B9606A
                        • GetWindowRect.USER32(00000000,?), ref: 00C2377A
                        • GetSysColor.USER32(00000012), ref: 00C23794
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: 218ea6a2b9cbb6e76d14557253d705e5e5c3f2bcdea5b14ae677ae5df15cee94
                        • Instruction ID: 67cd85696d28256c7ffbc965580af5ed36e1d7609fa7c12085c0e03c73425735
                        • Opcode Fuzzy Hash: 218ea6a2b9cbb6e76d14557253d705e5e5c3f2bcdea5b14ae677ae5df15cee94
                        • Instruction Fuzzy Hash: 6B1159B2610219AFDF10DFA8DC85AEE7BB8FB08304F004524F965E2250D774E911DB50
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C0CD7D
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C0CDA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: 1634ff44a925b87e20362cb41550769e171235ead0e82151bbded82bb03b1365
                        • Instruction ID: 04e142739af7a517c72fd9b5a643e15817d5d0b0fbc16fda53c38c09efd69a66
                        • Opcode Fuzzy Hash: 1634ff44a925b87e20362cb41550769e171235ead0e82151bbded82bb03b1365
                        • Instruction Fuzzy Hash: 5611A071215731BAD7384B668CC9FE7BEA8EF127A4F00433AF119830C0E6609A55D6F0
                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 00C234AB
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00C234BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: f071982b5bae7ffa6f36ff98f851c913bc8622ddf25ab5a791b432cc92e827be
                        • Instruction ID: 56ca97956b7a9eadcc2f6b2996c8ed04438f56e31601270c23a11646f48249b1
                        • Opcode Fuzzy Hash: f071982b5bae7ffa6f36ff98f851c913bc8622ddf25ab5a791b432cc92e827be
                        • Instruction Fuzzy Hash: 9D11BF71100168ABEB22AE64EC84BAB3B6AEB05374F504364FA70939D0C779DE519B60
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                        • CharUpperBuffW.USER32(?,?,?), ref: 00BF6CB6
                        • _wcslen.LIBCMT ref: 00BF6CC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: STOP
                        • API String ID: 1256254125-2411985666
                        • Opcode ID: d9b2ed6334da0453f0b828a3dce704074910f3e6f700ec9e83f2cca250411764
                        • Instruction ID: c9499928a11322e2d635f27e474624c50f62a5a378ed6bb871ecf2fe7418b1d5
                        • Opcode Fuzzy Hash: d9b2ed6334da0453f0b828a3dce704074910f3e6f700ec9e83f2cca250411764
                        • Instruction Fuzzy Hash: AA01C032A1052E9BCB20AFFDDC809BF77F5EB6171071005B8EEA297195EB31D948C650
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00BF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00BF3CCA
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00BF1D4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 38d782c1cd24dabc3b326b2fdd44058b7cc28a6bfe8f3ba6c2381b1a013cbb83
                        • Instruction ID: 2dfddc53e1bb51c5941ba75fc556bd721d4dfe4e1f8a09400e8c0811d3aea4ee
                        • Opcode Fuzzy Hash: 38d782c1cd24dabc3b326b2fdd44058b7cc28a6bfe8f3ba6c2381b1a013cbb83
                        • Instruction Fuzzy Hash: 0B01B579601218EB8F14EBA8CC559FE73F8EB46350B040DAEF932672D1EA31590C8660
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00BF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00BF3CCA
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00BF1C46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: ffd32d69bd5eb9cf4618eab1cc6a0d925d9397b5325b20220d285fd1caf2deeb
                        • Instruction ID: 7e59dc17675602b2d6b1f99f13bb401ffccc3689e84b30571fbc6aba0dae0c8a
                        • Opcode Fuzzy Hash: ffd32d69bd5eb9cf4618eab1cc6a0d925d9397b5325b20220d285fd1caf2deeb
                        • Instruction Fuzzy Hash: 9201A77568110CA7CF14EBA8CDA5AFF77E8DB11340F1408ADFA1677281EA209E0CC6B5
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00BF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00BF3CCA
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00BF1CC8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: dd24dbf0023b2999f14706b9e24e9822cf7286e29fddf7ba59efdf3f863184e1
                        • Instruction ID: e4e860d0983ea4c10384477770542fcd55d6e519de0a66c8f77827c541215fd2
                        • Opcode Fuzzy Hash: dd24dbf0023b2999f14706b9e24e9822cf7286e29fddf7ba59efdf3f863184e1
                        • Instruction Fuzzy Hash: 1601D675A8021CA7CF14EBA9CE51AFE77E8DB11380F1408A9F91277281EA219F0CC671
                        APIs
                          • Part of subcall function 00B99CB3: _wcslen.LIBCMT ref: 00B99CBD
                          • Part of subcall function 00BF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00BF3CCA
                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00BF1DD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 7917c97284b75356a009f4bc493c59e26ee64e954d4c20bebdcc0e8f0eb8fa1d
                        • Instruction ID: 80ac9e43064924393e39c5db345fb2ab46e8403ba6a0417ac077aea9f0e4713f
                        • Opcode Fuzzy Hash: 7917c97284b75356a009f4bc493c59e26ee64e954d4c20bebdcc0e8f0eb8fa1d
                        • Instruction Fuzzy Hash: 5DF0A975A51218A7DF14E7A9CC95BFE77F8EB01750F040D79F922632C1DA60590C8264
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: 3, 3, 16, 1
                        • API String ID: 176396367-3042988571
                        • Opcode ID: 1375b39b22bdec248a1c4b957e36e3343c2dbcd0adc872878baa784d47491807
                        • Instruction ID: cab303f2035e217cd962494cbd8f998e50cf2444d8e3b93aa6945b80ba5e8337
                        • Opcode Fuzzy Hash: 1375b39b22bdec248a1c4b957e36e3343c2dbcd0adc872878baa784d47491807
                        • Instruction Fuzzy Hash: 6CE02B062042201593311279ACC19FF56D9DFCA7A0714192BF9C1C2267EBD4CED1A3A0
                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00BF0B23
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 2030045667-4017498283
                        • Opcode ID: 0688441605a829ce69f30fe975b52d2b8b6b672dec6f44055b7fff9141a89796
                        • Instruction ID: 4d6d70bcbdcd8250cab4dc47c07fedfaaf40a9ef8921f9a5d7b495cc3b287f29
                        • Opcode Fuzzy Hash: 0688441605a829ce69f30fe975b52d2b8b6b672dec6f44055b7fff9141a89796
                        • Instruction Fuzzy Hash: AEE0D83124831826D22436947C43FDD7BC49F05F61F1004B6FB98558D38AE1649006EE
                        APIs
                          • Part of subcall function 00BAF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00BB0D71,?,?,?,00B9100A), ref: 00BAF7CE
                        • IsDebuggerPresent.KERNEL32(?,?,?,00B9100A), ref: 00BB0D75
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00B9100A), ref: 00BB0D84
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00BB0D7F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 55579361-631824599
                        • Opcode ID: 6dfaa1e5bcd4f2d4ce912f5979158ef7877fdc641848f9b1c964d8fee9d78d28
                        • Instruction ID: f813a1e12caf5e04cfa49a8f53a30bc69f30864ead289743b41c7e47e483a219
                        • Opcode Fuzzy Hash: 6dfaa1e5bcd4f2d4ce912f5979158ef7877fdc641848f9b1c964d8fee9d78d28
                        • Instruction Fuzzy Hash: 82E06DB02103118BD731AFBDE4483AA7BF0AF00740F0489BDE882C6AA1DBF4E4458B91
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00C0302F
                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00C03044
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: 316009f0687996d1eaaa3122172d073d2b05d97ef0b6364fec598dabbcdac24a
                        • Instruction ID: 72a62bacf676a461cae11c837dd2ddb8de865da31a3f721c76d58b4d254fa783
                        • Opcode Fuzzy Hash: 316009f0687996d1eaaa3122172d073d2b05d97ef0b6364fec598dabbcdac24a
                        • Instruction Fuzzy Hash: EFD05EB6500328A7DB30A7A4AC4EFCF3A6CDB04751F4002A1BA55E2091DEF49985CAD0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: LocalTime
                        • String ID: %.3d$X64
                        • API String ID: 481472006-1077770165
                        • Opcode ID: e2f0fd0c66f8c4c93fd4534dafd90ae8b1ddedc613a544d9db4658556fc0dd00
                        • Instruction ID: 5e048cfea8ebc7b5b4ef3dad613fc5c12fe48cec8db01fcb1ac93ed61fe7156c
                        • Opcode Fuzzy Hash: e2f0fd0c66f8c4c93fd4534dafd90ae8b1ddedc613a544d9db4658556fc0dd00
                        • Instruction Fuzzy Hash: 88D01261808149E9CB5097E1DCC59BDB3FCAB09341F5084E2FA16A1050D764C5496B61
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C2236C
                        • PostMessageW.USER32(00000000), ref: 00C22373
                          • Part of subcall function 00BFE97B: Sleep.KERNEL32 ref: 00BFE9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 6f701eb6cf2ea569ade8376a01ab9a21000bf174dfaab981c4e209fd98a0667f
                        • Instruction ID: 4117a9a3b70484d2f0e5413ab31277d1b8a433de02fd0876abdbbd589b0e3019
                        • Opcode Fuzzy Hash: 6f701eb6cf2ea569ade8376a01ab9a21000bf174dfaab981c4e209fd98a0667f
                        • Instruction Fuzzy Hash: B9D0A932390300BAE274A7309C4FFCE66049B04B00F404A22B701AB0E0C8F0A8468A18
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C2232C
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00C2233F
                          • Part of subcall function 00BFE97B: Sleep.KERNEL32 ref: 00BFE9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 6a4175071132f1e55c7af80b9a394f460c97026c0e1493000545d6b95df69d89
                        • Instruction ID: c17b67f9324a31c3b68c5b32287e7a1b9a65b61e5bc44fae4f0576ae09cc5984
                        • Opcode Fuzzy Hash: 6a4175071132f1e55c7af80b9a394f460c97026c0e1493000545d6b95df69d89
                        • Instruction Fuzzy Hash: C9D022363A4300B7E274B730DC4FFDE7A049B00B00F004A22B705AB0E0C8F0E846CA14
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00BCBE93
                        • GetLastError.KERNEL32 ref: 00BCBEA1
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BCBEFC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1278100223.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1278024595.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278228768.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278293519.0000000000C5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1278327041.0000000000C64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_rOrderRequest09-24.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast
                        • String ID:
                        • API String ID: 1717984340-0
                        • Opcode ID: 87b7f035214cbd65d79b4eed41a9d97658311e100f62d1efe69b96098876017b
                        • Instruction ID: 0d878cc2ab85293b481917ac5ff10d92b313b2a0def41edb3acda32fe28610fc
                        • Opcode Fuzzy Hash: 87b7f035214cbd65d79b4eed41a9d97658311e100f62d1efe69b96098876017b
                        • Instruction Fuzzy Hash: 0C41AE35600216ABDF218FA4CC86FBE7BE5EF41720F1441ADF9599B2A1DB308D05CB61